Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 11:10
Static task
static1
Behavioral task
behavioral1
Sample
multiplayer988.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
multiplayer988.exe
Resource
win10v2004-20230220-en
General
-
Target
multiplayer988.exe
-
Size
1.0MB
-
MD5
315f455c892122aa2aa693c31fe70ea9
-
SHA1
01dedd5203b42a936c18a23dc958e3827fecf83c
-
SHA256
56a8fa1ce1e8e5c1f121ac2993a7f5bfb60037bae39e7704b4264ace30e3197b
-
SHA512
1d20b76e27d08403d9e29319198c5805552f6d4664f028d1b2c84a680760b9bb825fbc4f3a8a3d79e97d455bed63fc2aa40818ed52ede5bcb8e5f62d5787d311
-
SSDEEP
24576:BySuPaSD+ubcrknzq5tCbuzvvYjBoUtWrwbTwqd1ld:0SaD+ubcAzq7CbuDgArOTwqL
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2083461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2083461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2083461.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2083461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2083461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2083461.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral2/memory/4024-216-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-219-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-217-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-221-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-223-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-225-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-227-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-229-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-231-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-233-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-235-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-237-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-239-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-246-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-248-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-243-0x00000000049E0000-0x00000000049F0000-memory.dmp family_redline behavioral2/memory/4024-252-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-250-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-242-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/4024-1129-0x00000000049E0000-0x00000000049F0000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 64 v1173339.exe 1764 v3977882.exe 3348 a2083461.exe 1096 b6359010.exe 4876 c6735405.exe 4748 c6735405.exe 4024 d9340755.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2083461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2083461.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce multiplayer988.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" multiplayer988.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1173339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1173339.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3977882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3977882.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4876 set thread context of 4748 4876 c6735405.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 3344 4748 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3348 a2083461.exe 3348 a2083461.exe 1096 b6359010.exe 1096 b6359010.exe 4024 d9340755.exe 4024 d9340755.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3348 a2083461.exe Token: SeDebugPrivilege 1096 b6359010.exe Token: SeDebugPrivilege 4876 c6735405.exe Token: SeDebugPrivilege 4024 d9340755.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4748 c6735405.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3716 wrote to memory of 64 3716 multiplayer988.exe 82 PID 3716 wrote to memory of 64 3716 multiplayer988.exe 82 PID 3716 wrote to memory of 64 3716 multiplayer988.exe 82 PID 64 wrote to memory of 1764 64 v1173339.exe 83 PID 64 wrote to memory of 1764 64 v1173339.exe 83 PID 64 wrote to memory of 1764 64 v1173339.exe 83 PID 1764 wrote to memory of 3348 1764 v3977882.exe 84 PID 1764 wrote to memory of 3348 1764 v3977882.exe 84 PID 1764 wrote to memory of 3348 1764 v3977882.exe 84 PID 1764 wrote to memory of 1096 1764 v3977882.exe 88 PID 1764 wrote to memory of 1096 1764 v3977882.exe 88 PID 1764 wrote to memory of 1096 1764 v3977882.exe 88 PID 64 wrote to memory of 4876 64 v1173339.exe 90 PID 64 wrote to memory of 4876 64 v1173339.exe 90 PID 64 wrote to memory of 4876 64 v1173339.exe 90 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 4876 wrote to memory of 4748 4876 c6735405.exe 91 PID 3716 wrote to memory of 4024 3716 multiplayer988.exe 93 PID 3716 wrote to memory of 4024 3716 multiplayer988.exe 93 PID 3716 wrote to memory of 4024 3716 multiplayer988.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\multiplayer988.exe"C:\Users\Admin\AppData\Local\Temp\multiplayer988.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1173339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1173339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3977882.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3977882.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2083461.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2083461.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6359010.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6359010.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6735405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6735405.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6735405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6735405.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 125⤵
