Analysis
-
max time kernel
55s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 08:07
Static task
static1
Behavioral task
behavioral1
Sample
b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe
Resource
win10-20230220-en
General
-
Target
b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe
-
Size
540KB
-
MD5
ad14d0ae0e3407aef5780dc126c7c5a5
-
SHA1
d79b94638edd119ae15725f215131e2941b5734e
-
SHA256
b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb
-
SHA512
ddb66a31c5f47ab49b1e65f47e9f29f1dc8e7065efda1ceb925fdb5dd8a972bd582173b92dfc5e248e978f567fc44a1421e9cfc2dc717733cfe8bfac7946ffae
-
SSDEEP
12288:YMrqy90roENR4lxz6bctZGbkbvMMstBCjuDzVk5nFhZY+1B:yyxEi6bBwxstkF9T
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro4808.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4808.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/4104-138-0x00000000047B0000-0x00000000047F6000-memory.dmp family_redline behavioral1/memory/4104-140-0x00000000049B0000-0x00000000049F4000-memory.dmp family_redline behavioral1/memory/4104-141-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-142-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-144-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-146-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-152-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-148-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-155-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-157-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-159-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-161-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-163-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-165-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-167-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-169-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-171-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-173-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-175-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-177-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-179-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-181-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-183-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-185-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-187-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-189-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-191-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-193-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-195-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-197-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-199-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-201-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-205-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-203-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-207-0x00000000049B0000-0x00000000049EE000-memory.dmp family_redline behavioral1/memory/4104-1059-0x0000000007350000-0x0000000007360000-memory.dmp family_redline behavioral1/memory/4104-1060-0x0000000007350000-0x0000000007360000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio9945.exepro4808.exequ2558.exesi128731.exepid process 4280 unio9945.exe 4072 pro4808.exe 4104 qu2558.exe 1836 si128731.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4808.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4808.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exeunio9945.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4808.exequ2558.exesi128731.exepid process 4072 pro4808.exe 4072 pro4808.exe 4104 qu2558.exe 4104 qu2558.exe 1836 si128731.exe 1836 si128731.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4808.exequ2558.exesi128731.exedescription pid process Token: SeDebugPrivilege 4072 pro4808.exe Token: SeDebugPrivilege 4104 qu2558.exe Token: SeDebugPrivilege 1836 si128731.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exeunio9945.exedescription pid process target process PID 3232 wrote to memory of 4280 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe unio9945.exe PID 3232 wrote to memory of 4280 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe unio9945.exe PID 3232 wrote to memory of 4280 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe unio9945.exe PID 4280 wrote to memory of 4072 4280 unio9945.exe pro4808.exe PID 4280 wrote to memory of 4072 4280 unio9945.exe pro4808.exe PID 4280 wrote to memory of 4104 4280 unio9945.exe qu2558.exe PID 4280 wrote to memory of 4104 4280 unio9945.exe qu2558.exe PID 4280 wrote to memory of 4104 4280 unio9945.exe qu2558.exe PID 3232 wrote to memory of 1836 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe si128731.exe PID 3232 wrote to memory of 1836 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe si128731.exe PID 3232 wrote to memory of 1836 3232 b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe si128731.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe"C:\Users\Admin\AppData\Local\Temp\b5b53c3f3ea1cdd62d0b588408fc6ea12ee010a36e7f36e68605b8a6b86d0ffb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4808.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2558.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si128731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si128731.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
398KB
MD5929df2f9ff935858ce432946a989ce11
SHA19e2ec0499bd092b716f99fa485efb65f81dc8a22
SHA25654167e67bb9f3071a90c1769ac2654de71822a38ee4f9e3f0c30393ea790219b
SHA512afb398ed1216aff41b29e6dcb634bc8bbe2c0ff85c49a20727e1800de78d7c3c2ad74495332dffe72e7b985a7d2cfb8dbd964ee148e6c52df0e2a82ee5cc1982
-
Filesize
398KB
MD5929df2f9ff935858ce432946a989ce11
SHA19e2ec0499bd092b716f99fa485efb65f81dc8a22
SHA25654167e67bb9f3071a90c1769ac2654de71822a38ee4f9e3f0c30393ea790219b
SHA512afb398ed1216aff41b29e6dcb634bc8bbe2c0ff85c49a20727e1800de78d7c3c2ad74495332dffe72e7b985a7d2cfb8dbd964ee148e6c52df0e2a82ee5cc1982
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD59bb4836e81cf486f0fcd61318c358df7
SHA1c090d363ffc6556b47f794d598da41133d960ac7
SHA256505e523dde2c76d398add306e8076254941061c65d993980d59de5670faf88a7
SHA512538bb227f5747f56193ff4f37a79761aae9b5b71088cd8fa0248e468b7b68873841cf464eb931075a94e644eb216ce2927a6445ef333a2509bcf2dfe7b09b354
-
Filesize
355KB
MD59bb4836e81cf486f0fcd61318c358df7
SHA1c090d363ffc6556b47f794d598da41133d960ac7
SHA256505e523dde2c76d398add306e8076254941061c65d993980d59de5670faf88a7
SHA512538bb227f5747f56193ff4f37a79761aae9b5b71088cd8fa0248e468b7b68873841cf464eb931075a94e644eb216ce2927a6445ef333a2509bcf2dfe7b09b354