Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe
Resource
win10-20230220-en
General
-
Target
16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe
-
Size
544KB
-
MD5
59c1e6dd319d42885adc6f81e3aa825d
-
SHA1
1d9eb69566478d0318f6826f8f9eeed70177f309
-
SHA256
16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52
-
SHA512
4719298c5d2ac97b786030ff631b6c9cc6763927b3d9d81d574b7681c2d3bf8c80785449298bdebbfe264b7432c1d2f1e061594dd2af35e5cca3ad2b04e6741e
-
SSDEEP
12288:1Mrgy90ce7PW0uHxREwN3J+Gfo0OL2UqgUjMLQwIuVLTRq22XVt:tyqRubEwN34ZTeMUhuRVj2v
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Signatures
-
Processes:
pro3898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5100-136-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/5100-138-0x0000000004CB0000-0x0000000004CF4000-memory.dmp family_redline behavioral1/memory/5100-143-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-144-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-146-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-148-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-150-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-152-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-154-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-156-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-158-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-160-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-162-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-164-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-166-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-168-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-170-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-172-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-174-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-176-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-178-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-180-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-182-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-184-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-186-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-188-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-190-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-192-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-194-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-196-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-200-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-198-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-202-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-204-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/5100-206-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio4920.exepro3898.exequ1689.exesi541766.exepid process 3720 unio4920.exe 4736 pro3898.exe 5100 qu1689.exe 1888 si541766.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3898.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
unio4920.exe16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4920.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4920.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3898.exequ1689.exesi541766.exepid process 4736 pro3898.exe 4736 pro3898.exe 5100 qu1689.exe 5100 qu1689.exe 1888 si541766.exe 1888 si541766.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3898.exequ1689.exesi541766.exedescription pid process Token: SeDebugPrivilege 4736 pro3898.exe Token: SeDebugPrivilege 5100 qu1689.exe Token: SeDebugPrivilege 1888 si541766.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exeunio4920.exedescription pid process target process PID 3212 wrote to memory of 3720 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe unio4920.exe PID 3212 wrote to memory of 3720 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe unio4920.exe PID 3212 wrote to memory of 3720 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe unio4920.exe PID 3720 wrote to memory of 4736 3720 unio4920.exe pro3898.exe PID 3720 wrote to memory of 4736 3720 unio4920.exe pro3898.exe PID 3720 wrote to memory of 5100 3720 unio4920.exe qu1689.exe PID 3720 wrote to memory of 5100 3720 unio4920.exe qu1689.exe PID 3720 wrote to memory of 5100 3720 unio4920.exe qu1689.exe PID 3212 wrote to memory of 1888 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe si541766.exe PID 3212 wrote to memory of 1888 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe si541766.exe PID 3212 wrote to memory of 1888 3212 16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe si541766.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe"C:\Users\Admin\AppData\Local\Temp\16a3399314b887ed0290a2f4f819dcc543136f91837b3355e73b96d10bcf5f52.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3898.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1689.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si541766.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si541766.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD541707338e1e2d868aa699ac0dd2e77b0
SHA136e0dfba09f9fb409faf0f9a99217d0d0c524b82
SHA2568d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557
SHA51280c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2
-
Filesize
175KB
MD541707338e1e2d868aa699ac0dd2e77b0
SHA136e0dfba09f9fb409faf0f9a99217d0d0c524b82
SHA2568d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557
SHA51280c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2
-
Filesize
402KB
MD5ff9d56b74d75c16d3552e6bcc826f46e
SHA1a1a4ae0933c948b9f200b66a68a44f8da86012e3
SHA256460c90f150c29d0565e39a173371ea7113cff7554c6a945fdefd3443c12c54fc
SHA512b2ad03ada977e4fe0d9804c4dab0105e83ac7ebf205e87a9864d0724ae34e36106ba991a2bb8cafc05d7696b923aad8aeb580a0ac9695ef1fa737a99d4b3f13b
-
Filesize
402KB
MD5ff9d56b74d75c16d3552e6bcc826f46e
SHA1a1a4ae0933c948b9f200b66a68a44f8da86012e3
SHA256460c90f150c29d0565e39a173371ea7113cff7554c6a945fdefd3443c12c54fc
SHA512b2ad03ada977e4fe0d9804c4dab0105e83ac7ebf205e87a9864d0724ae34e36106ba991a2bb8cafc05d7696b923aad8aeb580a0ac9695ef1fa737a99d4b3f13b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
349KB
MD58ed818fb7349566292e2531ee6688188
SHA1542a9649a89b380f40517364409e8ea762a3b111
SHA2563276b87a9e6b7145919813fa1c2568eb3ce788691d9364d19da5357bc3415add
SHA5126c4fb95deb6d766cb7ef36769e191f90103cd50db8e064264c20d0a3a68c179176fa2a37a5dd64257ab61cd29f74240d43931893567cf5690a665a6fdfd0268b
-
Filesize
349KB
MD58ed818fb7349566292e2531ee6688188
SHA1542a9649a89b380f40517364409e8ea762a3b111
SHA2563276b87a9e6b7145919813fa1c2568eb3ce788691d9364d19da5357bc3415add
SHA5126c4fb95deb6d766cb7ef36769e191f90103cd50db8e064264c20d0a3a68c179176fa2a37a5dd64257ab61cd29f74240d43931893567cf5690a665a6fdfd0268b