Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 01:05
Static task
static1
Behavioral task
behavioral1
Sample
99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe
Resource
win10-20230220-en
General
-
Target
99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe
-
Size
546KB
-
MD5
22b22a7949ff51534c5c5ddb37575071
-
SHA1
8332c89a4ac15550686150a35a2d21160a0a33da
-
SHA256
99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e
-
SHA512
098f0be61ddac572b470f1c7a4f66dcaab017ba54e51cbe6260a12e29d92fd9e9c1627625351bcb81fcc458a0e372678fbcb7f8d6e850ac350dc1c478bee59ad
-
SSDEEP
12288:uMrny90DhspexH0MRPESzPhGYhsttwLDn3Rgt/:dyeh42HJR8OwYGwtgp
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Signatures
-
Processes:
pro6063.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6063.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-142-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/2820-144-0x0000000004CC0000-0x0000000004D04000-memory.dmp family_redline behavioral1/memory/2820-149-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-148-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-151-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-153-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-155-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-157-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-159-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-161-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-163-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-165-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-167-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-169-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-173-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-171-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2820-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio9429.exepro6063.exequ0146.exesi038021.exepid process 2452 unio9429.exe 2592 pro6063.exe 2820 qu0146.exe 4384 si038021.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6063.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6063.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exeunio9429.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9429.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6063.exequ0146.exesi038021.exepid process 2592 pro6063.exe 2592 pro6063.exe 2820 qu0146.exe 2820 qu0146.exe 4384 si038021.exe 4384 si038021.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6063.exequ0146.exesi038021.exedescription pid process Token: SeDebugPrivilege 2592 pro6063.exe Token: SeDebugPrivilege 2820 qu0146.exe Token: SeDebugPrivilege 4384 si038021.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exeunio9429.exedescription pid process target process PID 2132 wrote to memory of 2452 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe unio9429.exe PID 2132 wrote to memory of 2452 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe unio9429.exe PID 2132 wrote to memory of 2452 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe unio9429.exe PID 2452 wrote to memory of 2592 2452 unio9429.exe pro6063.exe PID 2452 wrote to memory of 2592 2452 unio9429.exe pro6063.exe PID 2452 wrote to memory of 2820 2452 unio9429.exe qu0146.exe PID 2452 wrote to memory of 2820 2452 unio9429.exe qu0146.exe PID 2452 wrote to memory of 2820 2452 unio9429.exe qu0146.exe PID 2132 wrote to memory of 4384 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe si038021.exe PID 2132 wrote to memory of 4384 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe si038021.exe PID 2132 wrote to memory of 4384 2132 99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe si038021.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe"C:\Users\Admin\AppData\Local\Temp\99c797e56e623dd3fe54540ddb50ca9e42a6297474b43b5df9995915f1f2f91e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9429.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9429.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6063.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0146.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038021.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038021.exeFilesize
175KB
MD541707338e1e2d868aa699ac0dd2e77b0
SHA136e0dfba09f9fb409faf0f9a99217d0d0c524b82
SHA2568d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557
SHA51280c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038021.exeFilesize
175KB
MD541707338e1e2d868aa699ac0dd2e77b0
