Analysis
-
max time kernel
49s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26-03-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe
Resource
win10-20230220-en
General
-
Target
fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe
-
Size
686KB
-
MD5
3b7beb8c6b6864629c3c3d032dbdcf96
-
SHA1
940772b58742e518d3f62ce6e7c15577851cebb2
-
SHA256
fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050
-
SHA512
2faf88adee4705b8dd09f15eac7341d3b57b103bd5da2bf027054be38497b6b42e2efcee23a4f0f01a96e6f146bcde13e186e6fa94198414db65260c73229c34
-
SSDEEP
12288:WMrky90UY7wN94zV4Be0Wnxuo/LEW+WWVC7NFAmXWG4O4K2MI5JM:Oyqk7YV8ewojEUWA7otjDM
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8106.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4444-180-0x0000000004800000-0x0000000004846000-memory.dmp family_redline behavioral1/memory/4444-184-0x0000000004B20000-0x0000000004B64000-memory.dmp family_redline behavioral1/memory/4444-185-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-186-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-188-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-190-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-192-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-194-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-196-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-198-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-201-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-203-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-205-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-207-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-209-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-211-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-213-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-215-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-217-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-219-0x0000000004B20000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4444-1100-0x00000000071D0000-0x00000000071E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4088 un438287.exe 2036 pro8106.exe 4444 qu2218.exe 3528 si589800.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8106.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un438287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un438287.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 pro8106.exe 2036 pro8106.exe 4444 qu2218.exe 4444 qu2218.exe 3528 si589800.exe 3528 si589800.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2036 pro8106.exe Token: SeDebugPrivilege 4444 qu2218.exe Token: SeDebugPrivilege 3528 si589800.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4088 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 66 PID 4308 wrote to memory of 4088 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 66 PID 4308 wrote to memory of 4088 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 66 PID 4088 wrote to memory of 2036 4088 un438287.exe 67 PID 4088 wrote to memory of 2036 4088 un438287.exe 67 PID 4088 wrote to memory of 2036 4088 un438287.exe 67 PID 4088 wrote to memory of 4444 4088 un438287.exe 68 PID 4088 wrote to memory of 4444 4088 un438287.exe 68 PID 4088 wrote to memory of 4444 4088 un438287.exe 68 PID 4308 wrote to memory of 3528 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 70 PID 4308 wrote to memory of 3528 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 70 PID 4308 wrote to memory of 3528 4308 fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe"C:\Users\Admin\AppData\Local\Temp\fe2fef223c592bc99899aad74f7b030966ddd464ad19206540ebcefbe4f97050.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438287.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438287.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8106.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2218.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si589800.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si589800.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5713ecaa8c98b3366b74499c6d8f6a366
SHA12a770df9f81b1afc2ee64abeea4c59dcf13a907b
SHA25680a2d83c824c0aa4c3fe7dc5ff291be553033133fc3a3151084b7872e72ba5e0
SHA5127bc80afb5c38f17365e9cb196c7e30c913d92dc4f83f63a339e7f611e8c569f2e849b133395efcd5bdf4d00f58a09d3a2b50b4c5661bebea5fa52f23db997a55
-
Filesize
175KB
MD5713ecaa8c98b3366b74499c6d8f6a366
SHA12a770df9f81b1afc2ee64abeea4c59dcf13a907b
SHA25680a2d83c824c0aa4c3fe7dc5ff291be553033133fc3a3151084b7872e72ba5e0
SHA5127bc80afb5c38f17365e9cb196c7e30c913d92dc4f83f63a339e7f611e8c569f2e849b133395efcd5bdf4d00f58a09d3a2b50b4c5661bebea5fa52f23db997a55
-
Filesize
544KB
MD5a22960090959b8413c5c06b956aefa8a
SHA162dfc485086e895cb7a42bcc9605227925944173
SHA25668b40c013083ffbeb10b8bc677ca8125644f46942fdade6ccf4822a04fd2b370
SHA5123b89600da32d1e436fe02d66b2b34c73a67007367be8a3c628c19c832971484969ffd1b390e2c55b2eebfa485233e1c31d3f7020c22e8434bc87910304682199
-
Filesize
544KB
MD5a22960090959b8413c5c06b956aefa8a
SHA162dfc485086e895cb7a42bcc9605227925944173
SHA25668b40c013083ffbeb10b8bc677ca8125644f46942fdade6ccf4822a04fd2b370
SHA5123b89600da32d1e436fe02d66b2b34c73a67007367be8a3c628c19c832971484969ffd1b390e2c55b2eebfa485233e1c31d3f7020c22e8434bc87910304682199
-
Filesize
325KB
MD58bd313f35b806a973eff3d10cf5c3744
SHA1f1598e4c9eb4679f034fe51f3fa0c90d5d66757b
SHA256023a672871a42b9df2d8c34208c993bf9180cff7e5988407b378c087e80b6d3e
SHA5126c665eb6cdb1939e683b5caa7e704fc116c1e83970bd577b555938cab13f38532d458b9f6b37c248e65a0cb78ddc8b091e021bd56a5442583d5b0a7c4331fbe0
-
Filesize
325KB
MD58bd313f35b806a973eff3d10cf5c3744
SHA1f1598e4c9eb4679f034fe51f3fa0c90d5d66757b
SHA256023a672871a42b9df2d8c34208c993bf9180cff7e5988407b378c087e80b6d3e
SHA5126c665eb6cdb1939e683b5caa7e704fc116c1e83970bd577b555938cab13f38532d458b9f6b37c248e65a0cb78ddc8b091e021bd56a5442583d5b0a7c4331fbe0
-
Filesize
384KB
MD5b009b8705aa959696f8885d7b85ef157
SHA14a45638634b75933f2c0f828b88405fe9dada721
SHA25620928fe48306f07d909af9577d8a46cafc6e6e68ca18c8d1171f772be1bdefdc
SHA512f9cfaa71317cde5753b7645961be19bb787e4031b91ad6cf37fd28c6ebe87f1ea4426cf1b48a166046b4a1648aa519e078c98b28ed2174d2bf279a72c0b118eb
-
Filesize
384KB
MD5b009b8705aa959696f8885d7b85ef157
SHA14a45638634b75933f2c0f828b88405fe9dada721
SHA25620928fe48306f07d909af9577d8a46cafc6e6e68ca18c8d1171f772be1bdefdc
SHA512f9cfaa71317cde5753b7645961be19bb787e4031b91ad6cf37fd28c6ebe87f1ea4426cf1b48a166046b4a1648aa519e078c98b28ed2174d2bf279a72c0b118eb