Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe
Resource
win10v2004-20230220-en
General
-
Target
9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe
-
Size
1.0MB
-
MD5
ec9e0148e6c9a44e656ec996dfcefbb6
-
SHA1
83c82851798fc6ddb7dfa34d81c763fa8ed0159f
-
SHA256
9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430
-
SHA512
db920d3565fd102380fb31a91c634f123fdcdb36fa3c684270d3e0944c3bdfc6ee64dd0cf06a50122c9f1797ccfdcdc063bf2c7b666ba2a3680e73f2cf0c06b2
-
SSDEEP
24576:ryfpxdGir6/KQDiBd6F9hOJFGWTNTF2CkTyTqYtXJn:exx8/HmBYHhOJoWZFcTy9t
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4221005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4221005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4221005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4221005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4221005.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g4221005.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3464-218-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-219-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-221-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-223-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-225-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-227-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-231-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-233-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-235-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-237-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-239-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-241-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-243-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-245-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-247-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-249-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-251-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline behavioral1/memory/3464-253-0x0000000004F70000-0x0000000004FAC000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 4400 x7820403.exe 676 x8388931.exe 2760 f4886090.exe 4036 g4221005.exe 2824 h0155383.exe 2940 h0155383.exe 2612 h0155383.exe 3464 i3779172.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g4221005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g4221005.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7820403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7820403.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8388931.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8388931.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 2612 2824 h0155383.exe 95 -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 2612 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2760 f4886090.exe 2760 f4886090.exe 4036 g4221005.exe 4036 g4221005.exe 3464 i3779172.exe 3464 i3779172.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2760 f4886090.exe Token: SeDebugPrivilege 4036 g4221005.exe Token: SeDebugPrivilege 2824 h0155383.exe Token: SeDebugPrivilege 3464 i3779172.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2612 h0155383.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4400 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 83 PID 4356 wrote to memory of 4400 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 83 PID 4356 wrote to memory of 4400 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 83 PID 4400 wrote to memory of 676 4400 x7820403.exe 84 PID 4400 wrote to memory of 676 4400 x7820403.exe 84 PID 4400 wrote to memory of 676 4400 x7820403.exe 84 PID 676 wrote to memory of 2760 676 x8388931.exe 85 PID 676 wrote to memory of 2760 676 x8388931.exe 85 PID 676 wrote to memory of 2760 676 x8388931.exe 85 PID 676 wrote to memory of 4036 676 x8388931.exe 90 PID 676 wrote to memory of 4036 676 x8388931.exe 90 PID 676 wrote to memory of 4036 676 x8388931.exe 90 PID 4400 wrote to memory of 2824 4400 x7820403.exe 93 PID 4400 wrote to memory of 2824 4400 x7820403.exe 93 PID 4400 wrote to memory of 2824 4400 x7820403.exe 93 PID 2824 wrote to memory of 2940 2824 h0155383.exe 94 PID 2824 wrote to memory of 2940 2824 h0155383.exe 94 PID 2824 wrote to memory of 2940 2824 h0155383.exe 94 PID 2824 wrote to memory of 2940 2824 h0155383.exe 94 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 2824 wrote to memory of 2612 2824 h0155383.exe 95 PID 4356 wrote to memory of 3464 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 98 PID 4356 wrote to memory of 3464 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 98 PID 4356 wrote to memory of 3464 4356 9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe"C:\Users\Admin\AppData\Local\Temp\9f73a9fb85f0356c737f62da44442f6aade1514da8b16bba89b1099c95b04430.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7820403.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7820403.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8388931.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8388931.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4886090.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4886090.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4221005.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4221005.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exe4⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0155383.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 125⤵
