Analysis
-
max time kernel
50s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 10:09
Static task
static1
Behavioral task
behavioral1
Sample
5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe
Resource
win10-20230220-en
General
-
Target
5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe
-
Size
538KB
-
MD5
81a2baf571c347d4b734ab89ea0aec15
-
SHA1
8f7164862cb5fa5560583147eab4d56b34332254
-
SHA256
5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001
-
SHA512
34a406fe9a0d5420acfee601a539a7dd15b12cc9cf3b5c174e3563c8f2dd71fc68ba3fdd177fc7e8a5e5242ee11f9544b581d16618772342cd4d60dcd7726a10
-
SSDEEP
12288:gMrKy90UQvqUF3xeOPTuFy2Aklfo/sYSxaI4+v5N1tdHNVF0E:6yKvRtlT/bklfCsYCTBb/HRj
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro2953.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2953.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-142-0x0000000002E70000-0x0000000002EB6000-memory.dmp family_redline behavioral1/memory/2884-144-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline behavioral1/memory/2884-145-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-146-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-148-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-150-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-152-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-154-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-158-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-157-0x0000000002E40000-0x0000000002E50000-memory.dmp family_redline behavioral1/memory/2884-161-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-163-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-165-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-167-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-169-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-171-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-173-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-175-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-177-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-179-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-181-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-183-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-185-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-187-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-189-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-193-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-195-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-197-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-199-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-201-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-203-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-205-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-207-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-209-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-211-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/2884-1065-0x0000000002E40000-0x0000000002E50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio0735.exepro2953.exequ8462.exesi552963.exepid process 3192 unio0735.exe 1500 pro2953.exe 2884 qu8462.exe 3376 si552963.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2953.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2953.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exeunio0735.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0735.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2953.exequ8462.exesi552963.exepid process 1500 pro2953.exe 1500 pro2953.exe 2884 qu8462.exe 2884 qu8462.exe 3376 si552963.exe 3376 si552963.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2953.exequ8462.exesi552963.exedescription pid process Token: SeDebugPrivilege 1500 pro2953.exe Token: SeDebugPrivilege 2884 qu8462.exe Token: SeDebugPrivilege 3376 si552963.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exeunio0735.exedescription pid process target process PID 3304 wrote to memory of 3192 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe unio0735.exe PID 3304 wrote to memory of 3192 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe unio0735.exe PID 3304 wrote to memory of 3192 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe unio0735.exe PID 3192 wrote to memory of 1500 3192 unio0735.exe pro2953.exe PID 3192 wrote to memory of 1500 3192 unio0735.exe pro2953.exe PID 3192 wrote to memory of 2884 3192 unio0735.exe qu8462.exe PID 3192 wrote to memory of 2884 3192 unio0735.exe qu8462.exe PID 3192 wrote to memory of 2884 3192 unio0735.exe qu8462.exe PID 3304 wrote to memory of 3376 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe si552963.exe PID 3304 wrote to memory of 3376 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe si552963.exe PID 3304 wrote to memory of 3376 3304 5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe si552963.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe"C:\Users\Admin\AppData\Local\Temp\5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD5485ac14ebb6ea47439ad739320ce5732
SHA1268699eceea916e41d4006e534d3483c6059f085
SHA25642336d9b301ac67a8c291a0d192f9ddd53de765eacdce9b6290d568cf3873464
SHA5125d216dcb80fb11f7a88b0c291c5984b6ceb21f80a274df4295c834d5e1cea061584eaf7a4978ed7ef991707b2c059aeb1950aeede6eb707a8d284b5bbf40beea
-
Filesize
397KB
MD5485ac14ebb6ea47439ad739320ce5732
SHA1268699eceea916e41d4006e534d3483c6059f085
SHA25642336d9b301ac67a8c291a0d192f9ddd53de765eacdce9b6290d568cf3873464
SHA5125d216dcb80fb11f7a88b0c291c5984b6ceb21f80a274df4295c834d5e1cea061584eaf7a4978ed7ef991707b2c059aeb1950aeede6eb707a8d284b5bbf40beea
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5a6b25bc4f6b616dec1cb7db0f500374a
SHA10ee92b52370dddc68ddd7f7053d1bb452ba04e57
SHA256dfefb67ee4f7033d2902b62102f118226ab735c14b87041a7efc26b90c850f11
SHA512dcd0105415e4add8bb34322da75b34d0afe4b986deceb4c5ab5faa657ed53835bb93bce96beac15ce598830ebff7a6645d5ca06585e3a04cc532a29bde04839f
-
Filesize
355KB
MD5a6b25bc4f6b616dec1cb7db0f500374a
SHA10ee92b52370dddc68ddd7f7053d1bb452ba04e57
SHA256dfefb67ee4f7033d2902b62102f118226ab735c14b87041a7efc26b90c850f11
SHA512dcd0105415e4add8bb34322da75b34d0afe4b986deceb4c5ab5faa657ed53835bb93bce96beac15ce598830ebff7a6645d5ca06585e3a04cc532a29bde04839f