Analysis
-
max time kernel
54s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 09:36
Static task
static1
Behavioral task
behavioral1
Sample
09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe
Resource
win10-20230220-en
General
-
Target
09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe
-
Size
539KB
-
MD5
bcbb1fe9e85813fcf5c3c27f5131d99d
-
SHA1
3b1bebcefd2d3ecf2e913369288853a1b3018490
-
SHA256
09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1
-
SHA512
3c8a87d8834c1a65b5cb9c6526c6836bca88eb40da7302665425950caa392604c27c9e1a199302d9d775766741f043b2d78e07b61e766c986f6176f544d34787
-
SSDEEP
12288:iMr6y9069lOnh/+N69dG2nmGvYnxvI4+ila+bK6h4:cy19WhmNaG2ndvYx6qamJ4
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro8579.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8579.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/4036-140-0x00000000047C0000-0x0000000004806000-memory.dmp family_redline behavioral1/memory/4036-142-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4036-143-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-144-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-146-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-148-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-150-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-152-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-154-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-156-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-159-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-163-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-165-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-167-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-169-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-171-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-173-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-175-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-177-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-179-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-181-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-183-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-185-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-187-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-189-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-191-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-193-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-195-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-197-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-199-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-201-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-203-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-205-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-207-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-209-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4036-1064-0x0000000007470000-0x0000000007480000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio9721.exepro8579.exequ8916.exesi177482.exepid process 364 unio9721.exe 3504 pro8579.exe 4036 qu8916.exe 4760 si177482.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8579.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8579.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exeunio9721.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9721.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8579.exequ8916.exesi177482.exepid process 3504 pro8579.exe 3504 pro8579.exe 4036 qu8916.exe 4036 qu8916.exe 4760 si177482.exe 4760 si177482.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8579.exequ8916.exesi177482.exedescription pid process Token: SeDebugPrivilege 3504 pro8579.exe Token: SeDebugPrivilege 4036 qu8916.exe Token: SeDebugPrivilege 4760 si177482.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exeunio9721.exedescription pid process target process PID 1596 wrote to memory of 364 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe unio9721.exe PID 1596 wrote to memory of 364 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe unio9721.exe PID 1596 wrote to memory of 364 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe unio9721.exe PID 364 wrote to memory of 3504 364 unio9721.exe pro8579.exe PID 364 wrote to memory of 3504 364 unio9721.exe pro8579.exe PID 364 wrote to memory of 4036 364 unio9721.exe qu8916.exe PID 364 wrote to memory of 4036 364 unio9721.exe qu8916.exe PID 364 wrote to memory of 4036 364 unio9721.exe qu8916.exe PID 1596 wrote to memory of 4760 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe si177482.exe PID 1596 wrote to memory of 4760 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe si177482.exe PID 1596 wrote to memory of 4760 1596 09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe si177482.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe"C:\Users\Admin\AppData\Local\Temp\09eb6c5763deb468f63c53c47e7f5c64a5fcfa88ac7e3b17fbdb51f6966041b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8579.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8916.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8916.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177482.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177482.exeFilesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177482.exeFilesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9721.exeFilesize
397KB