- Program crash
PID:3344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9340755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9340755.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4748 -ip 47481⤵PID:4540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5ba8b1bb0619301eb128ddbcf49ecc506
SHA11ad7d3c35adbbabb6e123a00b9896db84106c5ac
SHA2563025322ccc5f19e110f63918fe67ad95d9352f0cedb9f25f10b4c6606f623f50
SHA512f52737afd4cfa9125e4c930db0ae97f01a9d0db8601dc7982cacdc926ac6f82ef8f890176bbdb8c6a01a78bc4ba138ce5f0faf00d00cf450a9bd5538e808b290
-
Filesize
285KB
MD5ba8b1bb0619301eb128ddbcf49ecc506
SHA11ad7d3c35adbbabb6e123a00b9896db84106c5ac
SHA2563025322ccc5f19e110f63918fe67ad95d9352f0cedb9f25f10b4c6606f623f50
SHA512f52737afd4cfa9125e4c930db0ae97f01a9d0db8601dc7982cacdc926ac6f82ef8f890176bbdb8c6a01a78bc4ba138ce5f0faf00d00cf450a9bd5538e808b290
-
Filesize
751KB
MD58d503490e3bcb80d383aab0005b3381a
SHA198db7b2d741d5d6e34bc93e8e873fcc67f5333a7
SHA256c9093b6b8796e4f19d32d4ecfd94fba362aadb30695968868c365a1ca45e2692
SHA5125e8228e0786c27a81144c59755fa5dffe3646a2a8e5c2582417a7e6fe08cf8b480f22f168efb9dffc2d30183d52b4e1aeccc8a1bed4acb050452d224bc45ef5f
-
Filesize
751KB
MD58d503490e3bcb80d383aab0005b3381a
SHA198db7b2d741d5d6e34bc93e8e873fcc67f5333a7
SHA256c9093b6b8796e4f19d32d4ecfd94fba362aadb30695968868c365a1ca45e2692
SHA5125e8228e0786c27a81144c59755fa5dffe3646a2a8e5c2582417a7e6fe08cf8b480f22f168efb9dffc2d30183d52b4e1aeccc8a1bed4acb050452d224bc45ef5f
-
Filesize
965KB
MD5e590c27576f20e94647f60f7447aa3e5
SHA14cd0b14383a338f4dd971702b001e2e004d9dd26
SHA256284f36d8ecf8c9fec7817fdee069a9f6b2adaa0578303978be4be5280a5d024f
SHA51274b2a70031c8320b5fe6097b2a4965ef51d18d21304762059f157cda0bfce469ebeab5b2d2218943eefe0ae3a28a1c91bcb7814515e4381c46d19a0398bf514a
-
Filesize
965KB
MD5e590c27576f20e94647f60f7447aa3e5
SHA14cd0b14383a338f4dd971702b001e2e004d9dd26
SHA256284f36d8ecf8c9fec7817fdee069a9f6b2adaa0578303978be4be5280a5d024f
SHA51274b2a70031c8320b5fe6097b2a4965ef51d18d21304762059f157cda0bfce469ebeab5b2d2218943eefe0ae3a28a1c91bcb7814515e4381c46d19a0398bf514a
-
Filesize
965KB
MD5e590c27576f20e94647f60f7447aa3e5
SHA14cd0b14383a338f4dd971702b001e2e004d9dd26
SHA256284f36d8ecf8c9fec7817fdee069a9f6b2adaa0578303978be4be5280a5d024f
SHA51274b2a70031c8320b5fe6097b2a4965ef51d18d21304762059f157cda0bfce469ebeab5b2d2218943eefe0ae3a28a1c91bcb7814515e4381c46d19a0398bf514a
-
Filesize
306KB
MD5883adb26ed481e6c2984497cb879d813
SHA12744282c02784c28fb76254db080a292d8e4e4a0
SHA256a32fa63e11fdf292ed80f3fc15d402b6e238cc343ea59474c4faf55a155e4b5c
SHA51290f0b35460654b4987643a5d231142513158cd9214fb7502c2eca8ee7268a14ef65f0547a71194f2f14c72a7c98494ec2206feaaf05eebf80babbe3c13172bae
-
Filesize
306KB
MD5883adb26ed481e6c2984497cb879d813
SHA12744282c02784c28fb76254db080a292d8e4e4a0
SHA256a32fa63e11fdf292ed80f3fc15d402b6e238cc343ea59474c4faf55a155e4b5c
SHA51290f0b35460654b4987643a5d231142513158cd9214fb7502c2eca8ee7268a14ef65f0547a71194f2f14c72a7c98494ec2206feaaf05eebf80babbe3c13172bae
-
Filesize
185KB
MD5534c272992d038a7418f373b1e220b6c
SHA175ce953853c9b46769b1c6c2632bc8189e88131b
SHA256dfafea8db91cc7754c15618c5136de899ee5eba23b1a727162f601b5ca1f6d85
SHA51204a8ab00da46dfd20badb80de4422b056d574e00bb5ee2b603cb9ceb286bae9052ab9c8b77c08502e9217bc404e9fbdbeb1101888298a1cde7dceec2bf6852fc
-
Filesize
185KB
MD5534c272992d038a7418f373b1e220b6c
SHA175ce953853c9b46769b1c6c2632bc8189e88131b
SHA256dfafea8db91cc7754c15618c5136de899ee5eba23b1a727162f601b5ca1f6d85
SHA51204a8ab00da46dfd20badb80de4422b056d574e00bb5ee2b603cb9ceb286bae9052ab9c8b77c08502e9217bc404e9fbdbeb1101888298a1cde7dceec2bf6852fc
-
Filesize
145KB
MD5667f724fbb32c0110eea87f3783f368b
SHA1426f1605071a058715a49b0375f3f2ea3e18463e
SHA256600738c8f4cb207a8ed348bd4eeccaeecd6c2441bdfc616a964119e3ca8693c5
SHA512841d0cbcfcb7ecdcaf9f82faf39903468ad348844e905e4c56a4d69539bb550ab011c1ef475b59b4594ff35dbce90731afb4dd5fde4cfac424ead9a9aacf1ef9
-
Filesize
145KB
MD5667f724fbb32c0110eea87f3783f368b
SHA1426f1605071a058715a49b0375f3f2ea3e18463e
SHA256600738c8f4cb207a8ed348bd4eeccaeecd6c2441bdfc616a964119e3ca8693c5
SHA512841d0cbcfcb7ecdcaf9f82faf39903468ad348844e905e4c56a4d69539bb550ab011c1ef475b59b4594ff35dbce90731afb4dd5fde4cfac424ead9a9aacf1ef9