Analysis
-
max time kernel
53s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-03-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe
Resource
win10-20230220-en
General
-
Target
8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe
-
Size
545KB
-
MD5
b95e1c267494500dd59b3ec940b7a20e
-
SHA1
5fb8abf7feff5af9551a2142c4a53d041c6c314d
-
SHA256
8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848
-
SHA512
e1e2ef6c0717c9c15c54e8f596badb06537be231391e2ca2f8a59b5c02a449afa559d3ba99f699398ad656530225d901f493740d6c9f928a71eae38745a1dcb7
-
SSDEEP
12288:ZMrgy90E4flZC37orkQffklz2RIz/FXvWt21Gf3hw4:RyJGXrpdqZut21Ge4
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw79mp39bj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw79mp39bj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw79mp39bj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw79mp39bj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw79mp39bj71.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
resource yara_rule behavioral1/memory/2144-137-0x0000000004C70000-0x0000000004CB6000-memory.dmp family_redline behavioral1/memory/2144-139-0x0000000004E30000-0x0000000004E74000-memory.dmp family_redline behavioral1/memory/2144-140-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-141-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-143-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-145-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-147-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-149-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-151-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-153-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-155-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-157-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-159-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-161-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-163-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-165-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-167-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-169-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-171-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-174-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-180-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-178-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-182-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-184-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-186-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-188-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-190-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-192-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-194-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-196-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-198-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-200-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-202-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-204-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-206-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/2144-1058-0x0000000007400000-0x0000000007410000-memory.dmp family_redline behavioral1/memory/2144-1059-0x0000000007400000-0x0000000007410000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4436 vSX8824vZ.exe 4864 sw79mp39bj71.exe 2144 tAu42ye78.exe 4324 usC87NH39.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw79mp39bj71.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vSX8824vZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vSX8824vZ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4864 sw79mp39bj71.exe 4864 sw79mp39bj71.exe 2144 tAu42ye78.exe 2144 tAu42ye78.exe 4324 usC87NH39.exe 4324 usC87NH39.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4864 sw79mp39bj71.exe Token: SeDebugPrivilege 2144 tAu42ye78.exe Token: SeDebugPrivilege 4324 usC87NH39.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2568 wrote to memory of 4436 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 66 PID 2568 wrote to memory of 4436 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 66 PID 2568 wrote to memory of 4436 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 66 PID 4436 wrote to memory of 4864 4436 vSX8824vZ.exe 67 PID 4436 wrote to memory of 4864 4436 vSX8824vZ.exe 67 PID 4436 wrote to memory of 2144 4436 vSX8824vZ.exe 68 PID 4436 wrote to memory of 2144 4436 vSX8824vZ.exe 68 PID 4436 wrote to memory of 2144 4436 vSX8824vZ.exe 68 PID 2568 wrote to memory of 4324 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 70 PID 2568 wrote to memory of 4324 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 70 PID 2568 wrote to memory of 4324 2568 8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe"C:\Users\Admin\AppData\Local\Temp\8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5239bab56a39e11389163a311574fcb83
SHA1e438df7d2b956c2bb0fd72d0b7b7c93b8f1d7741
SHA256ee0a55cad662117b73bf560a668727a4417ca610890ca244a3d19a36d731f2c4
SHA51285f535c073fe5d1e97d338109d5f49289b1a403f2bcdf38757cbd123e3ce125d31952d5cbe5fe61c418ca03dfc8147acea362d788cd28738591c9a68a4dbda78
-
Filesize
175KB
MD5239bab56a39e11389163a311574fcb83
SHA1e438df7d2b956c2bb0fd72d0b7b7c93b8f1d7741
SHA256ee0a55cad662117b73bf560a668727a4417ca610890ca244a3d19a36d731f2c4
SHA51285f535c073fe5d1e97d338109d5f49289b1a403f2bcdf38757cbd123e3ce125d31952d5cbe5fe61c418ca03dfc8147acea362d788cd28738591c9a68a4dbda78
-
Filesize
401KB
MD537bbcf67e2e0ae02c3b4ff65de37d38d
SHA1eedd1b3b14458ce31a4b34c9e333e65d70d6ba58
SHA2567f100349094915e06b4d5cad5ac80970f27dff184e12a32bae252a8000a3a37f
SHA512b25cb24dc4c3b872d05885240128833ff7586619e2af0f579a1732d349006a88047b2e1791abbe557462e81deeb3e5280a50642fd7d14cc93e0c4ae3e2cd09cc
-
Filesize
401KB
MD537bbcf67e2e0ae02c3b4ff65de37d38d
SHA1eedd1b3b14458ce31a4b34c9e333e65d70d6ba58
SHA2567f100349094915e06b4d5cad5ac80970f27dff184e12a32bae252a8000a3a37f
SHA512b25cb24dc4c3b872d05885240128833ff7586619e2af0f579a1732d349006a88047b2e1791abbe557462e81deeb3e5280a50642fd7d14cc93e0c4ae3e2cd09cc
-
Filesize
17KB
MD5aa94bd7dc613cb7e41acc7d4227966f8
SHA1c9203b6606b1040b93a1d13ad1bfe0da1fa2c798
SHA256e33f988c081977e02b0d054d91cf4187fc2772f6ac01abeef1bf6b5a8ddd8e2d
SHA512fb2d7c5d6ccfb8f0b8adb1e4725f6f2ca8265cb98fe54ac4fed7b7786c2afadedd50ee7790c65e89eeb534e10fd3a9f4316600cd0cf4d5e4441bc0f7e0ac5365
-
Filesize
17KB
MD5aa94bd7dc613cb7e41acc7d4227966f8
SHA1c9203b6606b1040b93a1d13ad1bfe0da1fa2c798
SHA256e33f988c081977e02b0d054d91cf4187fc2772f6ac01abeef1bf6b5a8ddd8e2d
SHA512fb2d7c5d6ccfb8f0b8adb1e4725f6f2ca8265cb98fe54ac4fed7b7786c2afadedd50ee7790c65e89eeb534e10fd3a9f4316600cd0cf4d5e4441bc0f7e0ac5365
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256