Analysis
-
max time kernel
84s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe
Resource
win10v2004-20230221-en
General
-
Target
9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe
-
Size
540KB
-
MD5
2e110caeb15b6dd7b3522d59e767639c
-
SHA1
f03196d29774b3f644888fea9720763ec2ce5fc9
-
SHA256
9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95
-
SHA512
c45c03821a63608c02f092e7388e02ca7e62cc287e1fdae70ac13749ba8ef657e5e07cbfe82d95698d173b0657f492a942ae152b498c244ac00ae4401cf8256a
-
SSDEEP
12288:4MrFy90pe/fPIr5FLk5ZOqNl7hPjS5dmEFDl9SCFlMO:Ny1kY5Z3Rh7EfFBE+lj
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h19Ey69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h19Ey69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h19Ey69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h19Ey69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h19Ey69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h19Ey69.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2880-154-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-155-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-157-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-159-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-161-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-171-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-168-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-163-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-173-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-175-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-177-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-179-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-181-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-183-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-185-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-187-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-189-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-191-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-193-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-197-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-199-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-195-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-201-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-203-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-205-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-207-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-209-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-211-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-213-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-215-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-217-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-219-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2880-221-0x0000000007710000-0x000000000774F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4056 niba1191.exe 2388 h19Ey69.exe 2880 iylSD99.exe 4124 l25qq66.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h19Ey69.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba1191.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1191.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3412 2880 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2388 h19Ey69.exe 2388 h19Ey69.exe 2880 iylSD99.exe 2880 iylSD99.exe 4124 l25qq66.exe 4124 l25qq66.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2388 h19Ey69.exe Token: SeDebugPrivilege 2880 iylSD99.exe Token: SeDebugPrivilege 4124 l25qq66.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2540 wrote to memory of 4056 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 85 PID 2540 wrote to memory of 4056 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 85 PID 2540 wrote to memory of 4056 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 85 PID 4056 wrote to memory of 2388 4056 niba1191.exe 86 PID 4056 wrote to memory of 2388 4056 niba1191.exe 86 PID 4056 wrote to memory of 2880 4056 niba1191.exe 87 PID 4056 wrote to memory of 2880 4056 niba1191.exe 87 PID 4056 wrote to memory of 2880 4056 niba1191.exe 87 PID 2540 wrote to memory of 4124 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 90 PID 2540 wrote to memory of 4124 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 90 PID 2540 wrote to memory of 4124 2540 9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe"C:\Users\Admin\AppData\Local\Temp\9f16709851296cfbb036a4ea0bae2c63ae50d7f681640ad4edaced22ea215e95.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1191.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h19Ey69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h19Ey69.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iylSD99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iylSD99.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 13004⤵
- Program crash
PID:3412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l25qq66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l25qq66.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2880 -ip 28801⤵PID:3220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
Filesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
Filesize
398KB
MD5358f190c8e0322dca695edf7ec5d5e8a
SHA190246ecaf17d30f6218e44047aea8acd992f551a
SHA25641888a8da431122f989812a3a8c306f5cca45ae3167d698d5221253372254fb1
SHA512f6a0d557be456a05b4edc9993b4dc9acc0edc997fab7981cb647abb37e869ce455ac0adc2200fc7480f9570a207e554a0f11b1e89b21881d0861e5ffd6cf2229
-
Filesize
398KB
MD5358f190c8e0322dca695edf7ec5d5e8a
SHA190246ecaf17d30f6218e44047aea8acd992f551a
SHA25641888a8da431122f989812a3a8c306f5cca45ae3167d698d5221253372254fb1
SHA512f6a0d557be456a05b4edc9993b4dc9acc0edc997fab7981cb647abb37e869ce455ac0adc2200fc7480f9570a207e554a0f11b1e89b21881d0861e5ffd6cf2229
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
357KB
MD5901db2e64ba03a474a38415092e243fe
SHA1b5d1a230d973ff2d3b0435b7533ff107c21c4f94
SHA25688b4ffbf2b5412d57f81102cd9e489bf41409fb69e99f3ca383226875ce74c62
SHA512c7336da091df3104685e62afccf7eb7b8f5f534477f6cdad7688687aead07482003b2871e68fb4102f8422aac62b7009e3e54e2b9ede145c8fb33b155544c62e
-
Filesize
357KB
MD5901db2e64ba03a474a38415092e243fe
SHA1b5d1a230d973ff2d3b0435b7533ff107c21c4f94
SHA25688b4ffbf2b5412d57f81102cd9e489bf41409fb69e99f3ca383226875ce74c62
SHA512c7336da091df3104685e62afccf7eb7b8f5f534477f6cdad7688687aead07482003b2871e68fb4102f8422aac62b7009e3e54e2b9ede145c8fb33b155544c62e