Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 09:56
Static task
static1
Behavioral task
behavioral1
Sample
2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe
Resource
win10v2004-20230220-en
General
-
Target
2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe
-
Size
539KB
-
MD5
beddc5fcfb1aea34a6aa6cca0d04b782
-
SHA1
24f9a55df63e91ff36585dddeee89da6dbebf4ef
-
SHA256
2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89
-
SHA512
72ae7de8ee0528ba4b7027b924e9f100ebba38c2e03b0788da2664be5fd3b0b157181d741abc62755724d817ea1884affebd8699554e4e2adb75bd3cafccb455
-
SSDEEP
12288:0Mr6y901IgxOEJ62kz7q3YRxxI4+oz3DzEJbN7VlZX/542:WybgcEJXkz+3YTIizzE9lF22
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Signatures
-
Processes:
h21wh11.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h21wh11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h21wh11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h21wh11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h21wh11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h21wh11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h21wh11.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3556-157-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-158-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-160-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-162-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-164-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-166-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-168-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-170-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-172-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-174-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-176-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-178-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-180-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-182-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-184-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-186-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-188-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-190-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-192-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-194-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-196-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-198-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-200-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-202-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-204-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-206-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-208-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-210-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-212-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-214-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-216-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-218-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3556-220-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
niba6376.exeh21wh11.exeiULRj17.exel34sH33.exepid process 2264 niba6376.exe 2228 h21wh11.exe 3556 iULRj17.exe 4924 l34sH33.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
h21wh11.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h21wh11.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exeniba6376.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba6376.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4032 3556 WerFault.exe iULRj17.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
h21wh11.exeiULRj17.exel34sH33.exepid process 2228 h21wh11.exe 2228 h21wh11.exe 3556 iULRj17.exe 3556 iULRj17.exe 4924 l34sH33.exe 4924 l34sH33.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
h21wh11.exeiULRj17.exel34sH33.exedescription pid process Token: SeDebugPrivilege 2228 h21wh11.exe Token: SeDebugPrivilege 3556 iULRj17.exe Token: SeDebugPrivilege 4924 l34sH33.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exeniba6376.exedescription pid process target process PID 1520 wrote to memory of 2264 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe niba6376.exe PID 1520 wrote to memory of 2264 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe niba6376.exe PID 1520 wrote to memory of 2264 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe niba6376.exe PID 2264 wrote to memory of 2228 2264 niba6376.exe h21wh11.exe PID 2264 wrote to memory of 2228 2264 niba6376.exe h21wh11.exe PID 2264 wrote to memory of 3556 2264 niba6376.exe iULRj17.exe PID 2264 wrote to memory of 3556 2264 niba6376.exe iULRj17.exe PID 2264 wrote to memory of 3556 2264 niba6376.exe iULRj17.exe PID 1520 wrote to memory of 4924 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe l34sH33.exe PID 1520 wrote to memory of 4924 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe l34sH33.exe PID 1520 wrote to memory of 4924 1520 2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe l34sH33.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe"C:\Users\Admin\AppData\Local\Temp\2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 13764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3556 -ip 35561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exeFilesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exeFilesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exeFilesize
397KB
MD58803ba9c1969384d43bd523ece0ae75d
SHA1fe74a6a8bd12399643d2e37fb004b1c3f4f1ea4d
SHA256ebea65d4e399f3e9d3f0105deb9716eb678551262ca1e23e00d4ae972724689b
SHA512d5c3f6f3872c9d12b07412a815c41b12cbd7a08df2100f578ea30c38cdbd49ab54213a7cd9c99fad778e793a2e8076ef289857ae6ec7e4b46b0375af6acd2ff2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exeFilesize
397KB
MD58803ba9c1969384d43bd523ece0ae75d
SHA1fe74a6a8bd12399643d2e37fb004b1c3f4f1ea4d
SHA256ebea65d4e399f3e9d3f0105deb9716eb678551262ca1e23e00d4ae972724689b
SHA512d5c3f6f3872c9d12b07412a815c41b12cbd7a08df2100f578ea30c38cdbd49ab54213a7cd9c99fad778e793a2e8076ef289857ae6ec7e4b46b0375af6acd2ff2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exeFilesize
355KB
MD5d0f6d6db571f5cc78201b9d0ddda9a02
SHA1d1bda83afb17c583d6b3f7804e257867a4377022
SHA25611a631202a344d44aa0a9bec0e57f04a3f98f7bb12fd173815d7ee2f7afddcc1
SHA512cb52d51d92b99d22ffc63c7c10cb0acf30672aba2ed48a1d783f33e81b984848f038a0b1bb2d2d5f77e6380bfabd1f4c315c85309c273e5a240c1ea8a1838365
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exeFilesize
355KB
MD5d0f6d6db571f5cc78201b9d0ddda9a02
SHA1d1bda83afb17c583d6b3f7804e257867a4377022
SHA25611a631202a344d44aa0a9bec0e57f04a3f98f7bb12fd173815d7ee2f7afddcc1
SHA512cb52d51d92b99d22ffc63c7c10cb0acf30672aba2ed48a1d783f33e81b984848f038a0b1bb2d2d5f77e6380bfabd1f4c315c85309c273e5a240c1ea8a1838365
-
memory/2228-147-0x0000000000D50000-0x0000000000D5A000-memory.dmpFilesize
40KB
-
memory/3556-153-0x00000000074A0000-0x0000000007A44000-memory.dmpFilesize
5.6MB
-
memory/3556-154-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3556-155-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-156-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-157-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-158-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-160-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-162-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-164-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-166-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-168-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-170-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-172-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-174-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-176-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-178-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-180-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-182-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-184-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-186-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-188-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-190-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-192-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-194-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-196-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-198-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-200-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-202-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-204-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-206-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-208-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-210-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-212-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-214-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-216-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-218-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-220-0x0000000004AC0000-0x0000000004AFE000-memory.dmpFilesize
248KB
-
memory/3556-1063-0x0000000007A50000-0x0000000008068000-memory.dmpFilesize
6.1MB
-
memory/3556-1064-0x00000000072C0000-0x00000000073CA000-memory.dmpFilesize
1.0MB
-
memory/3556-1065-0x0000000004F30000-0x0000000004F42000-memory.dmpFilesize
72KB
-
memory/3556-1066-0x00000000073D0000-0x000000000740C000-memory.dmpFilesize
240KB
-
memory/3556-1067-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-1069-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-1070-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-1071-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-1072-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3556-1075-0x0000000008640000-0x00000000086D2000-memory.dmpFilesize
584KB
-
memory/3556-1076-0x00000000086E0000-0x0000000008746000-memory.dmpFilesize
408KB
-
memory/3556-1077-0x0000000008B80000-0x0000000008D42000-memory.dmpFilesize
1.8MB
-
memory/3556-1078-0x0000000008D60000-0x000000000928C000-memory.dmpFilesize
5.2MB
-
memory/3556-1079-0x0000000009760000-0x00000000097D6000-memory.dmpFilesize
472KB
-
memory/3556-1080-0x00000000097E0000-0x0000000009830000-memory.dmpFilesize
320KB
-
memory/4924-1087-0x0000000000B40000-0x0000000000B72000-memory.dmpFilesize
200KB
-
memory/4924-1088-0x0000000005760000-0x0000000005770000-memory.dmpFilesize
64KB