- Program crash
PID:4536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3779172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3779172.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2612 -ip 26121⤵PID:3788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5f3a91bd35ee05fa3c638305fbd22c502
SHA1642626f640e2b25971177598b03d9a16d93a8057
SHA25606ae32d7bae4948e6c98f974545a4f567f4330309e999049287dd3520bb8521b
SHA5124ec01f4241db41ac60a9e6fb1d65122e09ee59349223f62116a8121c3fec5c089e9f47fc2126caf4c7b6aac7a54466944c060f7dafd3e4b594560612492733a9
-
Filesize
284KB
MD5f3a91bd35ee05fa3c638305fbd22c502
SHA1642626f640e2b25971177598b03d9a16d93a8057
SHA25606ae32d7bae4948e6c98f974545a4f567f4330309e999049287dd3520bb8521b
SHA5124ec01f4241db41ac60a9e6fb1d65122e09ee59349223f62116a8121c3fec5c089e9f47fc2126caf4c7b6aac7a54466944c060f7dafd3e4b594560612492733a9
-
Filesize
750KB
MD5fe1718bbf0b426e430a3e98056259b53
SHA1b75f6a66924b8db5384f85744c645ad6a8a15c39
SHA256d7faadf8af3c9ad3b69d74e49bbb9bf28b7c9c4a103c490b56e5142f41a821a1
SHA5127b4ea438fd333e5f3efb1240cafb7a4d48b6f3d091da174d3c5e58e5362c9ce873a55a246424fc61200fd31244dad035d13125478dfdbe230f479aa97750b96f
-
Filesize
750KB
MD5fe1718bbf0b426e430a3e98056259b53
SHA1b75f6a66924b8db5384f85744c645ad6a8a15c39
SHA256d7faadf8af3c9ad3b69d74e49bbb9bf28b7c9c4a103c490b56e5142f41a821a1
SHA5127b4ea438fd333e5f3efb1240cafb7a4d48b6f3d091da174d3c5e58e5362c9ce873a55a246424fc61200fd31244dad035d13125478dfdbe230f479aa97750b96f
-
Filesize
964KB
MD5d5e9d9234eacb653272a798e42f9081d
SHA18b5c504887e1ae789ed392f0764d7cf194ecf6c4
SHA2569d2871880bce9477acd963d57c49a91fd98bdf39752204814834327947bf5200
SHA5120b66916017efa2a865c10fa89a23c28f60c6f9d344334701222d1ac43cf1904b3edf7970b4479c42ffd4bd5947e36aab1114b12f23b0479267012cd46f48d789
-
Filesize
964KB
MD5d5e9d9234eacb653272a798e42f9081d
SHA18b5c504887e1ae789ed392f0764d7cf194ecf6c4
SHA2569d2871880bce9477acd963d57c49a91fd98bdf39752204814834327947bf5200
SHA5120b66916017efa2a865c10fa89a23c28f60c6f9d344334701222d1ac43cf1904b3edf7970b4479c42ffd4bd5947e36aab1114b12f23b0479267012cd46f48d789
-
Filesize
964KB
MD5d5e9d9234eacb653272a798e42f9081d
SHA18b5c504887e1ae789ed392f0764d7cf194ecf6c4
SHA2569d2871880bce9477acd963d57c49a91fd98bdf39752204814834327947bf5200
SHA5120b66916017efa2a865c10fa89a23c28f60c6f9d344334701222d1ac43cf1904b3edf7970b4479c42ffd4bd5947e36aab1114b12f23b0479267012cd46f48d789
-
Filesize
964KB
MD5d5e9d9234eacb653272a798e42f9081d
SHA18b5c504887e1ae789ed392f0764d7cf194ecf6c4
SHA2569d2871880bce9477acd963d57c49a91fd98bdf39752204814834327947bf5200
SHA5120b66916017efa2a865c10fa89a23c28f60c6f9d344334701222d1ac43cf1904b3edf7970b4479c42ffd4bd5947e36aab1114b12f23b0479267012cd46f48d789
-
Filesize
306KB
MD5855a60bebc7db9276150d308ac117e06
SHA1b27c09452c68b94368fe47094cabf7f1bc9ebefc
SHA256e5a2633f4f54e6b23e163c2ba093b839825fb31ff4f78f4023999365ef5be902
SHA5129513070178ebb34e9ad417896934d1a3fe198a0fda512feb9c53a7c342759f2a4a42a5e8de4b0c92a886e104bf0806e52a40b1d3bf6f99ec126a53ff85a926ce
-
Filesize
306KB
MD5855a60bebc7db9276150d308ac117e06
SHA1b27c09452c68b94368fe47094cabf7f1bc9ebefc
SHA256e5a2633f4f54e6b23e163c2ba093b839825fb31ff4f78f4023999365ef5be902
SHA5129513070178ebb34e9ad417896934d1a3fe198a0fda512feb9c53a7c342759f2a4a42a5e8de4b0c92a886e104bf0806e52a40b1d3bf6f99ec126a53ff85a926ce
-
Filesize
145KB
MD5cced350b0a37c8c971c128a14254f1cd
SHA16d2cb17d7b5688957cb679aac25ad8f96690aec9
SHA256a65fa7d932d3c87657f08a8188f2f46c97cbf4298a6c88c5f2727880ad2d2e50
SHA51277f29bf13f5407baa571c76dd0ab5d30211a9d8e2407f85493bf26c88fbf0a9c9e5dd74ddd2310c5af373f3f742b8ba7e11c92cea1331ecbbe0667e5b37c466e
-
Filesize
145KB
MD5cced350b0a37c8c971c128a14254f1cd
SHA16d2cb17d7b5688957cb679aac25ad8f96690aec9
SHA256a65fa7d932d3c87657f08a8188f2f46c97cbf4298a6c88c5f2727880ad2d2e50
SHA51277f29bf13f5407baa571c76dd0ab5d30211a9d8e2407f85493bf26c88fbf0a9c9e5dd74ddd2310c5af373f3f742b8ba7e11c92cea1331ecbbe0667e5b37c466e
-
Filesize
184KB
MD53fd7fc36dfca861c707a496d4f3155cd
SHA1d70f1abf882a7cbb02f3ec18c8264a58b2e556ba
SHA2563ad63168ccb6fac97eac63990f76798d60a1e35b7995bc9b255ad762c05df946
SHA51253783edf47b10139b9b44bd9ecf526c71429d5d0310a69dfa6ca0fcc5a01cb78595f48d425ffdee7649a79c47175f0d8ff79d958865cf9fcaa4b071159574ab8
-
Filesize
184KB
MD53fd7fc36dfca861c707a496d4f3155cd
SHA1d70f1abf882a7cbb02f3ec18c8264a58b2e556ba
SHA2563ad63168ccb6fac97eac63990f76798d60a1e35b7995bc9b255ad762c05df946
SHA51253783edf47b10139b9b44bd9ecf526c71429d5d0310a69dfa6ca0fcc5a01cb78595f48d425ffdee7649a79c47175f0d8ff79d958865cf9fcaa4b071159574ab8