Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2023, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe
Resource
win10v2004-20230220-en
General
-
Target
015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe
-
Size
1.1MB
-
MD5
9a5e0aa2e8e0ec4f393a866298d3f9fd
-
SHA1
77f78fae174855eb5026ccc2fc0198d81fb769ec
-
SHA256
015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862
-
SHA512
aed5b154d610c8fbb352017e40b820d5767a988b2befafed87f0ee1dd597183cae3b7298a97fcea2e179f1013943bc1ab9828286942835ea1ed48110520e1032
-
SSDEEP
24576:4yQi4UJAedLFS6BbC9l4cUqaMw87nU/XfL1CFOW/To0WsodnDiDkuGiy96BOq:/QBOSO+9O47nWho/To5nDimpw
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buxF63PS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buxF63PS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buxF63PS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buxF63PS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buxF63PS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buxF63PS07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/1840-177-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-178-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-180-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-182-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-184-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-186-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-188-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-190-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-192-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-194-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-196-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-198-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-200-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-202-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-204-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-206-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-208-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-210-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-212-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-214-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-216-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-218-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-220-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-222-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-224-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-226-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-228-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-230-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-232-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-234-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-236-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-238-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral2/memory/1840-240-0x0000000002820000-0x000000000285E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2496 plDP91BH70.exe 4940 plIp15Te47.exe 224 pldY28Zr13.exe 4244 plgF86mr58.exe 1492 buxF63PS07.exe 1840 caEr93yE47.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buxF63PS07.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce plDP91BH70.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pldY28Zr13.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce plgF86mr58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plgF86mr58.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plDP91BH70.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce plIp15Te47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plIp15Te47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pldY28Zr13.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1492 buxF63PS07.exe 1492 buxF63PS07.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 buxF63PS07.exe Token: SeDebugPrivilege 1840 caEr93yE47.