Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe
Resource
win10-20230220-en
General
-
Target
0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe
-
Size
908KB
-
MD5
4cf914a08c2b997981cbf48c09ecca1a
-
SHA1
02ae8d2f526de4ec8de960d01a578c768a595152
-
SHA256
0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb
-
SHA512
562c42c03ad1c81f1b07d9870f1a92696158bcadc4fcda7d331532ff26d3bd71957e2564bc8ef78e812d3211c484da0284c28064aa1cf44e13edc5ef2fda2c44
-
SSDEEP
24576:kyu9/k5tERYeBq6QnprkEm11C7j1yHrIwlx:zuNsEZzJ184
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4934.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1976-186-0x0000000002350000-0x0000000002396000-memory.dmp family_redline behavioral1/memory/1976-187-0x0000000002540000-0x0000000002584000-memory.dmp family_redline behavioral1/memory/1976-189-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-188-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-192-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-196-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-199-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-201-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-203-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-205-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-207-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-209-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-211-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-213-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-215-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-217-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-219-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-221-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-223-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1976-225-0x0000000002540000-0x000000000257E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3528 unio5288.exe 1600 unio7422.exe 4376 pro4934.exe 4388 qu5923.exe 1976 rWJ68s29.exe 3520 si542526.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4934.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu5923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu5923.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio7422.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio7422.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5288.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4376 pro4934.exe 4376 pro4934.exe 4388 qu5923.exe 4388 qu5923.exe 1976 rWJ68s29.exe 1976 rWJ68s29.exe 3520 si542526.exe 3520 si542526.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4376 pro4934.exe Token: SeDebugPrivilege 4388 qu5923.exe Token: SeDebugPrivilege 1976 rWJ68s29.exe Token: SeDebugPrivilege 3520 si542526.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4224 wrote to memory of 3528 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 66 PID 4224 wrote to memory of 3528 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 66 PID 4224 wrote to memory of 3528 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 66 PID 3528 wrote to memory of 1600 3528 unio5288.exe 67 PID 3528 wrote to memory of 1600 3528 unio5288.exe 67 PID 3528 wrote to memory of 1600 3528 unio5288.exe 67 PID 1600 wrote to memory of 4376 1600 unio7422.exe 68 PID 1600 wrote to memory of 4376 1600 unio7422.exe 68 PID 1600 wrote to memory of 4388 1600 unio7422.exe 69 PID 1600 wrote to memory of 4388 1600 unio7422.exe 69 PID 1600 wrote to memory of 4388 1600 unio7422.exe 69 PID 3528 wrote to memory of 1976 3528 unio5288.exe 70 PID 3528 wrote to memory of 1976 3528 unio5288.exe 70 PID 3528 wrote to memory of 1976 3528 unio5288.exe 70 PID 4224 wrote to memory of 3520 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 72 PID 4224 wrote to memory of 3520 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 72 PID 4224 wrote to memory of 3520 4224 0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe"C:\Users\Admin\AppData\Local\Temp\0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
765KB
MD5b333133b3670f8d256d1e73b1cf5a9d4
SHA1d4fa31c593a88567560a54e819d623327bffdecd
SHA2567aa094ab5b1ab197151ea65fcd739c4cbcf7919d5d7da4eb5d85dd037f2abe1f
SHA5127858a1f70802442d2ab7b804b062b12d5218c668fdec8366d3913d2fc918a9cb5ca1227961e0cd5c1b51e0f933e9d1f2336593d47284f5445a4b303901eb068f
-
Filesize
765KB
MD5b333133b3670f8d256d1e73b1cf5a9d4
SHA1d4fa31c593a88567560a54e819d623327bffdecd
SHA2567aa094ab5b1ab197151ea65fcd739c4cbcf7919d5d7da4eb5d85dd037f2abe1f
SHA5127858a1f70802442d2ab7b804b062b12d5218c668fdec8366d3913d2fc918a9cb5ca1227961e0cd5c1b51e0f933e9d1f2336593d47284f5445a4b303901eb068f
-
Filesize
457KB
MD5c95516cffaedd477695fda93372e5516
SHA16318d5b0e9ac25c5802548c6e8bd4bb671c0e969
SHA25676772979c090bf4bb58c40fc36d412c8ace51cc15bc8ce9a04abc38604da1de6
SHA51227c60e282719f5878384a2d5f1f2fcae2fe750d33dfb4e942b4fd24fd3554103f511dbd1a7f78c3ea58db0889a697fac49c4f6323f48d5adf3777fcc1f8cde2f
-
Filesize
457KB
MD5c95516cffaedd477695fda93372e5516
SHA16318d5b0e9ac25c5802548c6e8bd4bb671c0e969
SHA25676772979c090bf4bb58c40fc36d412c8ace51cc15bc8ce9a04abc38604da1de6
SHA51227c60e282719f5878384a2d5f1f2fcae2fe750d33dfb4e942b4fd24fd3554103f511dbd1a7f78c3ea58db0889a697fac49c4f6323f48d5adf3777fcc1f8cde2f
-
Filesize
379KB
MD54e13d1ddcb8557289a215ad4aaaba201
SHA1414fa7561a12399057864682e9dff39f6ce283e6
SHA256af764fa6b1d9ed7733a64dc1cd481054b1f453df7fad6233f55af5120a9eadb1
SHA5129ddc029aa79944ff0b8dcb2c1f8e80de2a678e06019b56bb64ea01f1fe6e5911b2957577e14f447726bd457f285fd360b849eee33708836804bbd8da9fcc992e
-
Filesize
379KB
MD54e13d1ddcb8557289a215ad4aaaba201
SHA1414fa7561a12399057864682e9dff39f6ce283e6
SHA256af764fa6b1d9ed7733a64dc1cd481054b1f453df7fad6233f55af5120a9eadb1
SHA5129ddc029aa79944ff0b8dcb2c1f8e80de2a678e06019b56bb64ea01f1fe6e5911b2957577e14f447726bd457f285fd360b849eee33708836804bbd8da9fcc992e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD583a9ba94b6db3597599b081c546111dc
SHA11aa9f1601a775d4fd98b08479bc13075d2f432dc
SHA2563fead7ceb3d0877c87412e7477355168eea8e9f5f23bafce60d0b4f5b29081ca
SHA512480e71ca80c048dc73077d65af2ab64e9d7c55e07443a023eac3bb15c5699482e045bc8b8e75f017667987a3948e839153447d7ddbcf1f31d93ef2b056101deb
-
Filesize
399KB
MD583a9ba94b6db3597599b081c546111dc
SHA11aa9f1601a775d4fd98b08479bc13075d2f432dc
SHA2563fead7ceb3d0877c87412e7477355168eea8e9f5f23bafce60d0b4f5b29081ca
SHA512480e71ca80c048dc73077d65af2ab64e9d7c55e07443a023eac3bb15c5699482e045bc8b8e75f017667987a3948e839153447d7ddbcf1f31d93ef2b056101deb