Analysis
-
max time kernel
55s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe
Resource
win10-20230220-en
General
-
Target
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe
-
Size
544KB
-
MD5
d1ce70d9fd7231cff5eeb46e88baaafc
-
SHA1
39e95b84e2f54eb52a95425eae7ca8154441868b
-
SHA256
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4
-
SHA512
afadb88041f1b2287c6878db9cd8f80ecdcd93df4d0adc74172ddb0c930cc1da26539161e4a74d88e6e01f4bd7f402e45dc3d15da017161ab19493de82dd3dfb
-
SSDEEP
12288:JMrNy904G9Ia7HdRHAZjDabTud9uUsshR7n0KtUQBq8Gwpx:cyBBa7H/iDiTuDAsb02XGCx
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw82il23ya75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw82il23ya75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw82il23ya75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw82il23ya75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw82il23ya75.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/4104-138-0x0000000002330000-0x0000000002376000-memory.dmp family_redline behavioral1/memory/4104-140-0x0000000004BA0000-0x0000000004BE4000-memory.dmp family_redline behavioral1/memory/4104-141-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-142-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-144-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-146-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-148-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-150-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-152-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-154-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-156-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-159-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-160-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline behavioral1/memory/4104-165-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-162-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-167-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-169-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-171-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-173-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-175-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-177-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-179-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-181-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-183-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-185-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-187-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-189-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-191-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-193-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-195-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-197-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-199-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-201-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-203-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-205-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4104-207-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4044 vwz1091Kh.exe 4072 sw82il23ya75.exe 4104 tYn18xC40.exe 984 uVb17Ox83.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw82il23ya75.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vwz1091Kh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vwz1091Kh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4072 sw82il23ya75.exe 4072 sw82il23ya75.exe 4104 tYn18xC40.exe 4104 tYn18xC40.exe 984 uVb17Ox83.exe 984 uVb17Ox83.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4072 sw82il23ya75.exe Token: SeDebugPrivilege 4104 tYn18xC40.exe Token: SeDebugPrivilege 984 uVb17Ox83.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3236 wrote to memory of 4044 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 66 PID 3236 wrote to memory of 4044 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 66 PID 3236 wrote to memory of 4044 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 66 PID 4044 wrote to memory of 4072 4044 vwz1091Kh.exe 67 PID 4044 wrote to memory of 4072 4044 vwz1091Kh.exe 67 PID 4044 wrote to memory of 4104 4044 vwz1091Kh.exe 68 PID 4044 wrote to memory of 4104 4044 vwz1091Kh.exe 68 PID 4044 wrote to memory of 4104 4044 vwz1091Kh.exe 68 PID 3236 wrote to memory of 984 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 70 PID 3236 wrote to memory of 984 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 70 PID 3236 wrote to memory of 984 3236 24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe"C:\Users\Admin\AppData\Local\Temp\24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD590bcdb588c85a4a7a946e31bbfd9072b
SHA1f80e2eb41fe5df111cba0fed073442acacf50c2b
SHA2567bb0d420d3d6b1406f0a312a6c12f76d191c05c3c71ede2690c853a41ec1a6e2
SHA512dfdf9ab88ec04c05244a13eb6744cd869a47a8b034da93800c80f9a545d448c8ed3866d50612b9a3b484cd5516488e8fb4c2afad460932d1f948808ecc304607
-
Filesize
175KB
MD590bcdb588c85a4a7a946e31bbfd9072b
SHA1f80e2eb41fe5df111cba0fed073442acacf50c2b
SHA2567bb0d420d3d6b1406f0a312a6c12f76d191c05c3c71ede2690c853a41ec1a6e2
SHA512dfdf9ab88ec04c05244a13eb6744cd869a47a8b034da93800c80f9a545d448c8ed3866d50612b9a3b484cd5516488e8fb4c2afad460932d1f948808ecc304607
-
Filesize
399KB
MD5ec9b2c0848b3ef8ea2f0b3654d1b2003
SHA1a8b61e0f98a1d0b7ae13adc01f22dbb698193f4d
SHA25608ec417073e94a7e817a0b6412fa792841089cec1dafb723d5d679aa7daf2522
SHA512544b3a12ecc2a4145b4984e1714fa0ed5ad35361f6b1a1022f687848c297a2fd7fdec84ef6ae6cadfab90a24d56fd2d3e532ace76d32bfa011754c41f55e6608
-
Filesize
399KB
MD5ec9b2c0848b3ef8ea2f0b3654d1b2003
SHA1a8b61e0f98a1d0b7ae13adc01f22dbb698193f4d
SHA25608ec417073e94a7e817a0b6412fa792841089cec1dafb723d5d679aa7daf2522
SHA512544b3a12ecc2a4145b4984e1714fa0ed5ad35361f6b1a1022f687848c297a2fd7fdec84ef6ae6cadfab90a24d56fd2d3e532ace76d32bfa011754c41f55e6608
-
Filesize
17KB
MD5d88cdefae327de8bfe30a58525250d66
SHA19a25f05267dd47e1be72367f52c1751814a59a97
SHA25607f1a0f0280d93d9116487c061c2ea35831ea4d3d1ce0aa35a1f5004c352be8f
SHA51288d3d906d98f30bd7bef830440692662d8ad5b339b664d51c1827227409575c55ea20064a92571d2ae9a461629cd60aed3f90a9a51a375a26b0c8c57b69e0927
-
Filesize
17KB
MD5d88cdefae327de8bfe30a58525250d66
SHA19a25f05267dd47e1be72367f52c1751814a59a97
SHA25607f1a0f0280d93d9116487c061c2ea35831ea4d3d1ce0aa35a1f5004c352be8f
SHA51288d3d906d98f30bd7bef830440692662d8ad5b339b664d51c1827227409575c55ea20064a92571d2ae9a461629cd60aed3f90a9a51a375a26b0c8c57b69e0927
-
Filesize
308KB
MD59deb98e21d80840ff993f7170b1340c6
SHA1c079fb7d92f9c5937beabfb214e395d44857b547
SHA2560e322b46c3f8f35ba9c4ee94971e715a813122f2ada84754e3da7789f995e2cc
SHA512f975d294bccd1627c3845fe3ce49f94244805d3c06abac0a390c0d4263de71d89d14502bd97a6ba7a848bacc4571f18d879bf02f70044e312732a8548d0acaf4
-
Filesize
308KB
MD59deb98e21d80840ff993f7170b1340c6
SHA1c079fb7d92f9c5937beabfb214e395d44857b547
SHA2560e322b46c3f8f35ba9c4ee94971e715a813122f2ada84754e3da7789f995e2cc
SHA512f975d294bccd1627c3845fe3ce49f94244805d3c06abac0a390c0d4263de71d89d14502bd97a6ba7a848bacc4571f18d879bf02f70044e312732a8548d0acaf4