Analysis
-
max time kernel
51s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/03/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe
Resource
win10-20230220-en
General
-
Target
35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe
-
Size
686KB
-
MD5
d54624144ba187a6cce0396595e480bd
-
SHA1
bf22f5844d79e65ada6536674a2267df9d7154e2
-
SHA256
35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff
-
SHA512
7bb316053095c27bab4af7f3c72bd69390d0ff01b4c16d27e30b3061c119c0b6ddc34137a43a5f9d460093079d82d5f950bd8e948ca9049be1d70db6313ca05f
-
SSDEEP
12288:cMrYy90FqOhxEPtFk4bOUoKZN+hD5b817VTIvziv8iBuOh5Qf:EycuY4bcC+VWI7iEUu
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4764-179-0x00000000048F0000-0x0000000004936000-memory.dmp family_redline behavioral1/memory/4764-182-0x00000000070F0000-0x0000000007134000-memory.dmp family_redline behavioral1/memory/4764-184-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-183-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-186-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-188-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-190-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-192-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-194-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-196-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-198-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-200-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-202-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-204-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-206-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-208-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-210-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-212-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-214-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4764-216-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4076 un654418.exe 4276 pro7924.exe 4764 qu2414.exe 3756 si051141.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7924.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un654418.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un654418.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 pro7924.exe 4276 pro7924.exe 4764 qu2414.exe 4764 qu2414.exe 3756 si051141.exe 3756 si051141.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4276 pro7924.exe Token: SeDebugPrivilege 4764 qu2414.exe Token: SeDebugPrivilege 3756 si051141.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4076 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 66 PID 3668 wrote to memory of 4076 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 66 PID 3668 wrote to memory of 4076 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 66 PID 4076 wrote to memory of 4276 4076 un654418.exe 67 PID 4076 wrote to memory of 4276 4076 un654418.exe 67 PID 4076 wrote to memory of 4276 4076 un654418.exe 67 PID 4076 wrote to memory of 4764 4076 un654418.exe 68 PID 4076 wrote to memory of 4764 4076 un654418.exe 68 PID 4076 wrote to memory of 4764 4076 un654418.exe 68 PID 3668 wrote to memory of 3756 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 70 PID 3668 wrote to memory of 3756 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 70 PID 3668 wrote to memory of 3756 3668 35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe"C:\Users\Admin\AppData\Local\Temp\35a9856a264c784f47bbcbd4eef791b26f101886d969dc7ac2b889ebeec310ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654418.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7924.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2414.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si051141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si051141.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55d91ca352df1ff797710a56bd6c72573
SHA1ffe102d7d58c6e616376246234cc72974a8f747b
SHA256f8f09c660ecc072e5594f300d8d32a7d27f45eff56ceb8a41cc5c8c8b01fbc6a
SHA5129ba1e405774c2d83adfba05e42795cf3a48f8eb935862343845df66bfa6b2f5b5afc8574390a8cc192992eba8c4057e17267a7238a3452e2b8091fd4b424e544
-
Filesize
175KB
MD55d91ca352df1ff797710a56bd6c72573
SHA1ffe102d7d58c6e616376246234cc72974a8f747b
SHA256f8f09c660ecc072e5594f300d8d32a7d27f45eff56ceb8a41cc5c8c8b01fbc6a
SHA5129ba1e405774c2d83adfba05e42795cf3a48f8eb935862343845df66bfa6b2f5b5afc8574390a8cc192992eba8c4057e17267a7238a3452e2b8091fd4b424e544
-
Filesize
544KB
MD5efdfff4270e1dd899581cb7aa8945b6f
SHA1691d7649335480e02450cc31f7ff8b065d71755f
SHA256275063db3d81f9895def1d81ea1244594f3e17eb820c071b46b281d7e178bc05
SHA51238f066bdc7ff899096c9c9daaa60f04ee9c4597d35187344b0427e69e448228a67459bf52229d460555b5bfccadb1df6650ea4187c1726068b95b404481df296
-
Filesize
544KB
MD5efdfff4270e1dd899581cb7aa8945b6f
SHA1691d7649335480e02450cc31f7ff8b065d71755f
SHA256275063db3d81f9895def1d81ea1244594f3e17eb820c071b46b281d7e178bc05
SHA51238f066bdc7ff899096c9c9daaa60f04ee9c4597d35187344b0427e69e448228a67459bf52229d460555b5bfccadb1df6650ea4187c1726068b95b404481df296
-
Filesize
326KB
MD5a10b9192053ff3670642938c70faaca8
SHA1cbf6c0750647fd9a718e12343d51605cf7cd2c79
SHA2569d0706132fd52054a0b840d782fae5fd99a5f9f26b57e53aa21cdea0752cd54f
SHA512e4242431f627be5ddb2d3600d2fc59714af418a4ad600fb5c522d14a3482905db756c4f4e51861a760bc024fb3f4f92d59e2e79290b90f8e971286dedf6cd6fb
-
Filesize
326KB
MD5a10b9192053ff3670642938c70faaca8
SHA1cbf6c0750647fd9a718e12343d51605cf7cd2c79
SHA2569d0706132fd52054a0b840d782fae5fd99a5f9f26b57e53aa21cdea0752cd54f
SHA512e4242431f627be5ddb2d3600d2fc59714af418a4ad600fb5c522d14a3482905db756c4f4e51861a760bc024fb3f4f92d59e2e79290b90f8e971286dedf6cd6fb
-
Filesize
384KB
MD5e0b680684fc0b5444afe8b76dc55b25c
SHA1d8b95d250d3f024be8cecdbe1db1bceb17f02055
SHA256822de2ffd8cc12bf6b63a8859be4f2a454fbf3a497a1cc49a4283ccb9f64a433
SHA5121c023fabde3759b3d3e261aaea3c4845079920e38a9c0c03cc76d97d0c2b3c6d6060be769ee52a0dc01bfdee0e96153d05469824d52eec5083385ce95a4da6a5
-
Filesize
384KB
MD5e0b680684fc0b5444afe8b76dc55b25c
SHA1d8b95d250d3f024be8cecdbe1db1bceb17f02055
SHA256822de2ffd8cc12bf6b63a8859be4f2a454fbf3a497a1cc49a4283ccb9f64a433
SHA5121c023fabde3759b3d3e261aaea3c4845079920e38a9c0c03cc76d97d0c2b3c6d6060be769ee52a0dc01bfdee0e96153d05469824d52eec5083385ce95a4da6a5