Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 11:38
Static task
static1
Behavioral task
behavioral1
Sample
8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe
Resource
win10v2004-20230221-en
General
-
Target
8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe
-
Size
539KB
-
MD5
5b3241cda151c1bc44b8799852ab6dd0
-
SHA1
a42951777cfd197e792c34d879bf2a15aac82029
-
SHA256
8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66
-
SHA512
3c8efd1d102266d93c5cdd9f5a7212680f0aeaca7ba85c57024eaf69eab301fc48b6aa7746e71522651f440d3b17113ef1ecfef487f354bbad4028d04c8d9301
-
SSDEEP
12288:qMr2y90SZwMpeSESxrCl7+o49U1AQCld1bga9VT8+U:oytdASVxmlqQAdd1NPC
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Processes:
pro5685.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5685.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5685.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2244-154-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-155-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-161-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-165-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-158-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-167-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-169-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-171-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-173-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-175-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-177-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-179-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-181-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-183-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-185-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-187-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-189-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-191-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-193-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-195-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-197-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-199-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-201-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-203-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-205-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-207-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-209-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-211-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-215-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-213-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-217-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-219-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2244-221-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
unio8266.exepro5685.exequ1546.exepid process 3972 unio8266.exe 4528 pro5685.exe 2244 qu1546.exe -
Processes:
pro5685.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5685.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exeunio8266.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio8266.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8266.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5685.exepid process 4528 pro5685.exe 4528 pro5685.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5685.exequ1546.exedescription pid process Token: SeDebugPrivilege 4528 pro5685.exe Token: SeDebugPrivilege 2244 qu1546.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exeunio8266.exedescription pid process target process PID 3360 wrote to memory of 3972 3360 8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe unio8266.exe PID 3360 wrote to memory of 3972 3360 8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe unio8266.exe PID 3360 wrote to memory of 3972 3360 8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe unio8266.exe PID 3972 wrote to memory of 4528 3972 unio8266.exe pro5685.exe PID 3972 wrote to memory of 4528 3972 unio8266.exe pro5685.exe PID 3972 wrote to memory of 2244 3972 unio8266.exe qu1546.exe PID 3972 wrote to memory of 2244 3972 unio8266.exe qu1546.exe PID 3972 wrote to memory of 2244 3972 unio8266.exe qu1546.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe"C:\Users\Admin\AppData\Local\Temp\8edc18f95a74ce4f0b9f49818ecbef3a367783541430562320db42a3bb039f66.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8266.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8266.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5685.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD52d74872f6337b05bcdf8c31109d00cf3
SHA122463d64bacedfc5168ba13a3a00d9c67cf3f36b
SHA2567043899c6deb22d5a01c3834a5cf3b44cf68a076a258722dbc49191f514185cf
SHA512c0bbddf9f7fe97e7dd13405fa4f6f3929f714622c44c4b54008d048bd288d49049e0d828952827a74aa7333d286e62f2d9cd9520952f4f0b4dabe4f8c850876d
-
Filesize
397KB
MD52d74872f6337b05bcdf8c31109d00cf3
SHA122463d64bacedfc5168ba13a3a00d9c67cf3f36b
SHA2567043899c6deb22d5a01c3834a5cf3b44cf68a076a258722dbc49191f514185cf
SHA512c0bbddf9f7fe97e7dd13405fa4f6f3929f714622c44c4b54008d048bd288d49049e0d828952827a74aa7333d286e62f2d9cd9520952f4f0b4dabe4f8c850876d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
356KB
MD565d53367f37cd7eb22b62ecb4f416c36
SHA18b85f517baf4d0ff1d21e9114c551ad2f1b09328
SHA256855abc26c7990b5520a5a8cfa1dd29a225969a813afdb3e00156866a5183a733
SHA512899ce3a3c7b7114bcf7a80cc415c03a4ad79a64cbc2301b89c2b71fc0ba8548d00edcd623df6d13aeb5bc3a22f223b70290c8958f42c1a122ae1a7af0c674ec7
-
Filesize
356KB
MD565d53367f37cd7eb22b62ecb4f416c36
SHA18b85f517baf4d0ff1d21e9114c551ad2f1b09328
SHA256855abc26c7990b5520a5a8cfa1dd29a225969a813afdb3e00156866a5183a733
SHA512899ce3a3c7b7114bcf7a80cc415c03a4ad79a64cbc2301b89c2b71fc0ba8548d00edcd623df6d13aeb5bc3a22f223b70290c8958f42c1a122ae1a7af0c674ec7