Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe
Resource
win10v2004-20230220-en
General
-
Target
f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe
-
Size
539KB
-
MD5
0317c6d0b36a7f3ec6e43a746923bb43
-
SHA1
480e8021d1be5067381fbb122f13fb5bfb6e2ed5
-
SHA256
f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93
-
SHA512
1cbbb2be3fcc4cca70e2c6a7d4094221826ad084eb572bb5940fbcef89147698aa74dcfaacb303a61a11af776ad743fbe82239f13f01c0c46f70393195eb89fa
-
SSDEEP
12288:zMrYy90mu3yZWDCVMmQan1XznaUkGk4w22GP:/ymHiQa1Xznp0VGP
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7105.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro7105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7105.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1888-155-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-158-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-156-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-160-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-162-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-164-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-166-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-168-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-170-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-172-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-176-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-174-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-179-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-182-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-185-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-187-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-189-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-191-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-193-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-197-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-195-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-199-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-201-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-203-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-205-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-207-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-209-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-211-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-213-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-215-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-217-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-219-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-221-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1888-1074-0x0000000007250000-0x0000000007260000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1260 unio5451.exe 3404 pro7105.exe 1888 qu2654.exe 4552 si528921.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7105.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5451.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5451.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1100 1888 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3404 pro7105.exe 3404 pro7105.exe 1888 qu2654.exe 1888 qu2654.exe 4552 si528921.exe 4552 si528921.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3404 pro7105.exe Token: SeDebugPrivilege 1888 qu2654.exe Token: SeDebugPrivilege 4552 si528921.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1260 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 83 PID 1672 wrote to memory of 1260 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 83 PID 1672 wrote to memory of 1260 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 83 PID 1260 wrote to memory of 3404 1260 unio5451.exe 84 PID 1260 wrote to memory of 3404 1260 unio5451.exe 84 PID 1260 wrote to memory of 1888 1260 unio5451.exe 90 PID 1260 wrote to memory of 1888 1260 unio5451.exe 90 PID 1260 wrote to memory of 1888 1260 unio5451.exe 90 PID 1672 wrote to memory of 4552 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 95 PID 1672 wrote to memory of 4552 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 95 PID 1672 wrote to memory of 4552 1672 f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe"C:\Users\Admin\AppData\Local\Temp\f99fa22e29861e2c1f2b8346dc69f3b23608706f6f51bceabc37d327712e1b93.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5451.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5451.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7105.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7105.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2654.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 15844⤵
- Program crash
PID:1100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si528921.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si528921.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1888 -ip 18881⤵PID:3636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD54f8ed84a502e6f917d501c8377acb256
SHA14608dc94425e7d6585b5d825ae7bf5955a2eb5bc
SHA256d8859ac540844e57b888ddac10c9f430f7719f82580b7ebeecd2b7b4e25a58e6
SHA512ebea906e1ff8d184075c7074604cb66f0e89f8093c1db9ccff747ca23a4b12df04e0b0a70f435f210886bb01b188909d639bbeecb2679739f9739d4226724228
-
Filesize
397KB
MD54f8ed84a502e6f917d501c8377acb256
SHA14608dc94425e7d6585b5d825ae7bf5955a2eb5bc
SHA256d8859ac540844e57b888ddac10c9f430f7719f82580b7ebeecd2b7b4e25a58e6
SHA512ebea906e1ff8d184075c7074604cb66f0e89f8093c1db9ccff747ca23a4b12df04e0b0a70f435f210886bb01b188909d639bbeecb2679739f9739d4226724228
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD53d61bd31fc62179c7837fc6f7df9ed96
SHA15a276d3ce48d1dead527adb8c3e669109fba0cbe
SHA25699475d82793b5119306fcd99cdb392ab64952beafd2927ff27e57bb26219fbdb
SHA5124b723143cb81153cf22cf91f2d35b4801256aba7b103e21a97e241c576738adc266823740396a8e1831668583b6a8cfd1dd4fe4112b2d7f181205f36ed8dcff5
-
Filesize
355KB
MD53d61bd31fc62179c7837fc6f7df9ed96
SHA15a276d3ce48d1dead527adb8c3e669109fba0cbe
SHA25699475d82793b5119306fcd99cdb392ab64952beafd2927ff27e57bb26219fbdb
SHA5124b723143cb81153cf22cf91f2d35b4801256aba7b103e21a97e241c576738adc266823740396a8e1831668583b6a8cfd1dd4fe4112b2d7f181205f36ed8dcff5