Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25-03-2023 04:58
Static task
static1
Behavioral task
behavioral1
Sample
022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe
Resource
win10-20230220-en
General
-
Target
022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe
-
Size
689KB
-
MD5
0a612962532d584de9a864f10ac2a90f
-
SHA1
ba39a525f24302bbf745f541dd01c71d60a6a015
-
SHA256
022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3
-
SHA512
1d36499e1b4fbc9e062147496496dcab954ccadc884e326c68365b5d355d2e321ee6a956faa3ad4e04f572f2a72cb350af0ea93340b78708ac1846034a2f1972
-
SSDEEP
12288:UMrOy90RgPXFXdCW7UwW9BI4VVmdpSwiyYYsdEz5l43xNYMfKb/asLFv8H:iyNBoW7UR9/mKwiCsg5l4hGMSzr0H
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0936.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/372-177-0x0000000004940000-0x0000000004986000-memory.dmp family_redline behavioral1/memory/372-178-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline behavioral1/memory/372-179-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-180-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-182-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-184-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-186-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-188-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-192-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-190-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-194-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-202-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-204-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-200-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-198-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-196-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-206-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-208-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-210-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-212-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/372-1096-0x0000000007330000-0x0000000007340000-memory.dmp family_redline behavioral1/memory/372-1097-0x0000000007330000-0x0000000007340000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2612 unio5189.exe 4188 pro0936.exe 372 qu8421.exe 4040 si243993.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0936.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5189.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5189.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4188 pro0936.exe 4188 pro0936.exe 372 qu8421.exe 372 qu8421.exe 4040 si243993.exe 4040 si243993.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4188 pro0936.exe Token: SeDebugPrivilege 372 qu8421.exe Token: SeDebugPrivilege 4040 si243993.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2612 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 66 PID 2904 wrote to memory of 2612 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 66 PID 2904 wrote to memory of 2612 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 66 PID 2612 wrote to memory of 4188 2612 unio5189.exe 67 PID 2612 wrote to memory of 4188 2612 unio5189.exe 67 PID 2612 wrote to memory of 4188 2612 unio5189.exe 67 PID 2612 wrote to memory of 372 2612 unio5189.exe 68 PID 2612 wrote to memory of 372 2612 unio5189.exe 68 PID 2612 wrote to memory of 372 2612 unio5189.exe 68 PID 2904 wrote to memory of 4040 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 70 PID 2904 wrote to memory of 4040 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 70 PID 2904 wrote to memory of 4040 2904 022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe"C:\Users\Admin\AppData\Local\Temp\022c27f86aa558238779f845d37c99c679c3fc9f9cea29dd0085c5ea0cff8ff3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5189.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5189.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0936.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8421.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243993.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243993.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e7d8217844c2463ef47c0051972d477c
SHA1c83116e99007f530fa4c31dc81782852aca74778
SHA25629aab9c97d06e472cbec771e298a992c98f848082846c5c091367c79b95c46da
SHA512f2050be14d27f95216d7feca331292637ec07d030975f11e3310c132e2768d31e00305679dafc589268e049916ac7ffa88fe39f6078872b74354c67ccfb85d03
-
Filesize
175KB
MD5e7d8217844c2463ef47c0051972d477c
SHA1c83116e99007f530fa4c31dc81782852aca74778
SHA25629aab9c97d06e472cbec771e298a992c98f848082846c5c091367c79b95c46da
SHA512f2050be14d27f95216d7feca331292637ec07d030975f11e3310c132e2768d31e00305679dafc589268e049916ac7ffa88fe39f6078872b74354c67ccfb85d03
-
Filesize
547KB
MD5d4ddccde3790c3441b67c3961e91383e
SHA11c374cc8fe1e5dbfec462bf3c41e19a18aeebaea
SHA25635e04e1a919766334a211d2a9632ee9eba0808b193da20641fcdfd5a0bb5eb9e
SHA512472efe19dac4f6581ec8718d55854e811272bbfaeee219d6e62514b1bb4bf7edd4170ad8032219523c9dc2cc07207608f62f494db632d7a13adbdaec4cdcb0a3
-
Filesize
547KB
MD5d4ddccde3790c3441b67c3961e91383e
SHA11c374cc8fe1e5dbfec462bf3c41e19a18aeebaea
SHA25635e04e1a919766334a211d2a9632ee9eba0808b193da20641fcdfd5a0bb5eb9e
SHA512472efe19dac4f6581ec8718d55854e811272bbfaeee219d6e62514b1bb4bf7edd4170ad8032219523c9dc2cc07207608f62f494db632d7a13adbdaec4cdcb0a3
-
Filesize
329KB
MD501aa34f36699889d7225feb7a0e9c660
SHA1f87f939fe9e29f347907938c50e2c21b610727de
SHA256bb33728964a6280f01719f0c612a2dc752b515af0513afbeb44c4b28e443f4a1
SHA512ddb1e19389a9323896a5e914677bde45f39a4ab48dda27c73f7c07a228257e80fc75b3b599406383fb76c6fadf80b52815dd62d3a813344c06b53af81dd8af59
-
Filesize
329KB
MD501aa34f36699889d7225feb7a0e9c660
SHA1f87f939fe9e29f347907938c50e2c21b610727de
SHA256bb33728964a6280f01719f0c612a2dc752b515af0513afbeb44c4b28e443f4a1
SHA512ddb1e19389a9323896a5e914677bde45f39a4ab48dda27c73f7c07a228257e80fc75b3b599406383fb76c6fadf80b52815dd62d3a813344c06b53af81dd8af59
-
Filesize
386KB
MD5ce3725a6714fdc38c6be2bce5824f12d
SHA1f1ace212f333ca802988336a11a2ac73e2f9cf2c
SHA25604f828c87457c892515e27b0bcb9722cbe1b789b63febd90fbe8036dc12e87e1
SHA512a86e2793e3c61e71c87d63a03a979b1b11a8c1ba03f014dbb097199c280087b6172213298dfac2aa92632e830018ac7411def8c993b5903f946114ada5f3d6bd
-
Filesize
386KB
MD5ce3725a6714fdc38c6be2bce5824f12d
SHA1f1ace212f333ca802988336a11a2ac73e2f9cf2c
SHA25604f828c87457c892515e27b0bcb9722cbe1b789b63febd90fbe8036dc12e87e1
SHA512a86e2793e3c61e71c87d63a03a979b1b11a8c1ba03f014dbb097199c280087b6172213298dfac2aa92632e830018ac7411def8c993b5903f946114ada5f3d6bd