Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/03/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe
Resource
win10-20230220-en
General
-
Target
98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe
-
Size
689KB
-
MD5
40ae386b14879572bec40748287a6e6d
-
SHA1
a3c543618287dc342085d65cf507dbe5fa772a3e
-
SHA256
98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a
-
SHA512
1c4637ffc96b1ccfb20ad4196a990b105c565d4870445822da8052af33f71a7618da96e57fb086afea421851f3fee5c691cadcc54641c94855bc69329101e0fe
-
SSDEEP
12288:QMrXy90ucPb4yeDDqgLumU9as0rjeyTsF8+XTKptb7TGENl3mvokt4hy:XyMjgiKeqsS+EtbfGjv/x
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7089.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4864-175-0x0000000006F90000-0x0000000006FD6000-memory.dmp family_redline behavioral1/memory/4864-176-0x0000000007690000-0x00000000076D4000-memory.dmp family_redline behavioral1/memory/4864-177-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-178-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-180-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-182-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-184-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-186-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-190-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-196-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-193-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-198-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-200-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-202-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-204-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-206-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-208-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-210-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-212-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline behavioral1/memory/4864-214-0x0000000007690000-0x00000000076CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3924 unio0916.exe 4944 pro7089.exe 4864 qu9800.exe 3592 si683614.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7089.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7089.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0916.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 pro7089.exe 4944 pro7089.exe 4864 qu9800.exe 4864 qu9800.exe 3592 si683614.exe 3592 si683614.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 pro7089.exe Token: SeDebugPrivilege 4864 qu9800.exe Token: SeDebugPrivilege 3592 si683614.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3924 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 66 PID 4124 wrote to memory of 3924 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 66 PID 4124 wrote to memory of 3924 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 66 PID 3924 wrote to memory of 4944 3924 unio0916.exe 67 PID 3924 wrote to memory of 4944 3924 unio0916.exe 67 PID 3924 wrote to memory of 4944 3924 unio0916.exe 67 PID 3924 wrote to memory of 4864 3924 unio0916.exe 68 PID 3924 wrote to memory of 4864 3924 unio0916.exe 68 PID 3924 wrote to memory of 4864 3924 unio0916.exe 68 PID 4124 wrote to memory of 3592 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 70 PID 4124 wrote to memory of 3592 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 70 PID 4124 wrote to memory of 3592 4124 98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe"C:\Users\Admin\AppData\Local\Temp\98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD517eecdfcdba58dcc35826a14d78a8e60
SHA1b7db5fc772b4096eda4165fec03da4239e0922e7
SHA2565ad947677902bd4d155a4566dd12d9146f4e77b1bbaf251d265cbdc994b7cf58
SHA5124a0016c3f7275ade99e4b02281c6423bc82fe6a1c8c914f6ddb13241bfd11a8ece28a239a98e3b56b9e2ab69219af04290faf56b9df24b13e0b1d8abf4d74099
-
Filesize
175KB
MD517eecdfcdba58dcc35826a14d78a8e60
SHA1b7db5fc772b4096eda4165fec03da4239e0922e7
SHA2565ad947677902bd4d155a4566dd12d9146f4e77b1bbaf251d265cbdc994b7cf58
SHA5124a0016c3f7275ade99e4b02281c6423bc82fe6a1c8c914f6ddb13241bfd11a8ece28a239a98e3b56b9e2ab69219af04290faf56b9df24b13e0b1d8abf4d74099
-
Filesize
547KB
MD5361aa17f442e806199190c1414f1a603
SHA1acc0a489ac389a62ecc393299e17f2d302e203cb
SHA256c9581ccc6e067848ec5c87b8ce51a9c21637d85e465b60d756864585d425b514
SHA51222b9cc2284ef07c17abb1cf47221766b45c10d95225e8e8b54df35574b8f2554fa750a59756f0fb81fefe2a5079f6f5ed308df52a9375049f02a9bcff49fd8ea
-
Filesize
547KB
MD5361aa17f442e806199190c1414f1a603
SHA1acc0a489ac389a62ecc393299e17f2d302e203cb
SHA256c9581ccc6e067848ec5c87b8ce51a9c21637d85e465b60d756864585d425b514
SHA51222b9cc2284ef07c17abb1cf47221766b45c10d95225e8e8b54df35574b8f2554fa750a59756f0fb81fefe2a5079f6f5ed308df52a9375049f02a9bcff49fd8ea
-
Filesize
327KB
MD5d80ac8257dfffe36209f6fdf46bbe92e
SHA170e1e2834c22ae4a063659ec9b56fb76533ecdff
SHA2562fa4b403c8f95019c3fd3ae8b2a40b7af4554c22e04ae9d94c7b2c9c09cafff8
SHA5122c766922672c3c9b7e6310fa4a507fe97f2a84d73065bcf679a82716ecbbcb71da84f1d71ef21ed822eef09a1855ed0a6d19f5573e36a326a2a8a6addecdeda4
-
Filesize
327KB
MD5d80ac8257dfffe36209f6fdf46bbe92e
SHA170e1e2834c22ae4a063659ec9b56fb76533ecdff
SHA2562fa4b403c8f95019c3fd3ae8b2a40b7af4554c22e04ae9d94c7b2c9c09cafff8
SHA5122c766922672c3c9b7e6310fa4a507fe97f2a84d73065bcf679a82716ecbbcb71da84f1d71ef21ed822eef09a1855ed0a6d19f5573e36a326a2a8a6addecdeda4
-
Filesize
385KB
MD531975f6579801a8fbe501c78f9b4eb57
SHA117b9f25ec9b2f0821e3b9f9a97601a3af1cd404f
SHA25620961c43d7e3dcc9b10fcb72ab06980a10d5bd362ea96ade1450cef643eb04d1
SHA5124969ab6422e839aae49982dd737b27ebe039d0a1c1b7e95d1d71092dd2d0f7e3f182f674e94d4cb972deab2dc318c6968a42f6594df8c7a9e89488f355c17bcb
-
Filesize
385KB
MD531975f6579801a8fbe501c78f9b4eb57
SHA117b9f25ec9b2f0821e3b9f9a97601a3af1cd404f
SHA25620961c43d7e3dcc9b10fcb72ab06980a10d5bd362ea96ade1450cef643eb04d1
SHA5124969ab6422e839aae49982dd737b27ebe039d0a1c1b7e95d1d71092dd2d0f7e3f182f674e94d4cb972deab2dc318c6968a42f6594df8c7a9e89488f355c17bcb