Analysis
-
max time kernel
56s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/03/2023, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe
Resource
win10-20230220-en
General
-
Target
790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe
-
Size
540KB
-
MD5
1811f356c0b077028ed3fdb6d4c8d87a
-
SHA1
a412b566dd24b4532d5103d279a26e4e0ab5c242
-
SHA256
790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e
-
SHA512
e85b6a82293a69b18915c2b9adce3ba9a28d9eb9ecf3320b8b0f9415e6922fbd5cef492f4094b04e22ed7e905fa0c035b4acb7f00f54165550835efdb230812e
-
SSDEEP
12288:dMrqy90/ExmfIo+e649VAnMJKf8SGdzooHTTBgJq:LyTxZE9VAnyKiJokBgk
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h73Zh27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h73Zh27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h73Zh27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h73Zh27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h73Zh27.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3656-142-0x0000000004830000-0x0000000004876000-memory.dmp family_redline behavioral1/memory/3656-147-0x0000000007100000-0x0000000007144000-memory.dmp family_redline behavioral1/memory/3656-148-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-149-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-151-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-153-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-155-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-157-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-159-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-161-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-163-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-165-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-167-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-169-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-171-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-173-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-175-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-177-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-179-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-181-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-183-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-185-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-187-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-189-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-191-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-193-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-195-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-197-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-199-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-201-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-203-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-205-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-207-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-209-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/3656-211-0x0000000007100000-0x000000000713F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3636 niba9539.exe 4132 h73Zh27.exe 3656 imOnr38.exe 3060 l89MQ22.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h73Zh27.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba9539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba9539.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4132 h73Zh27.exe 4132 h73Zh27.exe 3656 imOnr38.exe 3656 imOnr38.exe 3060 l89MQ22.exe 3060 l89MQ22.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4132 h73Zh27.exe Token: SeDebugPrivilege 3656 imOnr38.exe Token: SeDebugPrivilege 3060 l89MQ22.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3636 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 66 PID 2928 wrote to memory of 3636 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 66 PID 2928 wrote to memory of 3636 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 66 PID 3636 wrote to memory of 4132 3636 niba9539.exe 67 PID 3636 wrote to memory of 4132 3636 niba9539.exe 67 PID 3636 wrote to memory of 3656 3636 niba9539.exe 68 PID 3636 wrote to memory of 3656 3636 niba9539.exe 68 PID 3636 wrote to memory of 3656 3636 niba9539.exe 68 PID 2928 wrote to memory of 3060 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 70 PID 2928 wrote to memory of 3060 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 70 PID 2928 wrote to memory of 3060 2928 790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe"C:\Users\Admin\AppData\Local\Temp\790918937449af670cc35d0be4f1e02767a4dcaa3fda18399165971700e7041e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9539.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h73Zh27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h73Zh27.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imOnr38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imOnr38.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89MQ22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89MQ22.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
Filesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
Filesize
398KB
MD5b01b956936674510600e393f222fee45
SHA11257b2ed947e1afb5fc323ece0b78c175b04ba2a
SHA25659e2422a935cd26cba614a0335052ecd5e94b705fb897429b514db095fe47a21
SHA51211283ccb02250cd54a2225d124527129ef868ea307b577b3d6f78fb39f35f92694a20e84acbb64d37001a3297fd15c418dc00a2d9b6c2d85b1d669d467c3c0d8
-
Filesize
398KB
MD5b01b956936674510600e393f222fee45
SHA11257b2ed947e1afb5fc323ece0b78c175b04ba2a
SHA25659e2422a935cd26cba614a0335052ecd5e94b705fb897429b514db095fe47a21
SHA51211283ccb02250cd54a2225d124527129ef868ea307b577b3d6f78fb39f35f92694a20e84acbb64d37001a3297fd15c418dc00a2d9b6c2d85b1d669d467c3c0d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
356KB
MD574c56be0388ac2113ea5a1f6fa2b9c56
SHA1f75e4a87e70668cd0f23de3dfae118499d60060a
SHA256cef8c66b898a303d839042a83de7c869b9e2f123936b86e04e7b4da899ce17f5
SHA512a1744e093e91a84029c658f35f3e78c4b94a0d996ae45b48b2f0117bf18068a8fed966e5d559bd38e0c3b62f59b29af45673f0e0687b0dacb1e3ea1d4735fa4b
-
Filesize
356KB
MD574c56be0388ac2113ea5a1f6fa2b9c56
SHA1f75e4a87e70668cd0f23de3dfae118499d60060a
SHA256cef8c66b898a303d839042a83de7c869b9e2f123936b86e04e7b4da899ce17f5
SHA512a1744e093e91a84029c658f35f3e78c4b94a0d996ae45b48b2f0117bf18068a8fed966e5d559bd38e0c3b62f59b29af45673f0e0687b0dacb1e3ea1d4735fa4b