Resubmissions
13-07-2024 16:26
240713-txqqbsybmj 313-07-2024 15:27
240713-sv4czawfkl 308-04-2024 13:45
240408-q2dpsaae25 1021-11-2023 22:21
231121-196ewagh72 1021-11-2023 22:20
231121-183ycshf5y 1021-11-2023 22:06
231121-1z2c6sgh38 1027-08-2023 18:38
230827-w98ssaee5z 1001-06-2023 22:35
230601-2h4yeagg74 1021-04-2023 17:56
230421-whz2kahb76 1016-04-2023 14:28
230416-rtht7sad45 10Analysis
-
max time kernel
1793s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
Resource
win10v2004-20230220-en
General
-
Target
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
-
Size
1.2MB
-
MD5
5b3b6822964b4151c6200ecd89722a86
-
SHA1
ce7a11dae532b2ade1c96619bbdc8a8325582049
-
SHA256
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34
-
SHA512
2f0d99af35c326cf46810c7421325deb55ae7ca36a8edc2716a3d32d9e6769e0d374581a98912e22fceeb6973e972463ed8b2fa4d4399043c443fa100dfd17b0
-
SSDEEP
24576:5yY4YriuQJ5X4SuIcmuBLahxwUzN1YyqoVKucvTNLF9:sY4FuIahGxRMoobNLF
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Processes:
iwN36Rn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iwN36Rn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iwN36Rn.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral2/memory/2876-178-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-181-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-183-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-179-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-185-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-187-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-189-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-191-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-193-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-195-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-197-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-199-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-201-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-203-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-205-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-207-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-209-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-211-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-213-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-215-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-217-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-219-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-221-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-223-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-225-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-227-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-229-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-231-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-233-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-235-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-237-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-239-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral2/memory/2876-241-0x0000000002610000-0x000000000264E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
sbO31En07.exesmS09II74.exeslc39Ad82.exesko86jV13.exeiwN36Rn.exekLG98Ei.exepid process 368 sbO31En07.exe 4056 smS09II74.exe 1364 slc39Ad82.exe 1912 sko86jV13.exe 1728 iwN36Rn.exe 2876 kLG98Ei.exe -
Processes:
iwN36Rn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iwN36Rn.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
sko86jV13.exe106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exesmS09II74.exeslc39Ad82.exesbO31En07.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sko86jV13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" sko86jV13.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" smS09II74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" slc39Ad82.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce smS09II74.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce slc39Ad82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sbO31En07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sbO31En07.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
iwN36Rn.exepid process 1728 iwN36Rn.exe 1728 iwN36Rn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
iwN36Rn.exekLG98Ei.exedescription pid process Token: SeDebugPrivilege 1728 iwN36Rn.exe Token: SeDebugPrivilege 2876 kLG98Ei.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exesbO31En07.exesmS09II74.exeslc39Ad82.exesko86jV13.exedescription pid process target process PID 3804 wrote to memory of 368 3804 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 3804 wrote to memory of 368 3804 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 3804 wrote to memory of 368 3804 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 368 wrote to memory of 4056 368 sbO31En07.exe smS09II74.exe PID 368 wrote to memory of 4056 368 sbO31En07.exe smS09II74.exe PID 368 wrote to memory of 4056 368 sbO31En07.exe smS09II74.exe PID 4056 wrote to memory of 1364 4056 smS09II74.exe slc39Ad82.exe PID 4056 wrote to memory of 1364 4056 smS09II74.exe slc39Ad82.exe PID 4056 wrote to memory of 1364 4056 smS09II74.exe slc39Ad82.exe PID 1364 wrote to memory of 1912 1364 slc39Ad82.exe sko86jV13.exe PID 1364 wrote to memory of 1912 1364 slc39Ad82.exe sko86jV13.exe PID 1364 wrote to memory of 1912 1364 slc39Ad82.exe sko86jV13.exe PID 1912 wrote to memory of 1728 1912 sko86jV13.exe iwN36Rn.exe PID 1912 wrote to memory of 1728 1912 sko86jV13.exe iwN36Rn.exe PID 1912 wrote to memory of 2876 1912 sko86jV13.exe kLG98Ei.exe PID 1912 wrote to memory of 2876 1912 sko86jV13.exe kLG98Ei.exe PID 1912 wrote to memory of 2876 1912 sko86jV13.exe kLG98Ei.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
Filesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
Filesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
Filesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
Filesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
Filesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
Filesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
Filesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44