Analysis
-
max time kernel
42s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25-03-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe
Resource
win10-20230220-en
General
-
Target
38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe
-
Size
688KB
-
MD5
9598a2d0b257363410282122308d3cc6
-
SHA1
08afc2de24b97ad7b6fc97f50bc31f06f4980cb0
-
SHA256
38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce
-
SHA512
1d292a330ca2c5bdf8491b5826aaa044c8c94cda138b6d170eff2b9f03343aae7779e4d3278ecdf1c05d0036a253904fef311366512c8b252ebdff4214258de0
-
SSDEEP
12288:gMrHy90jFVislKqfKBj7GBPEbERsL9EkcbektZblq5VYI9sfRvssPl:3ymQqM7GmbERe29nY5VYFLl
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2171.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3820-180-0x0000000004980000-0x00000000049C6000-memory.dmp family_redline behavioral1/memory/3820-181-0x0000000007660000-0x00000000076A4000-memory.dmp family_redline behavioral1/memory/3820-184-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-186-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-188-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-190-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-192-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-194-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-196-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-198-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-200-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-202-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-204-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-206-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-208-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-210-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-212-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-214-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-216-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/3820-218-0x0000000007660000-0x000000000769F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 364 un388320.exe 3868 pro2171.exe 3820 qu0514.exe 2488 si025887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2171.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un388320.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un388320.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3868 pro2171.exe 3868 pro2171.exe 3820 qu0514.exe 3820 qu0514.exe 2488 si025887.exe 2488 si025887.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3868 pro2171.exe Token: SeDebugPrivilege 3820 qu0514.exe Token: SeDebugPrivilege 2488 si025887.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3516 wrote to memory of 364 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 66 PID 3516 wrote to memory of 364 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 66 PID 3516 wrote to memory of 364 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 66 PID 364 wrote to memory of 3868 364 un388320.exe 67 PID 364 wrote to memory of 3868 364 un388320.exe 67 PID 364 wrote to memory of 3868 364 un388320.exe 67 PID 364 wrote to memory of 3820 364 un388320.exe 68 PID 364 wrote to memory of 3820 364 un388320.exe 68 PID 364 wrote to memory of 3820 364 un388320.exe 68 PID 3516 wrote to memory of 2488 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 70 PID 3516 wrote to memory of 2488 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 70 PID 3516 wrote to memory of 2488 3516 38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe"C:\Users\Admin\AppData\Local\Temp\38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
546KB
MD5154220b933b7a1649824d28c445af138
SHA18ceed2dfcc59252806eeab03d0da95672059e861
SHA25624c244973f71e39e6eae3ee596fb0ccf0586e0c120b11cc581f3534ea5912452
SHA51234dfc04d3abad557fc42e0b6a4846c66f7de2e99c58d4e1958483d0f792fcb2eb335156d2c4e4df0bdaa4558508ce9ba89525cd9dac3478a4c1add5d7fe7d322
-
Filesize
546KB
MD5154220b933b7a1649824d28c445af138
SHA18ceed2dfcc59252806eeab03d0da95672059e861
SHA25624c244973f71e39e6eae3ee596fb0ccf0586e0c120b11cc581f3534ea5912452
SHA51234dfc04d3abad557fc42e0b6a4846c66f7de2e99c58d4e1958483d0f792fcb2eb335156d2c4e4df0bdaa4558508ce9ba89525cd9dac3478a4c1add5d7fe7d322
-
Filesize
324KB
MD5d5faf661aa3ae17359018549abace394
SHA1862e782ddc7ef73ee4e993d247aa14b7a5d4d5c0
SHA256d5358af7b250c2ae2541b88a5f6b043fae627de08b19adffda6970cd9319449b
SHA512d9919080e0e8bf67378b2093de6e311255fbc82a62c187a9735a46e7cf4eaff348e55ca7c511c19187d51deb68e044799187bfbcf43ec5c3b6558eac30219abf
-
Filesize
324KB
MD5d5faf661aa3ae17359018549abace394
SHA1862e782ddc7ef73ee4e993d247aa14b7a5d4d5c0
SHA256d5358af7b250c2ae2541b88a5f6b043fae627de08b19adffda6970cd9319449b
SHA512d9919080e0e8bf67378b2093de6e311255fbc82a62c187a9735a46e7cf4eaff348e55ca7c511c19187d51deb68e044799187bfbcf43ec5c3b6558eac30219abf
-
Filesize
383KB
MD5157df330c26f63ffa7d15f56bf261d53
SHA1a3cacc113e8b5d01310bcdb4e24fafd24d1a4d73
SHA256967966ec6e005194b80be5430b60785b7fea99fb290996423fd1b938773a8268
SHA512b97202f88e2a7bf68786868321d25b35cd366676d603270b2978295813b729802ca918b29a5f7def1654912cb83ff62f3c20f962d46d747fa5ac6ad345427ed1
-
Filesize
383KB
MD5157df330c26f63ffa7d15f56bf261d53
SHA1a3cacc113e8b5d01310bcdb4e24fafd24d1a4d73
SHA256967966ec6e005194b80be5430b60785b7fea99fb290996423fd1b938773a8268
SHA512b97202f88e2a7bf68786868321d25b35cd366676d603270b2978295813b729802ca918b29a5f7def1654912cb83ff62f3c20f962d46d747fa5ac6ad345427ed1