Analysis
-
max time kernel
57s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe
Resource
win10-20230220-en
General
-
Target
d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe
-
Size
908KB
-
MD5
9fc6e4e8b032a1a310736dc8ab628588
-
SHA1
6083e31142f694bba34484cbf55beb58461144f9
-
SHA256
d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d
-
SHA512
87e24ee5ca76063125c1f2723a4fe49cbd7abd09798df96420885fb49e04336c2c1186642f9f216ca0d787fcb30451c6e6eaadc84f8e119579e38e5ac5618467
-
SSDEEP
12288:sMr9y90oUw/O/8hJl+15u3cMCoygNMeFRc4ZhCXAQlwkDhMy/DWHp2jPr/VCXsuq:hyTUwGIu1ecMCoLZhEAHIPpCXfa
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu0950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu0950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu0950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu0950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu0950.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4728-187-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/4728-189-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/4728-192-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-193-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-195-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-197-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-199-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-201-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-203-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-205-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-207-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-209-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-211-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-213-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-215-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-217-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-219-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-221-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-223-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-225-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4728-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4968 unio9699.exe 2068 unio5432.exe 1756 pro2463.exe 3888 qu0950.exe 4728 rUZ02s22.exe 3144 si467040.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2463.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu0950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu0950.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio5432.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9699.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1756 pro2463.exe 1756 pro2463.exe 3888 qu0950.exe 3888 qu0950.exe 4728 rUZ02s22.exe 4728 rUZ02s22.exe 3144 si467040.exe 3144 si467040.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1756 pro2463.exe Token: SeDebugPrivilege 3888 qu0950.exe Token: SeDebugPrivilege 4728 rUZ02s22.exe Token: SeDebugPrivilege 3144 si467040.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4968 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 66 PID 4672 wrote to memory of 4968 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 66 PID 4672 wrote to memory of 4968 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 66 PID 4968 wrote to memory of 2068 4968 unio9699.exe 67 PID 4968 wrote to memory of 2068 4968 unio9699.exe 67 PID 4968 wrote to memory of 2068 4968 unio9699.exe 67 PID 2068 wrote to memory of 1756 2068 unio5432.exe 68 PID 2068 wrote to memory of 1756 2068 unio5432.exe 68 PID 2068 wrote to memory of 3888 2068 unio5432.exe 69 PID 2068 wrote to memory of 3888 2068 unio5432.exe 69 PID 2068 wrote to memory of 3888 2068 unio5432.exe 69 PID 4968 wrote to memory of 4728 4968 unio9699.exe 70 PID 4968 wrote to memory of 4728 4968 unio9699.exe 70 PID 4968 wrote to memory of 4728 4968 unio9699.exe 70 PID 4672 wrote to memory of 3144 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 72 PID 4672 wrote to memory of 3144 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 72 PID 4672 wrote to memory of 3144 4672 d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe"C:\Users\Admin\AppData\Local\Temp\d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
765KB
MD5ffafc95afe49b4f18ab2138db795a869
SHA16ef123ed6a3ed85c49c0030127d92ace5edbfb2b
SHA256da5ed656590d42139ce70f325ffb6fdbf77f5b462bcbdcb18a76899538b25646
SHA5126f4b5fd7f7be8a11a893df81c51ea0a6f2bee20d5d9c6643e4db6b80e19783f66ef1761e1f8cdc92d8cc4171fbcad9d338348caa7f2d83284e44b67609fbd633
-
Filesize
765KB
MD5ffafc95afe49b4f18ab2138db795a869
SHA16ef123ed6a3ed85c49c0030127d92ace5edbfb2b
SHA256da5ed656590d42139ce70f325ffb6fdbf77f5b462bcbdcb18a76899538b25646
SHA5126f4b5fd7f7be8a11a893df81c51ea0a6f2bee20d5d9c6643e4db6b80e19783f66ef1761e1f8cdc92d8cc4171fbcad9d338348caa7f2d83284e44b67609fbd633
-
Filesize
457KB
MD54f43fbcacf2d5c3fe50991e6ed5da8ac
SHA1ded8439f5c5599b560bc0f8b1c5c11d72d51fa44
SHA256c20009df7cb3a0027a6ee6edf83237167f2410318c3d189143b8fd01137a61b2
SHA512e9a356c5c1e33144c009987f83d128a8e36e494f47de096451b2c60a7f0bb2adc1a658c461b7abb46eae3c60d9b65a6dfabcd17e92004fa62a31e505a67dcebc
-
Filesize
457KB
MD54f43fbcacf2d5c3fe50991e6ed5da8ac
SHA1ded8439f5c5599b560bc0f8b1c5c11d72d51fa44
SHA256c20009df7cb3a0027a6ee6edf83237167f2410318c3d189143b8fd01137a61b2
SHA512e9a356c5c1e33144c009987f83d128a8e36e494f47de096451b2c60a7f0bb2adc1a658c461b7abb46eae3c60d9b65a6dfabcd17e92004fa62a31e505a67dcebc
-
Filesize
379KB
MD538a79753add600ecb3afddcb6bd07d0a
SHA12f32ea7af0ccfbfa40488a4679faf425f4c48938
SHA25648d74af72761ecb3fa063b42844ac33d684edfdd076ff2711af6adcc7753b449
SHA512abe71dfb780410f2b16021a4d6ce3f171dfa50fd0a3a0f4049fb5d338e1cba594c5ff72c80c3819a22cf51da24e46ea09f936cb0faec4198e0cf599ecfbfdf6b
-
Filesize
379KB
MD538a79753add600ecb3afddcb6bd07d0a
SHA12f32ea7af0ccfbfa40488a4679faf425f4c48938
SHA25648d74af72761ecb3fa063b42844ac33d684edfdd076ff2711af6adcc7753b449
SHA512abe71dfb780410f2b16021a4d6ce3f171dfa50fd0a3a0f4049fb5d338e1cba594c5ff72c80c3819a22cf51da24e46ea09f936cb0faec4198e0cf599ecfbfdf6b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD50040635bde51379fd874e53ea10fafb0
SHA1065f5471ddf19c4411acc8359aa3d35fd730be9e
SHA2562684c7a0269d7d80bf2cb040faed36f5c43ff9c83bbb15021c51791e672692bc
SHA51282ed766d48cf0f19f4c87f7c18ab45a909e703cb1e9c0b792397cb5dc4d8c701b980c35a75b19f17c114433d9492a6ad1cc29eb866d760727f70bc70ca773d70
-
Filesize
399KB
MD50040635bde51379fd874e53ea10fafb0
SHA1065f5471ddf19c4411acc8359aa3d35fd730be9e
SHA2562684c7a0269d7d80bf2cb040faed36f5c43ff9c83bbb15021c51791e672692bc
SHA51282ed766d48cf0f19f4c87f7c18ab45a909e703cb1e9c0b792397cb5dc4d8c701b980c35a75b19f17c114433d9492a6ad1cc29eb866d760727f70bc70ca773d70