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2496 1868 015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe 84 PID 1868 wrote to memory of 2496 1868 015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe 84 PID 1868 wrote to memory of 2496 1868 015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe 84 PID 2496 wrote to memory of 4940 2496 plDP91BH70.exe 85 PID 2496 wrote to memory of 4940 2496 plDP91BH70.exe 85 PID 2496 wrote to memory of 4940 2496 plDP91BH70.exe 85 PID 4940 wrote to memory of 224 4940 plIp15Te47.exe 86 PID 4940 wrote to memory of 224 4940 plIp15Te47.exe 86 PID 4940 wrote to memory of 224 4940 plIp15Te47.exe 86 PID 224 wrote to memory of 4244 224 pldY28Zr13.exe 87 PID 224 wrote to memory of 4244 224 pldY28Zr13.exe 87 PID 224 wrote to memory of 4244 224 pldY28Zr13.exe 87 PID 4244 wrote to memory of 1492 4244 plgF86mr58.exe 88 PID 4244 wrote to memory of 1492 4244 plgF86mr58.exe 88 PID 4244 wrote to memory of 1840 4244 plgF86mr58.exe 89 PID 4244 wrote to memory of 1840 4244 plgF86mr58.exe 89 PID 4244 wrote to memory of 1840 4244 plgF86mr58.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe"C:\Users\Admin\AppData\Local\Temp\015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD58ec63652f1dbf8c0f4a1b23a0af11321
SHA198cd91de3e0875f62723a75a8ba4832fdad3f0eb
SHA2566252ac83df204176c45ba10586da19e7172fa35128a4eea1a547da2ec9adcd30
SHA512b0c8a451946fa0c21c9fb80a7b498c8e0108f917bb981296ec0a892e62075831ecd88cc8538f28e67b4a35fbca3b208efea5e4472897295f840db1ff0e76cff5
-
Filesize
996KB
MD58ec63652f1dbf8c0f4a1b23a0af11321
SHA198cd91de3e0875f62723a75a8ba4832fdad3f0eb
SHA2566252ac83df204176c45ba10586da19e7172fa35128a4eea1a547da2ec9adcd30
SHA512b0c8a451946fa0c21c9fb80a7b498c8e0108f917bb981296ec0a892e62075831ecd88cc8538f28e67b4a35fbca3b208efea5e4472897295f840db1ff0e76cff5
-
Filesize
892KB
MD5a037a3cfc4d4268852f1d5cdd24e4e8d
SHA13817ddbd19a699e3fba4b592b5da7bf9b95680c4
SHA2566b9e8c6f657be030df6cbe622fbaae21c97433c66a31b2eb7bf6bbc89d90eb92
SHA512cb38d7f4532db5a1a7b3856b09f37e6f1511ebe54669126779d7eade72c50e5995eaf1538cfc42d211cd21e152654c8330c3a198c01e8b9a20f9b3d9dfc0e2cb
-
Filesize
892KB
MD5a037a3cfc4d4268852f1d5cdd24e4e8d
SHA13817ddbd19a699e3fba4b592b5da7bf9b95680c4
SHA2566b9e8c6f657be030df6cbe622fbaae21c97433c66a31b2eb7bf6bbc89d90eb92
SHA512cb38d7f4532db5a1a7b3856b09f37e6f1511ebe54669126779d7eade72c50e5995eaf1538cfc42d211cd21e152654c8330c3a198c01e8b9a20f9b3d9dfc0e2cb
-
Filesize
666KB
MD520dc8fcad8bc3931466829ac3562f31f
SHA13b1fec0e6f95b489d5d7f0cc48ef769289928caa
SHA25659d9e7e91a7719ac6009332cce33a15a9967d2330f5be0e06817c063f357ce47
SHA512cc5489f2751206b93416ef59aba52ed60edbce117290f964d55629395802c37dfb2395428c24ec4cff30f1243fe97c0dee7a20b61d5906c4d199ade44bbd2076
-
Filesize
666KB
MD520dc8fcad8bc3931466829ac3562f31f
SHA13b1fec0e6f95b489d5d7f0cc48ef769289928caa
SHA25659d9e7e91a7719ac6009332cce33a15a9967d2330f5be0e06817c063f357ce47
SHA512cc5489f2751206b93416ef59aba52ed60edbce117290f964d55629395802c37dfb2395428c24ec4cff30f1243fe97c0dee7a20b61d5906c4d199ade44bbd2076
-
Filesize
391KB
MD522cb0c5de08e41b10ecefafd8259f732
SHA1bedd961c4f777ea7666e85551adace58f898fbe9
SHA25660732770dc7149d1a21c0105c3c945a81a76b72b4949934d553f238e4d9dde6e
SHA51207f12e16833db21b1c269e69c1ddaafa0f66834b91666d7e026065143dde521abe07f8dd3090e28f1e64f621128ac78b8e5b435185445aa3a2a725a542321685
-
Filesize
391KB
MD522cb0c5de08e41b10ecefafd8259f732
SHA1bedd961c4f777ea7666e85551adace58f898fbe9
SHA25660732770dc7149d1a21c0105c3c945a81a76b72b4949934d553f238e4d9dde6e
SHA51207f12e16833db21b1c269e69c1ddaafa0f66834b91666d7e026065143dde521abe07f8dd3090e28f1e64f621128ac78b8e5b435185445aa3a2a725a542321685
-
Filesize
11KB
MD5da24b2706a7e8dd8ffbacde3b39d72f9
SHA11476442694f0798b17310bad3bff3416ae133436
SHA256887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a
SHA5125c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2
-
Filesize
11KB
MD5da24b2706a7e8dd8ffbacde3b39d72f9
SHA11476442694f0798b17310bad3bff3416ae133436
SHA256887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a
SHA5125c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2
-
Filesize
11KB
MD5da24b2706a7e8dd8ffbacde3b39d72f9
SHA11476442694f0798b17310bad3bff3416ae133436
SHA256887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a
SHA5125c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd