Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe
Resource
win10v2004-20230220-en
General
-
Target
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe
-
Size
535KB
-
MD5
5bea591f7d715e3f1ef60f92cb8898d4
-
SHA1
f5d6010e0ef2c8915958d22cfebc3435581fae8e
-
SHA256
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793
-
SHA512
cc7de593bc23e43b0ca9184ad3b6024a3dc159ce10fa7682d5a6f57004668027dc9f2af73f3b5bc57401db5260854b31f999cfd064e97f78dde88b9a5f703fda
-
SSDEEP
12288:rMrry90WgdnUB4DzErO8dAh0mGhTS2Bodl/eGgHZr:wyjgnUCz4hTUlRgHZr
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw45Qv92DL18.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
resource yara_rule behavioral1/memory/1056-83-0x0000000002220000-0x0000000002266000-memory.dmp family_redline behavioral1/memory/1056-84-0x0000000002260000-0x00000000022A4000-memory.dmp family_redline behavioral1/memory/1056-85-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-86-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-88-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-90-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-92-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-94-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-96-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-98-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-100-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-102-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-106-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-109-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-111-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-113-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-115-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-117-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-119-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-121-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-123-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-125-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-127-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-129-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-131-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-133-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-135-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-137-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-139-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-141-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-143-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-147-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-149-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-145-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-151-0x0000000002260000-0x000000000229E000-memory.dmp family_redline behavioral1/memory/1056-994-0x0000000002420000-0x0000000002460000-memory.dmp family_redline behavioral1/memory/1056-998-0x0000000002420000-0x0000000002460000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1256 vun5684nQ.exe 2044 sw45Qv92DL18.exe 1056 tij28xj13.exe -
Loads dropped DLL 6 IoCs
pid Process 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 1256 vun5684nQ.exe 1256 vun5684nQ.exe 1256 vun5684nQ.exe 1256 vun5684nQ.exe 1056 tij28xj13.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sw45Qv92DL18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw45Qv92DL18.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vun5684nQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vun5684nQ.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 sw45Qv92DL18.exe 2044 sw45Qv92DL18.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 sw45Qv92DL18.exe Token: SeDebugPrivilege 1056 tij28xj13.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1724 wrote to memory of 1256 1724 003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe 28 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 2044 1256 vun5684nQ.exe 29 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30 PID 1256 wrote to memory of 1056 1256 vun5684nQ.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe"C:\Users\Admin\AppData\Local\Temp\003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5bae8951c131acb4c4f760627e2627655
SHA1a0d4126321c8e98989ec2674546f788072ae9f1b
SHA25661668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2
SHA512d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6
-
Filesize
391KB
MD5bae8951c131acb4c4f760627e2627655
SHA1a0d4126321c8e98989ec2674546f788072ae9f1b
SHA25661668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2
SHA512d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6
-
Filesize
16KB
MD5f9211303ae5d3eb275fa0a86f9666a5d
SHA180793df568bba1b724ec45fe58bfc7640cb1ef48
SHA2561e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0
SHA5128763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008
-
Filesize
16KB
MD5f9211303ae5d3eb275fa0a86f9666a5d
SHA180793df568bba1b724ec45fe58bfc7640cb1ef48
SHA2561e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0
SHA5128763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
391KB
MD5bae8951c131acb4c4f760627e2627655
SHA1a0d4126321c8e98989ec2674546f788072ae9f1b
SHA25661668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2
SHA512d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6
-
Filesize
391KB
MD5bae8951c131acb4c4f760627e2627655
SHA1a0d4126321c8e98989ec2674546f788072ae9f1b
SHA25661668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2
SHA512d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6
-
Filesize
16KB
MD5f9211303ae5d3eb275fa0a86f9666a5d
SHA180793df568bba1b724ec45fe58bfc7640cb1ef48
SHA2561e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0
SHA5128763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8