Analysis
-
max time kernel
92s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe
Resource
win10v2004-20230220-en
General
-
Target
210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe
-
Size
552KB
-
MD5
dbc2fbecb8a4c885293ac77007bb4c44
-
SHA1
417ed3de34924c4aea95cec43e3d9fabe1e8b84e
-
SHA256
210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065
-
SHA512
9f9e0c2ff5d3a0d1479d6707e2215bd60a6b0011b6039ec36f811e9e1d9d64c38d4bdfa1ffae6f93f7b03bd9d3c7f3246e1f79aa5aa67e5691a32bc70cfa7ba0
-
SSDEEP
12288:/MrKy90H74SvexMIZwmtign0F+pei/YdwwPUwQ45xGxxVyc:5yVSV8w3xzJwwdQ45iyc
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
rotik
193.233.20.32:4125
-
auth_value
74863478ae154e921eb729354d2bb4bd
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h27TK91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h27TK91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h27TK91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h27TK91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h27TK91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h27TK91.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4392-157-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-158-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-160-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-162-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-164-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-166-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-168-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-170-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-172-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-174-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-176-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-178-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-180-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-182-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-184-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-186-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-188-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-190-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-192-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-194-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-196-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-198-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-200-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-202-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-204-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-206-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-208-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-210-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-212-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-214-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-216-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-218-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/4392-220-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3100 niba6645.exe 1036 h27TK91.exe 4392 itBUL64.exe 3196 l63iu79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h27TK91.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba6645.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3568 4392 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1036 h27TK91.exe 1036 h27TK91.exe 4392 itBUL64.exe 4392 itBUL64.exe 3196 l63iu79.exe 3196 l63iu79.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1036 h27TK91.exe Token: SeDebugPrivilege 4392 itBUL64.exe Token: SeDebugPrivilege 3196 l63iu79.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3100 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 87 PID 4232 wrote to memory of 3100 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 87 PID 4232 wrote to memory of 3100 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 87 PID 3100 wrote to memory of 1036 3100 niba6645.exe 88 PID 3100 wrote to memory of 1036 3100 niba6645.exe 88 PID 3100 wrote to memory of 4392 3100 niba6645.exe 93 PID 3100 wrote to memory of 4392 3100 niba6645.exe 93 PID 3100 wrote to memory of 4392 3100 niba6645.exe 93 PID 4232 wrote to memory of 3196 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 100 PID 4232 wrote to memory of 3196 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 100 PID 4232 wrote to memory of 3196 4232 210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe"C:\Users\Admin\AppData\Local\Temp\210a97ab53cce242fd85047f5ede870826fe40dffedb4d30a18b52d39e9c1065.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h27TK91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h27TK91.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\itBUL64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\itBUL64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 13564⤵
- Program crash
PID:3568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63iu79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63iu79.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4392 -ip 43921⤵PID:2512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efc3b1703bec9a0e79d4a9fdcedf4a20
SHA1d019bfe5fbf05fde5cae0029f9580dca9677a3b2
SHA2561d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855
SHA512f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a
-
Filesize
175KB
MD5efc3b1703bec9a0e79d4a9fdcedf4a20
SHA1d019bfe5fbf05fde5cae0029f9580dca9677a3b2
SHA2561d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855
SHA512f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a
-
Filesize
410KB
MD5bef9611b04b593842bd083fdc3367e83
SHA10f8240dfb4a29a9d7d7b0bed07da271d91816ded
SHA256167b0fd56a9e84143c041b382701a9c7e25bee553681eb4e534c7e1ebcb6a447
SHA51291bc90bc74bbb298cbef9a92a77f26f17cbc2cb408127a8d88ed082c915486c6c5fa05c74e421027bb074b00fc07b8f37f2e4174657e2aa8112dd696b9731bcc
-
Filesize
410KB
MD5bef9611b04b593842bd083fdc3367e83
SHA10f8240dfb4a29a9d7d7b0bed07da271d91816ded
SHA256167b0fd56a9e84143c041b382701a9c7e25bee553681eb4e534c7e1ebcb6a447
SHA51291bc90bc74bbb298cbef9a92a77f26f17cbc2cb408127a8d88ed082c915486c6c5fa05c74e421027bb074b00fc07b8f37f2e4174657e2aa8112dd696b9731bcc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD52be94dc68a2377e35441e3a1c6ee22f8
SHA1b9c322f5aa5a5fe52ca37da333865840c26d6ca6
SHA256c6b868afc1d72f643159c8c8b1070ae1bc7d27bb2c6497f874b447e235945bb0
SHA5129723c20f73deb3a7e254489a61a7ee89d9c330dc1506f298a5ff5cc733a1ad71fe67eae63c67ccffc449ef4dc5bc936fa3e0806aa561650451559ef2bf00fdb8
-
Filesize
382KB
MD52be94dc68a2377e35441e3a1c6ee22f8
SHA1b9c322f5aa5a5fe52ca37da333865840c26d6ca6
SHA256c6b868afc1d72f643159c8c8b1070ae1bc7d27bb2c6497f874b447e235945bb0
SHA5129723c20f73deb3a7e254489a61a7ee89d9c330dc1506f298a5ff5cc733a1ad71fe67eae63c67ccffc449ef4dc5bc936fa3e0806aa561650451559ef2bf00fdb8