Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe
Resource
win10-20230220-en
General
-
Target
c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe
-
Size
837KB
-
MD5
a68f1c5610728a125b370b7cdc6ca8ca
-
SHA1
41d07292c9b1aaa3670f262a0467ee1bc1dc161a
-
SHA256
c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8
-
SHA512
c0ce8f37378570b57e2b26e183db03f701341d1f90a633bda264af8dee7be6ca26caccaacdfa7e7609c3acaa4719bac57870e377679fd2f51e2247b63ab4bb18
-
SSDEEP
12288:+MrGy901jx9iTTWw1cs1lKgBWDb1Y899ulTjtUX+aHtDTyWRFPYwY24Qh:Ay+d9iXWw15XKggOu9uFjtsDTyKF11h
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu8728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu8728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu8728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu8728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu8728.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3064-192-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/3064-193-0x0000000002630000-0x0000000002674000-memory.dmp family_redline behavioral1/memory/3064-194-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-195-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-197-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-199-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-201-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-203-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-205-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-207-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-211-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-215-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-217-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-219-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-221-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-223-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-225-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-227-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-229-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/3064-231-0x0000000002630000-0x000000000266E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1216 unio9234.exe 1472 unio3109.exe 1620 pro5147.exe 1772 qu8728.exe 3064 rUl02s54.exe 4972 si709182.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5147.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu8728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu8728.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9234.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio3109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio3109.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1620 pro5147.exe 1620 pro5147.exe 1772 qu8728.exe 1772 qu8728.exe 3064 rUl02s54.exe 3064 rUl02s54.exe 4972 si709182.exe 4972 si709182.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1620 pro5147.exe Token: SeDebugPrivilege 1772 qu8728.exe Token: SeDebugPrivilege 3064 rUl02s54.exe Token: SeDebugPrivilege 4972 si709182.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 780 wrote to memory of 1216 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 66 PID 780 wrote to memory of 1216 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 66 PID 780 wrote to memory of 1216 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 66 PID 1216 wrote to memory of 1472 1216 unio9234.exe 67 PID 1216 wrote to memory of 1472 1216 unio9234.exe 67 PID 1216 wrote to memory of 1472 1216 unio9234.exe 67 PID 1472 wrote to memory of 1620 1472 unio3109.exe 68 PID 1472 wrote to memory of 1620 1472 unio3109.exe 68 PID 1472 wrote to memory of 1772 1472 unio3109.exe 69 PID 1472 wrote to memory of 1772 1472 unio3109.exe 69 PID 1472 wrote to memory of 1772 1472 unio3109.exe 69 PID 1216 wrote to memory of 3064 1216 unio9234.exe 70 PID 1216 wrote to memory of 3064 1216 unio9234.exe 70 PID 1216 wrote to memory of 3064 1216 unio9234.exe 70 PID 780 wrote to memory of 4972 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 72 PID 780 wrote to memory of 4972 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 72 PID 780 wrote to memory of 4972 780 c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe"C:\Users\Admin\AppData\Local\Temp\c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
695KB
MD582c5fdfc224ca5985d8047e91070c35e
SHA1b9b5f7a3832c942d19686d62799bdf47d4c8031c
SHA2564d70debf3076e4bc7528a85f02398643d809142dc96ef46b0c3b332e1d2e3e96
SHA5120e43c5b252cf8ba5a6ae13f6461b55ed73085667aa324594eed649d7e6af3f68d175a45256539c0c3ff142ffe5787995d84f9731244797959d1d1b8df838290c
-
Filesize
695KB
MD582c5fdfc224ca5985d8047e91070c35e
SHA1b9b5f7a3832c942d19686d62799bdf47d4c8031c
SHA2564d70debf3076e4bc7528a85f02398643d809142dc96ef46b0c3b332e1d2e3e96
SHA5120e43c5b252cf8ba5a6ae13f6461b55ed73085667aa324594eed649d7e6af3f68d175a45256539c0c3ff142ffe5787995d84f9731244797959d1d1b8df838290c
-
Filesize
362KB
MD5bf9b71005ec032cdb9e8496f24f0fc53
SHA102ca268092c40794d77429ef2b9de7f19b1ac9d7
SHA256e018610c3722ee0532770bb38044a30b0981b059328165e3e3eb5417c226af30
SHA51239591d7bda9ba3731aa0bd33442c92f7457077b0ff5e8dc3be629b8d8c5efcaf73191df679ff19a21bff620e2112c6bd918542d779140db4d94fc58c64226cd6
-
Filesize
362KB
MD5bf9b71005ec032cdb9e8496f24f0fc53
SHA102ca268092c40794d77429ef2b9de7f19b1ac9d7
SHA256e018610c3722ee0532770bb38044a30b0981b059328165e3e3eb5417c226af30
SHA51239591d7bda9ba3731aa0bd33442c92f7457077b0ff5e8dc3be629b8d8c5efcaf73191df679ff19a21bff620e2112c6bd918542d779140db4d94fc58c64226cd6
-
Filesize
344KB
MD5af0151bfccbaefa297070d4eb700ea4b
SHA1062f2b6503929683bbd046eac9f9079e53f7d2dc
SHA2567b584fc2a06196819ef45f1698ea394af5f55e02cdf4c64dfb4689eac0f41a36
SHA51266b5665390401bdd8b941b6e6b2209e8a06d6197434410b642f1b68ebaef03586b5aa843f4f24af307cbe2e4317a33ec5b3a3792debb3953d132356ac2e07df3
-
Filesize
344KB
MD5af0151bfccbaefa297070d4eb700ea4b
SHA1062f2b6503929683bbd046eac9f9079e53f7d2dc
SHA2567b584fc2a06196819ef45f1698ea394af5f55e02cdf4c64dfb4689eac0f41a36
SHA51266b5665390401bdd8b941b6e6b2209e8a06d6197434410b642f1b68ebaef03586b5aa843f4f24af307cbe2e4317a33ec5b3a3792debb3953d132356ac2e07df3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
304KB
MD5eb66216c95f2ce7272ba1b92f535851b
SHA1d57ea15541313090686f2168c4ed5e1021cc3084
SHA256ff5c0f4e1045893ced59b80bc4898334488abcd5a1c32af6926ca9f50fd4b57c
SHA512dd653ec56479635efd016979c99223751e152ae99e790e84c3e2a3124b49ffb1ebbd8567953c96d1c2cec9ba45e84ce0a7d67a1634647934a01e83c7abd77ec5
-
Filesize
304KB
MD5eb66216c95f2ce7272ba1b92f535851b
SHA1d57ea15541313090686f2168c4ed5e1021cc3084
SHA256ff5c0f4e1045893ced59b80bc4898334488abcd5a1c32af6926ca9f50fd4b57c
SHA512dd653ec56479635efd016979c99223751e152ae99e790e84c3e2a3124b49ffb1ebbd8567953c96d1c2cec9ba45e84ce0a7d67a1634647934a01e83c7abd77ec5