Analysis
-
max time kernel
55s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-03-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe
Resource
win10-20230220-en
General
-
Target
bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe
-
Size
550KB
-
MD5
30303e76320135ca94980ed3b25b8649
-
SHA1
57358799da5bec7fca6da58c5b144b10da41d40b
-
SHA256
bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4
-
SHA512
8e5996d7133f8acd9e5d130be7561f6f23f375b55ddedccdef0fe54ca27dc1c7096c3c3b34377f28745a191bedc60ebe97f1383c118f1d58da960fc2ebc9a5c2
-
SSDEEP
12288:aMriy90tyFIKCYEoohV8bZkkMUYorrFWCfow:oyAyFzJohV8bZkYFBJ
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw55ac70oA55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw55ac70oA55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw55ac70oA55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw55ac70oA55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw55ac70oA55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4596-139-0x0000000004850000-0x0000000004896000-memory.dmp family_redline behavioral1/memory/4596-141-0x00000000049F0000-0x0000000004A34000-memory.dmp family_redline behavioral1/memory/4596-146-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-147-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-149-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-151-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-153-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-155-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-157-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-159-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-161-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-163-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-165-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-167-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-169-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-171-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-173-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-177-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-175-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-179-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-181-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-183-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-185-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-187-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-189-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-191-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-193-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-195-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-197-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-199-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-201-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-203-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-205-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-207-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/4596-209-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 384 vrf7570nc.exe 4504 sw55ac70oA55.exe 4596 tdc92xM63.exe 3984 ujS18Hs86.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw55ac70oA55.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vrf7570nc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vrf7570nc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 sw55ac70oA55.exe 4504 sw55ac70oA55.exe 4596 tdc92xM63.exe 4596 tdc92xM63.exe 3984 ujS18Hs86.exe 3984 ujS18Hs86.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 sw55ac70oA55.exe Token: SeDebugPrivilege 4596 tdc92xM63.exe Token: SeDebugPrivilege 3984 ujS18Hs86.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4108 wrote to memory of 384 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 66 PID 4108 wrote to memory of 384 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 66 PID 4108 wrote to memory of 384 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 66 PID 384 wrote to memory of 4504 384 vrf7570nc.exe 67 PID 384 wrote to memory of 4504 384 vrf7570nc.exe 67 PID 384 wrote to memory of 4596 384 vrf7570nc.exe 68 PID 384 wrote to memory of 4596 384 vrf7570nc.exe 68 PID 384 wrote to memory of 4596 384 vrf7570nc.exe 68 PID 4108 wrote to memory of 3984 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 70 PID 4108 wrote to memory of 3984 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 70 PID 4108 wrote to memory of 3984 4108 bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe"C:\Users\Admin\AppData\Local\Temp\bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ca19cb3837f4d92d86c9efa527f0d874
SHA1e9cf1e02b4b17730a39f384f1fcb85d2f0ce6141
SHA25635a3313ecfd863df221ccb69aba7d57ea0049377bf22ab581e77af08e90a830e
SHA512a4f09601d2be02b2e13322f6f4451cc59128ee6ee0831b4fa343120a60df1fa534cbe2ea8b4a9eef5a583f86c6a60b388ea4b93709cf8fe54bda6484f9932c9b
-
Filesize
175KB
MD5ca19cb3837f4d92d86c9efa527f0d874
SHA1e9cf1e02b4b17730a39f384f1fcb85d2f0ce6141
SHA25635a3313ecfd863df221ccb69aba7d57ea0049377bf22ab581e77af08e90a830e
SHA512a4f09601d2be02b2e13322f6f4451cc59128ee6ee0831b4fa343120a60df1fa534cbe2ea8b4a9eef5a583f86c6a60b388ea4b93709cf8fe54bda6484f9932c9b
-
Filesize
405KB
MD55f0b25212d0249f16bcddf9e8f233fa3
SHA1f9eafe171f090981a7c7a7f27e7d2006f48030d3
SHA2560d63e052c4961688814974424ff498c31d11854df48f1c3fe852e6fcd84c2416
SHA5129a2a7ad7a517605be05cbca32a1336deb18d5fe0e43f8b5c0b9dc506c05b61cb6dac9293eedf85cd17ae0b290d31aaeeaff258fddb34243aafabf9b46272d0bb
-
Filesize
405KB
MD55f0b25212d0249f16bcddf9e8f233fa3
SHA1f9eafe171f090981a7c7a7f27e7d2006f48030d3
SHA2560d63e052c4961688814974424ff498c31d11854df48f1c3fe852e6fcd84c2416
SHA5129a2a7ad7a517605be05cbca32a1336deb18d5fe0e43f8b5c0b9dc506c05b61cb6dac9293eedf85cd17ae0b290d31aaeeaff258fddb34243aafabf9b46272d0bb
-
Filesize
17KB
MD5ff5c4c55540eb4ce089299117cf18012
SHA18f61636b387d113af068642b518bb532a4df250c
SHA2566759f2991e0c7121ca87c144ad098f93986bfe3f13defb03b0b242d3255126b7
SHA51294e66b424ad7544f99d7f4dc4a028d3fffd3b5b07074cc670b536ba863f6c502b8ba5a35f471a23c3151bed0f20057351fe0de8aac57a7dd1202ac55008cdc07
-
Filesize
17KB
MD5ff5c4c55540eb4ce089299117cf18012
SHA18f61636b387d113af068642b518bb532a4df250c
SHA2566759f2991e0c7121ca87c144ad098f93986bfe3f13defb03b0b242d3255126b7
SHA51294e66b424ad7544f99d7f4dc4a028d3fffd3b5b07074cc670b536ba863f6c502b8ba5a35f471a23c3151bed0f20057351fe0de8aac57a7dd1202ac55008cdc07
-
Filesize
387KB
MD5114729e73998f8b36384a7c4cadcf3b0
SHA1aca4ea52bbd204fa016311eb5e1f6ef9770f2362
SHA256dbeeca1aaeaa247cb4a672c8741e578a235817831a080ce894a08d71a1bbb7fa
SHA5124044a648270d77f84c822346d483fa32a39c24b3088a874a4d9e53584ed228e1a67c4c10654eb20209dc48339308d65c5c8bde33f26eb6e5d0741f354f24cc44
-
Filesize
387KB
MD5114729e73998f8b36384a7c4cadcf3b0
SHA1aca4ea52bbd204fa016311eb5e1f6ef9770f2362
SHA256dbeeca1aaeaa247cb4a672c8741e578a235817831a080ce894a08d71a1bbb7fa
SHA5124044a648270d77f84c822346d483fa32a39c24b3088a874a4d9e53584ed228e1a67c4c10654eb20209dc48339308d65c5c8bde33f26eb6e5d0741f354f24cc44