Analysis
-
max time kernel
54s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-03-2023 10:32
Static task
static1
Behavioral task
behavioral1
Sample
585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe
Resource
win10-20230220-en
General
-
Target
585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe
-
Size
531KB
-
MD5
428f42d416de1cfa63f7458f9a566918
-
SHA1
df5c47efe67e6248af256bb7953eeb22428f0e9e
-
SHA256
585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622
-
SHA512
79b4fbbf40b93102c9727eca14d3cb54a6c3c87344b1032a2fbceeaf5072d4dc957c77884178e0313b336956b3945a250e0bcb33ba7f28c7f862eb523899cf5d
-
SSDEEP
12288:yMrsy90PEDZTVKzTrpab2IrCBokhpY39pUBf0A8HQu8t:eyjtVK9aCrOoY9ym8t
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw91iL12EV76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw91iL12EV76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw91iL12EV76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw91iL12EV76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw91iL12EV76.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/5116-136-0x0000000004B00000-0x0000000004B46000-memory.dmp family_redline behavioral1/memory/5116-140-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/5116-143-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-144-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-146-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-148-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-150-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-152-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-154-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-156-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-158-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-160-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-162-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-164-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-166-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-168-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-170-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-172-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-174-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-176-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-178-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-180-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-182-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-184-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-186-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-188-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-190-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-192-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-194-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-196-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-198-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-200-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-202-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-204-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-206-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/5116-1059-0x0000000004CB0000-0x0000000004CC0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3640 vkYR9629ep.exe 2368 sw91iL12EV76.exe 5116 tkSv86Lq63ap.exe 1776 upeQ59KE79gk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw91iL12EV76.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkYR9629ep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkYR9629ep.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2368 sw91iL12EV76.exe 2368 sw91iL12EV76.exe 5116 tkSv86Lq63ap.exe 5116 tkSv86Lq63ap.exe 1776 upeQ59KE79gk.exe 1776 upeQ59KE79gk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2368 sw91iL12EV76.exe Token: SeDebugPrivilege 5116 tkSv86Lq63ap.exe Token: SeDebugPrivilege 1776 upeQ59KE79gk.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3640 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 66 PID 4124 wrote to memory of 3640 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 66 PID 4124 wrote to memory of 3640 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 66 PID 3640 wrote to memory of 2368 3640 vkYR9629ep.exe 67 PID 3640 wrote to memory of 2368 3640 vkYR9629ep.exe 67 PID 3640 wrote to memory of 5116 3640 vkYR9629ep.exe 68 PID 3640 wrote to memory of 5116 3640 vkYR9629ep.exe 68 PID 3640 wrote to memory of 5116 3640 vkYR9629ep.exe 68 PID 4124 wrote to memory of 1776 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 70 PID 4124 wrote to memory of 1776 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 70 PID 4124 wrote to memory of 1776 4124 585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe"C:\Users\Admin\AppData\Local\Temp\585bf7eceb8f4d16be5e10f43eb9e38ddf85b1f53d373ac726fde588af094622.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkYR9629ep.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkYR9629ep.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw91iL12EV76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw91iL12EV76.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkSv86Lq63ap.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkSv86Lq63ap.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upeQ59KE79gk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upeQ59KE79gk.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
386KB
MD5164952f66b4a3f5c3895b5e75e6ece8f
SHA1ada1c9e852892be5e217a2e7ac952bf97b2004b1
SHA256b1a3e8b4e4cf1c7314cc35cb3fb043d4082575136a23e979eadc77797accbeef
SHA5122deb3094bcfd3f4cba44126a886c58efc4edc02b73dd3eee975fd13c9d3e8591fe7ca63f53133a0fd1275140ff36a8ec450206f608f4d5c6874715359c3efd66
-
Filesize
386KB
MD5164952f66b4a3f5c3895b5e75e6ece8f
SHA1ada1c9e852892be5e217a2e7ac952bf97b2004b1
SHA256b1a3e8b4e4cf1c7314cc35cb3fb043d4082575136a23e979eadc77797accbeef
SHA5122deb3094bcfd3f4cba44126a886c58efc4edc02b73dd3eee975fd13c9d3e8591fe7ca63f53133a0fd1275140ff36a8ec450206f608f4d5c6874715359c3efd66
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD55219e8f0103dcdc1edfc06a291fa3dc5
SHA1176526bf4ebef1bfcf7cf535ae8707739e8b94ef
SHA25679e9c0528a3deef77dc8e379e8d4d889ecabd5cf04e1d6756f92ca55c13f4a7d
SHA512445da5e0a94d36dd96da459d028d706ed5067f4b95f30708d44daeeea933f01f42999f51cd1a889a73173e43924b1957e8259834dd5327c3b0d7baf4b1edbbf6
-
Filesize
290KB
MD55219e8f0103dcdc1edfc06a291fa3dc5
SHA1176526bf4ebef1bfcf7cf535ae8707739e8b94ef
SHA25679e9c0528a3deef77dc8e379e8d4d889ecabd5cf04e1d6756f92ca55c13f4a7d
SHA512445da5e0a94d36dd96da459d028d706ed5067f4b95f30708d44daeeea933f01f42999f51cd1a889a73173e43924b1957e8259834dd5327c3b0d7baf4b1edbbf6