Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe
Resource
win10-20230220-en
General
-
Target
5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe
-
Size
907KB
-
MD5
d5daa26bed6d8719845de005d58cbe67
-
SHA1
3917160d9c20f742b84e1d0fca24e1e446183211
-
SHA256
5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4
-
SHA512
4a91a1d0daacb61ca16975dbe54aea357061ed07b667694f82578514e70388618efb252743917543c60a1433a17db94b8b123054efe11a152034e21a30c029c7
-
SSDEEP
24576:aylD+/UnmbxuazTJZu1AcFH3GIcoWZ5ET+wj:h5cUnC/ZuGAH3HcR0
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu5033.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1092-190-0x0000000002470000-0x00000000024B6000-memory.dmp family_redline behavioral1/memory/1092-191-0x0000000002640000-0x0000000002684000-memory.dmp family_redline behavioral1/memory/1092-192-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-193-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-195-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-197-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-199-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-201-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-205-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-209-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-211-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-213-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-215-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-219-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-221-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-217-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-225-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-223-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-227-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-229-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1092-1111-0x0000000002440000-0x0000000002450000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1492 unio0750.exe 1784 unio2043.exe 1072 pro9110.exe 2120 qu5033.exe 1092 rYZ47s59.exe 4888 si596775.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu5033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9110.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0750.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio2043.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1072 pro9110.exe 1072 pro9110.exe 2120 qu5033.exe 2120 qu5033.exe 1092 rYZ47s59.exe 1092 rYZ47s59.exe 4888 si596775.exe 4888 si596775.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1072 pro9110.exe Token: SeDebugPrivilege 2120 qu5033.exe Token: SeDebugPrivilege 1092 rYZ47s59.exe Token: SeDebugPrivilege 4888 si596775.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1492 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 66 PID 1224 wrote to memory of 1492 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 66 PID 1224 wrote to memory of 1492 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 66 PID 1492 wrote to memory of 1784 1492 unio0750.exe 67 PID 1492 wrote to memory of 1784 1492 unio0750.exe 67 PID 1492 wrote to memory of 1784 1492 unio0750.exe 67 PID 1784 wrote to memory of 1072 1784 unio2043.exe 68 PID 1784 wrote to memory of 1072 1784 unio2043.exe 68 PID 1784 wrote to memory of 2120 1784 unio2043.exe 69 PID 1784 wrote to memory of 2120 1784 unio2043.exe 69 PID 1784 wrote to memory of 2120 1784 unio2043.exe 69 PID 1492 wrote to memory of 1092 1492 unio0750.exe 70 PID 1492 wrote to memory of 1092 1492 unio0750.exe 70 PID 1492 wrote to memory of 1092 1492 unio0750.exe 70 PID 1224 wrote to memory of 4888 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 72 PID 1224 wrote to memory of 4888 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 72 PID 1224 wrote to memory of 4888 1224 5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe"C:\Users\Admin\AppData\Local\Temp\5ef77c06b7bd4f05615cd889b329cf1635b14db038124b3ccbe3cfbaa78e20a4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0750.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio2043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio2043.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9110.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9110.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5033.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5033.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rYZ47s59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rYZ47s59.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596775.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
764KB
MD5184c85bdd4f2d46990d4b465eb9763c5
SHA17bb1f0b1b68b2f83ef5613be9fdb9c469bad5536
SHA256ef104e93cfb24d43606d0cbd8921162bc0c51681bcb53c51b99361416cd353ec
SHA512e291b5c507fc79fa197bd69ed0df68e96578da6ce197be6929da2e0d2b5b650eb53fc925654ad189286e2bb32a38f8dad5dd334072063d46974127aea9e3d340
-
Filesize
764KB
MD5184c85bdd4f2d46990d4b465eb9763c5
SHA17bb1f0b1b68b2f83ef5613be9fdb9c469bad5536
SHA256ef104e93cfb24d43606d0cbd8921162bc0c51681bcb53c51b99361416cd353ec
SHA512e291b5c507fc79fa197bd69ed0df68e96578da6ce197be6929da2e0d2b5b650eb53fc925654ad189286e2bb32a38f8dad5dd334072063d46974127aea9e3d340
-
Filesize
456KB
MD549ba1250afcc4846aed1dfb693f106bb
SHA1e36c717f1beba568cad3f42a2470f77529d0b491
SHA256827a7770c0866208a99005c669628d2b6888d88ce65e35df755bf141cb156f12
SHA512d77a001d905c357dd9e45a80034104f8068ef9f8a45eee5b7354bff100b3102c2e8fa6b9d951ca0f514a3e6294ad901a1fbbc476ce9dd2139254e5c6c3841385
-
Filesize
456KB
MD549ba1250afcc4846aed1dfb693f106bb
SHA1e36c717f1beba568cad3f42a2470f77529d0b491
SHA256827a7770c0866208a99005c669628d2b6888d88ce65e35df755bf141cb156f12
SHA512d77a001d905c357dd9e45a80034104f8068ef9f8a45eee5b7354bff100b3102c2e8fa6b9d951ca0f514a3e6294ad901a1fbbc476ce9dd2139254e5c6c3841385
-
Filesize
378KB
MD515ec0b7a256c3abdde43efe83f6989bc
SHA125db5bfc61d87d0cab5c083d2a988fc5972e79d5
SHA256b440cf75c22bd23e8146adb59afe71038b381bbd4140d60e2fddb900d91474fa
SHA512ef45fd847526ed7434d97704770e53e26412a150d73bd369d2f2dc156a797fa2071e2f5557a6c522297be1ec3cbc6437aee878ec6f6767d9adb187801b804db1
-
Filesize
378KB
MD515ec0b7a256c3abdde43efe83f6989bc
SHA125db5bfc61d87d0cab5c083d2a988fc5972e79d5
SHA256b440cf75c22bd23e8146adb59afe71038b381bbd4140d60e2fddb900d91474fa
SHA512ef45fd847526ed7434d97704770e53e26412a150d73bd369d2f2dc156a797fa2071e2f5557a6c522297be1ec3cbc6437aee878ec6f6767d9adb187801b804db1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD5348fafb2f56f51afd760087cee04603b
SHA15824f41b4ee42fec6f6c434c0f03769fb14aa4e4
SHA25673f501f9cf0dbc992e827a1e8e1579a61359cd4e6c86f9771e74c52456e5da3e
SHA5128ac70123f37fb603bac8fc87d8197b11bf22363f99d34c98257c2ace1ca8b11791dd65a5bd3a07254145796ba727daab2976e07a20d32e5d954e611ae02a4adf
-
Filesize
399KB
MD5348fafb2f56f51afd760087cee04603b
SHA15824f41b4ee42fec6f6c434c0f03769fb14aa4e4
SHA25673f501f9cf0dbc992e827a1e8e1579a61359cd4e6c86f9771e74c52456e5da3e
SHA5128ac70123f37fb603bac8fc87d8197b11bf22363f99d34c98257c2ace1ca8b11791dd65a5bd3a07254145796ba727daab2976e07a20d32e5d954e611ae02a4adf