SHA136e0dfba09f9fb409faf0f9a99217d0d0c524b82
SHA2568d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557
SHA51280c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9429.exeFilesize
404KB
MD59ed73b4a40d2b713a47a24ee80ee4113
SHA1c9de68abb80ac0a8b34d0d976f557526a52b787f
SHA2569e99700f3e33d5c861af3c27d9b0cfadeeaed631d34045bfe7c993c269509b77
SHA51292816695c7db2a612e4efd7b48de3cff1d707dd4d9e75d0905163ad448a6bfb55f440835f19343c2db43ccf269bec5c4983607dcbe6d70796015937b685eb770
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9429.exeFilesize
404KB
MD59ed73b4a40d2b713a47a24ee80ee4113
SHA1c9de68abb80ac0a8b34d0d976f557526a52b787f
SHA2569e99700f3e33d5c861af3c27d9b0cfadeeaed631d34045bfe7c993c269509b77
SHA51292816695c7db2a612e4efd7b48de3cff1d707dd4d9e75d0905163ad448a6bfb55f440835f19343c2db43ccf269bec5c4983607dcbe6d70796015937b685eb770
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6063.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6063.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0146.exeFilesize
358KB
MD542c11b829d64857927bfb41cc46aaa5d
SHA155b1dd4227598daf699e7d7b0b5a89215338fc38
SHA256d8b6a4bf7677e31d36dba9f06a6c50d3b27d094f2e3ae3e46b366630f1401dc3
SHA512900980e5ab0380e0a0e8fd42cc1a2ff0fe7a493a5492d46b9aee3d1a021f676afe6157c04e0481036adc80f4e8af9705d56069b3f091cefc141bfbe7a40f67b3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0146.exeFilesize
358KB
MD542c11b829d64857927bfb41cc46aaa5d
SHA155b1dd4227598daf699e7d7b0b5a89215338fc38
SHA256d8b6a4bf7677e31d36dba9f06a6c50d3b27d094f2e3ae3e46b366630f1401dc3
SHA512900980e5ab0380e0a0e8fd42cc1a2ff0fe7a493a5492d46b9aee3d1a021f676afe6157c04e0481036adc80f4e8af9705d56069b3f091cefc141bfbe7a40f67b3
-
memory/2592-135-0x0000000000E70000-0x0000000000E7A000-memory.dmpFilesize
40KB
-
memory/2820-141-0x0000000000720000-0x000000000076B000-memory.dmpFilesize
300KB
-
memory/2820-142-0x0000000002590000-0x00000000025D6000-memory.dmpFilesize
280KB
-
memory/2820-143-0x0000000004DB0000-0x00000000052AE000-memory.dmpFilesize
5.0MB
-
memory/2820-144-0x0000000004CC0000-0x0000000004D04000-memory.dmpFilesize
272KB
-
memory/2820-145-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-146-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-147-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-149-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-148-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-151-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-153-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-155-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-157-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-159-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-161-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-163-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-165-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-167-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-169-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-173-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-171-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmpFilesize
248KB
-
memory/2820-1054-0x00000000058C0000-0x0000000005EC6000-memory.dmpFilesize
6.0MB
-
memory/2820-1055-0x00000000052B0000-0x00000000053BA000-memory.dmpFilesize
1.0MB
-
memory/2820-1056-0x00000000053F0000-0x0000000005402000-memory.dmpFilesize
72KB
-
memory/2820-1057-0x0000000005410000-0x000000000544E000-memory.dmpFilesize
248KB
-
memory/2820-1058-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-1059-0x0000000005560000-0x00000000055AB000-memory.dmpFilesize
300KB
-
memory/2820-1061-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-1062-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-1063-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/2820-1064-0x00000000056F0000-0x0000000005782000-memory.dmpFilesize
584KB
-
memory/2820-1065-0x0000000005790000-0x00000000057F6000-memory.dmpFilesize
408KB
-
memory/2820-1066-0x0000000006480000-0x00000000064F6000-memory.dmpFilesize
472KB
-
memory/2820-1067-0x0000000006510000-0x0000000006560000-memory.dmpFilesize
320KB
-
memory/2820-1068-0x00000000065A0000-0x0000000006762000-memory.dmpFilesize
1.8MB
-
memory/2820-1069-0x0000000006770000-0x0000000006C9C000-memory.dmpFilesize
5.2MB
-
memory/4384-1075-0x00000000004C0000-0x00000000004F2000-memory.dmpFilesize
200KB
-
memory/4384-1076-0x0000000004F00000-0x0000000004F4B000-memory.dmpFilesize
300KB
-
memory/4384-1077-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB