Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 11:39
Static task
static1
Behavioral task
behavioral1
Sample
999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe
Resource
win10-20230220-en
General
-
Target
999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe
-
Size
1010KB
-
MD5
d414622702e50b8996985ef28b13305e
-
SHA1
c6b1a10f4e098ba508cdcd60a8b68b494562f21b
-
SHA256
999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496
-
SHA512
a9ebd5605933a24c45d3f6f675c4c21f1de1a002def4cd77c536de51ad5ec9d2915385c4a86d0094761403560faa0104e72968a52b8099decb46ffb31c71ee75
-
SSDEEP
24576:cyjtFGrlhj2t659LEBEkdBHk3ditaj/tb:Lid2t6bwE0BE3Ytaj/t
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Processes:
bus3716.execor0560.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus3716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus3716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus3716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor0560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor0560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus3716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus3716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor0560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor0560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor0560.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4848-195-0x00000000048C0000-0x0000000004906000-memory.dmp family_redline behavioral1/memory/4848-196-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/4848-197-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-198-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-200-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-202-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-204-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-207-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-211-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-214-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-216-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-218-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-220-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-222-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-224-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-226-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-228-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-230-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-232-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/4848-234-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
kino6648.exekino8950.exekino3472.exebus3716.execor0560.exedSU87s37.exepid process 3924 kino6648.exe 4960 kino8950.exe 1928 kino3472.exe 2444 bus3716.exe 4208 cor0560.exe 4848 dSU87s37.exe -
Processes:
bus3716.execor0560.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus3716.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor0560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor0560.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kino8950.exekino3472.exe999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exekino6648.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino8950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino8950.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino3472.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino3472.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino6648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino6648.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bus3716.execor0560.exepid process 2444 bus3716.exe 2444 bus3716.exe 4208 cor0560.exe 4208 cor0560.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bus3716.execor0560.exedSU87s37.exedescription pid process Token: SeDebugPrivilege 2444 bus3716.exe Token: SeDebugPrivilege 4208 cor0560.exe Token: SeDebugPrivilege 4848 dSU87s37.