MD52da81b8202de9188ddd5002248d60240
SHA1119629a828fb9e4876c97cd7bd1e9f0ddd639e93
SHA256d5db0adc0031c7b6d91e09226851f0773f6307d3ca0a781b265bdc9843e8e755
SHA512f8419427a05693d2174a40081c307ad6cde542217eda65660a38892b1c8ab2ad5d84834b2aafbf67a62ce40ff63e00b9ce387382ae01bac3db623431f891c38b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9721.exeFilesize
397KB
MD52da81b8202de9188ddd5002248d60240
SHA1119629a828fb9e4876c97cd7bd1e9f0ddd639e93
SHA256d5db0adc0031c7b6d91e09226851f0773f6307d3ca0a781b265bdc9843e8e755
SHA512f8419427a05693d2174a40081c307ad6cde542217eda65660a38892b1c8ab2ad5d84834b2aafbf67a62ce40ff63e00b9ce387382ae01bac3db623431f891c38b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8579.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8579.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8916.exeFilesize
355KB
MD59c17298ab70d7b9bad587069174e0f13
SHA1d045e9193780d7c93f893d30fee84abc33538362
SHA256114deb5a66cf81ae0f3f9c01e9836f42e4dd3112f14ee1641e477e47f4822ee3
SHA512307bcd5cb9628ab24d521b4af43e1d084ae4a7c583f081184bf686aca6e9091620a84efa0f1e572f89e127e61581fee9555e0333a8c0c904c96834be78f9558c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8916.exeFilesize
355KB
MD59c17298ab70d7b9bad587069174e0f13
SHA1d045e9193780d7c93f893d30fee84abc33538362
SHA256114deb5a66cf81ae0f3f9c01e9836f42e4dd3112f14ee1641e477e47f4822ee3
SHA512307bcd5cb9628ab24d521b4af43e1d084ae4a7c583f081184bf686aca6e9091620a84efa0f1e572f89e127e61581fee9555e0333a8c0c904c96834be78f9558c
-
memory/3504-133-0x0000000000920000-0x000000000092A000-memory.dmpFilesize
40KB
-
memory/4036-139-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/4036-140-0x00000000047C0000-0x0000000004806000-memory.dmpFilesize
280KB
-
memory/4036-141-0x0000000007480000-0x000000000797E000-memory.dmpFilesize
5.0MB
-
memory/4036-142-0x0000000004AB0000-0x0000000004AF4000-memory.dmpFilesize
272KB
-
memory/4036-143-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-144-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-146-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-148-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-150-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-152-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-154-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-156-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-158-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-159-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-162-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-160-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-163-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-165-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-167-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-169-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-171-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-173-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-175-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-177-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-179-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-181-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-183-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-185-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-187-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-189-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-191-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-193-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-195-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-197-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-199-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-201-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-203-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-205-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-207-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-209-0x0000000004AB0000-0x0000000004AEE000-memory.dmpFilesize
248KB
-
memory/4036-1052-0x0000000007980000-0x0000000007F86000-memory.dmpFilesize
6.0MB
-
memory/4036-1053-0x00000000072C0000-0x00000000073CA000-memory.dmpFilesize
1.0MB
-
memory/4036-1054-0x0000000004CE0000-0x0000000004CF2000-memory.dmpFilesize
72KB
-
memory/4036-1055-0x00000000073D0000-0x000000000740E000-memory.dmpFilesize
248KB
-
memory/4036-1056-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-1057-0x0000000007410000-0x000000000745B000-memory.dmpFilesize
300KB
-
memory/4036-1059-0x0000000008170000-0x0000000008202000-memory.dmpFilesize
584KB
-
memory/4036-1060-0x0000000008210000-0x0000000008276000-memory.dmpFilesize
408KB
-
memory/4036-1061-0x0000000008920000-0x0000000008AE2000-memory.dmpFilesize
1.8MB
-
memory/4036-1062-0x0000000008AF0000-0x000000000901C000-memory.dmpFilesize
5.2MB
-
memory/4036-1063-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-1064-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-1065-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4036-1066-0x0000000009150000-0x00000000091C6000-memory.dmpFilesize
472KB
-
memory/4036-1067-0x00000000091D0000-0x0000000009220000-memory.dmpFilesize
320KB
-
memory/4036-1068-0x0000000007470000-0x0000000007480000-memory.dmpFilesize
64KB
-
memory/4760-1074-0x0000000000F90000-0x0000000000FC2000-memory.dmpFilesize
200KB
-
memory/4760-1075-0x00000000059D0000-0x0000000005A1B000-memory.dmpFilesize
300KB
-
memory/4760-1076-0x0000000005B90000-0x0000000005BA0000-memory.dmpFilesize
64KB