Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/03/2023, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe
Resource
win10-20230220-en
General
-
Target
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe
-
Size
818KB
-
MD5
83c4a8f98afee2372970c01c3b9d7a7b
-
SHA1
0e2c4b9828eaa162d41a7cf598eb1b51d7f376db
-
SHA256
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184
-
SHA512
b6c636af185cf0f2504725826fd408694771627b59b4918f098ff8eb47ff7050c9ab5133f9bcfc614c391b7bbaec9a6b15735e381a3f0c9bb9eba68647e3c9eb
-
SSDEEP
24576:JyCc+YsHrFMJeW/acXDD+z8UErkzkJve:8Cc9sHrqvacTDIF4
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu0128.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2812-189-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/2812-190-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/2812-191-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-192-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-194-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-196-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-198-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-205-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-200-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-208-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-210-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-212-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-214-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-216-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-218-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-220-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-222-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-224-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-226-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline behavioral1/memory/2812-228-0x0000000004E00000-0x0000000004E3E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2324 unio0136.exe 2416 unio5936.exe 2900 pro3542.exe 4280 qu0128.exe 2812 rQJ79s82.exe 3780 si852877.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu0128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3542.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0136.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5936.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio5936.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2900 pro3542.exe 2900 pro3542.exe 4280 qu0128.exe 4280 qu0128.exe 2812 rQJ79s82.exe 2812 rQJ79s82.exe 3780 si852877.exe 3780 si852877.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2900 pro3542.exe Token: SeDebugPrivilege 4280 qu0128.exe Token: SeDebugPrivilege 2812 rQJ79s82.exe Token: SeDebugPrivilege 3780 si852877.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 976 wrote to memory of 2324 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 66 PID 976 wrote to memory of 2324 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 66 PID 976 wrote to memory of 2324 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 66 PID 2324 wrote to memory of 2416 2324 unio0136.exe 67 PID 2324 wrote to memory of 2416 2324 unio0136.exe 67 PID 2324 wrote to memory of 2416 2324 unio0136.exe 67 PID 2416 wrote to memory of 2900 2416 unio5936.exe 68 PID 2416 wrote to memory of 2900 2416 unio5936.exe 68 PID 2416 wrote to memory of 4280 2416 unio5936.exe 69 PID 2416 wrote to memory of 4280 2416 unio5936.exe 69 PID 2416 wrote to memory of 4280 2416 unio5936.exe 69 PID 2324 wrote to memory of 2812 2324 unio0136.exe 70 PID 2324 wrote to memory of 2812 2324 unio0136.exe 70 PID 2324 wrote to memory of 2812 2324 unio0136.exe 70 PID 976 wrote to memory of 3780 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 72 PID 976 wrote to memory of 3780 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 72 PID 976 wrote to memory of 3780 976 1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe"C:\Users\Admin\AppData\Local\Temp\1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
676KB
MD5eb392cfa313dc707e30eff0fa320c63b
SHA1dcc88c9a0d74a7b981e03ea84fac2293ab14e38b
SHA2561ff3982f5acf48ef85dd4a13c3367496ef852c053c28e4137c71a8d0cc7126c7
SHA512c84740d0fa47a141cbc6a356730595ba2a695301df740f6e084b83b670a6ae8cb942e8306553e748ca55d6f6d622e4ab41c22cf3004dcf905a78fd15412ba0b8
-
Filesize
676KB
MD5eb392cfa313dc707e30eff0fa320c63b
SHA1dcc88c9a0d74a7b981e03ea84fac2293ab14e38b
SHA2561ff3982f5acf48ef85dd4a13c3367496ef852c053c28e4137c71a8d0cc7126c7
SHA512c84740d0fa47a141cbc6a356730595ba2a695301df740f6e084b83b670a6ae8cb942e8306553e748ca55d6f6d622e4ab41c22cf3004dcf905a78fd15412ba0b8
-
Filesize
349KB
MD543e8b0f0ad404a9a88b573cd0cfbf72f
SHA17ca602d4d58979f5edcfb0ad0ef8d7cac47fa4b7
SHA256bf2d464c14a756cdc94a3990802d8deb1049524c900f8dde858e4b61ec80e524
SHA5120f63650b1a8278359c8051c0c1e15f25b1e490a45a1de3ee69de7ed6ff271472c80f913343b61c65bc3b4be19035c09b9ffe898d0baddc454f91835f3a2acfab
-
Filesize
349KB
MD543e8b0f0ad404a9a88b573cd0cfbf72f
SHA17ca602d4d58979f5edcfb0ad0ef8d7cac47fa4b7
SHA256bf2d464c14a756cdc94a3990802d8deb1049524c900f8dde858e4b61ec80e524
SHA5120f63650b1a8278359c8051c0c1e15f25b1e490a45a1de3ee69de7ed6ff271472c80f913343b61c65bc3b4be19035c09b9ffe898d0baddc454f91835f3a2acfab
-
Filesize
334KB
MD5175201ea8a51f63179cb308f6184c93a
SHA1522006d5160220565097786b1e0e80a3cbe34bc9
SHA256d43685dc3879d11bbb249ef8dc2af1fd88fd51c8a441e53f834c6d8e0422db05
SHA51281da7325dfc87e5e8e6dc85dc6c13e1c97fa2619747b90940398d6966cd836bfadebbe25e54815e8d66186e7e69b1b71400c359e812866e5d47841ba31fcc4fe
-
Filesize
334KB
MD5175201ea8a51f63179cb308f6184c93a
SHA1522006d5160220565097786b1e0e80a3cbe34bc9
SHA256d43685dc3879d11bbb249ef8dc2af1fd88fd51c8a441e53f834c6d8e0422db05
SHA51281da7325dfc87e5e8e6dc85dc6c13e1c97fa2619747b90940398d6966cd836bfadebbe25e54815e8d66186e7e69b1b71400c359e812866e5d47841ba31fcc4fe
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD57cec95089acb17ba126aa7a431e53bd8
SHA187fe1ac093406a572871832dcb6de1104ae74800
SHA256ffca6b0eec7bec0e290bdb3847a26c87396e1f0e54373fe389f6ecd21372f543
SHA512706bb6a9651cbaafa89c55c8c60162764008e9bc4f6c9416a2730e5d6f8b2ccf422fdd059d111746f493aaa70cafbc06b911d143d12cecf1c2bfda439b09c3bb
-
Filesize
290KB
MD57cec95089acb17ba126aa7a431e53bd8
SHA187fe1ac093406a572871832dcb6de1104ae74800
SHA256ffca6b0eec7bec0e290bdb3847a26c87396e1f0e54373fe389f6ecd21372f543
SHA512706bb6a9651cbaafa89c55c8c60162764008e9bc4f6c9416a2730e5d6f8b2ccf422fdd059d111746f493aaa70cafbc06b911d143d12cecf1c2bfda439b09c3bb