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exekino6648.exekino8950.exekino3472.exedescription pid process target process PID 4124 wrote to memory of 3924 4124 999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe kino6648.exe PID 4124 wrote to memory of 3924 4124 999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe kino6648.exe PID 4124 wrote to memory of 3924 4124 999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe kino6648.exe PID 3924 wrote to memory of 4960 3924 kino6648.exe kino8950.exe PID 3924 wrote to memory of 4960 3924 kino6648.exe kino8950.exe PID 3924 wrote to memory of 4960 3924 kino6648.exe kino8950.exe PID 4960 wrote to memory of 1928 4960 kino8950.exe kino3472.exe PID 4960 wrote to memory of 1928 4960 kino8950.exe kino3472.exe PID 4960 wrote to memory of 1928 4960 kino8950.exe kino3472.exe PID 1928 wrote to memory of 2444 1928 kino3472.exe bus3716.exe PID 1928 wrote to memory of 2444 1928 kino3472.exe bus3716.exe PID 1928 wrote to memory of 4208 1928 kino3472.exe cor0560.exe PID 1928 wrote to memory of 4208 1928 kino3472.exe cor0560.exe PID 1928 wrote to memory of 4208 1928 kino3472.exe cor0560.exe PID 4960 wrote to memory of 4848 4960 kino8950.exe dSU87s37.exe PID 4960 wrote to memory of 4848 4960 kino8950.exe dSU87s37.exe PID 4960 wrote to memory of 4848 4960 kino8950.exe dSU87s37.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe"C:\Users\Admin\AppData\Local\Temp\999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD53baf451165359d588345d593ebe03891
SHA1230856eba7ffc78b4ee68ab0763ca6c930d19c82
SHA256aa76d48f1cba6e43f2157f2f95ab2df5bd63a98ce9268f7ac943e544a7091ef2
SHA512533332146aa4b21f4ce98c6c8006e60f258c72cd267093198e6e876cfb72fd267efb46dbba0a859eca478fe8e8ecd0688cb9a667b7b62d4b925dcee696526d73
-
Filesize
828KB
MD53baf451165359d588345d593ebe03891
SHA1230856eba7ffc78b4ee68ab0763ca6c930d19c82
SHA256aa76d48f1cba6e43f2157f2f95ab2df5bd63a98ce9268f7ac943e544a7091ef2
SHA512533332146aa4b21f4ce98c6c8006e60f258c72cd267093198e6e876cfb72fd267efb46dbba0a859eca478fe8e8ecd0688cb9a667b7b62d4b925dcee696526d73
-
Filesize
686KB
MD54d55cc0cffa580255a7080bc55e19653
SHA1db2d4bfe29a90e5a61e6847021e42db9f60834fd
SHA256e30e3ad6355e21a06c7e455dbeffaf3b6ebeddcef35215504ed30d3492963525
SHA51212c1795691d780e094c2a55d76b02ac76c660666a7c82c75ac2894811e55eb8dbe483c1919a307ea63e50b754b8719c9b7379f1045788c98a789507cf7b62a5c
-
Filesize
686KB
MD54d55cc0cffa580255a7080bc55e19653
SHA1db2d4bfe29a90e5a61e6847021e42db9f60834fd
SHA256e30e3ad6355e21a06c7e455dbeffaf3b6ebeddcef35215504ed30d3492963525
SHA51212c1795691d780e094c2a55d76b02ac76c660666a7c82c75ac2894811e55eb8dbe483c1919a307ea63e50b754b8719c9b7379f1045788c98a789507cf7b62a5c
-
Filesize
356KB
MD531d02ffd5768442938e2296fb7c0b2bc
SHA1d9e081aa7c896abf07375a70eb926e1b3b29b86f
SHA2561c16beffaf75fedb3d28cbade025ca5e567ebbeffe061e7c9182bc604fa4a617
SHA512517663a83fa35588daf985628043c34e1ef6d59b86514355561fea4841fb98f31775dd8f07fe28e6673a5bb350b2bbf1ab5b3d3f7cde9b3a10c140d1a8584adf
-
Filesize
356KB
MD531d02ffd5768442938e2296fb7c0b2bc
SHA1d9e081aa7c896abf07375a70eb926e1b3b29b86f
SHA2561c16beffaf75fedb3d28cbade025ca5e567ebbeffe061e7c9182bc604fa4a617
SHA512517663a83fa35588daf985628043c34e1ef6d59b86514355561fea4841fb98f31775dd8f07fe28e6673a5bb350b2bbf1ab5b3d3f7cde9b3a10c140d1a8584adf
-
Filesize
340KB
MD579d1d864c665d3f9bb87500894227029
SHA1dbac7352db047d0eee2f2250e6da18943ffc55ce
SHA25660d17556a715a9525b03b33fae1c711a0938658a62916ea0018c94ed53c7b108
SHA5126ab2b7bebed89b4e5b14640c55b86893e4fa5f43d9c765707fd42996fa755a5513ab36ad0c0b5cee8dc9c5b32f8e1cbd9a91c45c2483dd45aeb2a4fe87ff441e
-
Filesize
340KB
MD579d1d864c665d3f9bb87500894227029
SHA1dbac7352db047d0eee2f2250e6da18943ffc55ce
SHA25660d17556a715a9525b03b33fae1c711a0938658a62916ea0018c94ed53c7b108
SHA5126ab2b7bebed89b4e5b14640c55b86893e4fa5f43d9c765707fd42996fa755a5513ab36ad0c0b5cee8dc9c5b32f8e1cbd9a91c45c2483dd45aeb2a4fe87ff441e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
298KB
MD52b8ed73f7d452a256fff3dd94c6dda11
SHA1503167de836993343e146983529f162db041050f
SHA256849e538d7824053c539b0227936166f2f01a05b6905cd24ab5e7f5d1719cbfbe
SHA51247784e5d2a5f8ed6b902c74d7c4d02617a3ebcb7a21f415eaac60b8b1bdff623082431310270f46e61e4754de60ab6cf86d0fc53a253b02d1232f54b9e095693
-
Filesize
298KB
MD52b8ed73f7d452a256fff3dd94c6dda11
SHA1503167de836993343e146983529f162db041050f
SHA256849e538d7824053c539b0227936166f2f01a05b6905cd24ab5e7f5d1719cbfbe
SHA51247784e5d2a5f8ed6b902c74d7c4d02617a3ebcb7a21f415eaac60b8b1bdff623082431310270f46e61e4754de60ab6cf86d0fc53a253b02d1232f54b9e095693