Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-03-2023 17:29
Static task
static1
Behavioral task
behavioral1
Sample
78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe
Resource
win10-20230220-en
General
-
Target
78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe
-
Size
545KB
-
MD5
799b94c7eb6b0247fd94945a410e2f0a
-
SHA1
afa3bd9d6cd4cd92b34e20f71e9792e4a34a89d6
-
SHA256
78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00
-
SHA512
86cf857e588dee09d0a94ea8ea1a39b3eb9bbb3027cb590fbfa6275b02d1f65d96b30f85287bb09307266e8ffff84b6f253131be0aa6fc4aa24b065bc2087126
-
SSDEEP
12288:7MrKy90rkXVAU0WTEZERcwUFXsWtAisq9Bv2A:dyDVPgzBTtAwzv2A
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw11Qq09Tb23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw11Qq09Tb23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw11Qq09Tb23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw11Qq09Tb23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw11Qq09Tb23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/2592-139-0x0000000004820000-0x0000000004866000-memory.dmp family_redline behavioral1/memory/2592-141-0x0000000004CF0000-0x0000000004D34000-memory.dmp family_redline behavioral1/memory/2592-144-0x0000000007320000-0x0000000007330000-memory.dmp family_redline behavioral1/memory/2592-146-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-145-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-148-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-150-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-152-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-154-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-156-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-158-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-160-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-162-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-168-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-166-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-170-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-164-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-172-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-174-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-178-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-180-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-176-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-182-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-184-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-190-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-188-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/2592-186-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5052 vJk1158PR.exe 824 sw11Qq09Tb23.exe 2592 tkM57Er72.exe 2892 uug42MM41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw11Qq09Tb23.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vJk1158PR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vJk1158PR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 824 sw11Qq09Tb23.exe 824 sw11Qq09Tb23.exe 2592 tkM57Er72.exe 2592 tkM57Er72.exe 2892 uug42MM41.exe 2892 uug42MM41.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 824 sw11Qq09Tb23.exe Token: SeDebugPrivilege 2592 tkM57Er72.exe Token: SeDebugPrivilege 2892 uug42MM41.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1780 wrote to memory of 5052 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 66 PID 1780 wrote to memory of 5052 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 66 PID 1780 wrote to memory of 5052 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 66 PID 5052 wrote to memory of 824 5052 vJk1158PR.exe 67 PID 5052 wrote to memory of 824 5052 vJk1158PR.exe 67 PID 5052 wrote to memory of 2592 5052 vJk1158PR.exe 68 PID 5052 wrote to memory of 2592 5052 vJk1158PR.exe 68 PID 5052 wrote to memory of 2592 5052 vJk1158PR.exe 68 PID 1780 wrote to memory of 2892 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 70 PID 1780 wrote to memory of 2892 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 70 PID 1780 wrote to memory of 2892 1780 78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe"C:\Users\Admin\AppData\Local\Temp\78f2532416cdf8fa1880a04cfa6cdcc475b1a84525b02759dff5550cab182e00.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vJk1158PR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vJk1158PR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw11Qq09Tb23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw11Qq09Tb23.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkM57Er72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkM57Er72.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uug42MM41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uug42MM41.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59f219b5ac9731f5218d8e9fecbdfbf94
SHA12042e2480aa01116261d1c000934cd0afdb68564
SHA2565e1b0b4d2386297abe05a58b4d6289483e87ae8585d7c9c407f1dc5964fd04fb
SHA512f9814816b3b0aa44f800a0fab880c035f93a4c097543eca120f6ca07c00dee5ff6117570a686643eae8f6d8c3a71e11401eaf5f4b4ba94feccf165513fffa73e
-
Filesize
175KB
MD59f219b5ac9731f5218d8e9fecbdfbf94
SHA12042e2480aa01116261d1c000934cd0afdb68564
SHA2565e1b0b4d2386297abe05a58b4d6289483e87ae8585d7c9c407f1dc5964fd04fb
SHA512f9814816b3b0aa44f800a0fab880c035f93a4c097543eca120f6ca07c00dee5ff6117570a686643eae8f6d8c3a71e11401eaf5f4b4ba94feccf165513fffa73e
-
Filesize
401KB
MD53aa20ccc0dce19f7f412160c2eb3af20
SHA1121b7f4aff0e102f9b8d9d63d36a0a2175eb5e62
SHA256aefe56a35d5b9a839aa2409eaa5b3be35eefe1ed9cba6ba92db5cb4caf56844f
SHA5124a5b0e64b03a54d0a52021b58a4c2836f32c0713189bc9d5a7a0e6095bd156fe3ebd7fdf8a2a7ed5baca386fd04900e12469d9e0c7fa23081e34e0444d8b8d7a
-
Filesize
401KB
MD53aa20ccc0dce19f7f412160c2eb3af20
SHA1121b7f4aff0e102f9b8d9d63d36a0a2175eb5e62
SHA256aefe56a35d5b9a839aa2409eaa5b3be35eefe1ed9cba6ba92db5cb4caf56844f
SHA5124a5b0e64b03a54d0a52021b58a4c2836f32c0713189bc9d5a7a0e6095bd156fe3ebd7fdf8a2a7ed5baca386fd04900e12469d9e0c7fa23081e34e0444d8b8d7a
-
Filesize
17KB
MD57f8fdbe1239e7ea5d0859ddf3a8e7f81
SHA1892620725e606396f80c77a62b1de55f8eb3dc0c
SHA256fcdb7812d3065d46df850ad25064d76c8cb9063a4d52e759bbb40dcbd9d4ba71
SHA512b20fa8434d12f45282f40200f3069ba6fa50286a0c7ef12f0d1eceff2073383ed1feb687289ffebf8e6cd4d4acaa718f426e3d815965355661f54a2b1317e874
-
Filesize
17KB
MD57f8fdbe1239e7ea5d0859ddf3a8e7f81
SHA1892620725e606396f80c77a62b1de55f8eb3dc0c
SHA256fcdb7812d3065d46df850ad25064d76c8cb9063a4d52e759bbb40dcbd9d4ba71
SHA512b20fa8434d12f45282f40200f3069ba6fa50286a0c7ef12f0d1eceff2073383ed1feb687289ffebf8e6cd4d4acaa718f426e3d815965355661f54a2b1317e874
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256