Analysis
-
max time kernel
131s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 16:55
Static task
static1
Behavioral task
behavioral1
Sample
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe
Resource
win10v2004-20230221-en
General
-
Target
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe
-
Size
685KB
-
MD5
5873a2e6e767dd09b70c57b0f098cd31
-
SHA1
eaa5469600568d26ce2b0be3720cb6d4a8fdb03f
-
SHA256
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
SHA512
3438d8376e01b5b9f8301dd6fa6c488f6440a4d589d191206433a2fd2fbb14718e6d2a8b7b2a5401dfd158c3681630814924a9e10f2ba9755bb0d4986cd02f1f
-
SSDEEP
12288:fMrKy90GHnQy70dGyOJlHa4WjOrSZiZ5FEvOjJg6Mc4w2m+Y4sqYB:FylAG/Ha4dN5WGjJH4sd
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1596-191-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-190-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-193-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-200-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-196-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-202-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-204-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-206-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-208-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-210-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-212-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-216-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-214-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-218-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-220-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-222-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-224-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/1596-226-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2304 un647047.exe 4364 pro7336.exe 1596 qu9075.exe 3636 si477485.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7336.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un647047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un647047.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1100 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4364 pro7336.exe 4364 pro7336.exe 1596 qu9075.exe 1596 qu9075.exe 3636 si477485.exe 3636 si477485.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4364 pro7336.exe Token: SeDebugPrivilege 1596 qu9075.exe Token: SeDebugPrivilege 3636 si477485.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2304 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 86 PID 1264 wrote to memory of 2304 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 86 PID 1264 wrote to memory of 2304 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 86 PID 2304 wrote to memory of 4364 2304 un647047.exe 87 PID 2304 wrote to memory of 4364 2304 un647047.exe 87 PID 2304 wrote to memory of 4364 2304 un647047.exe 87 PID 2304 wrote to memory of 1596 2304 un647047.exe 91 PID 2304 wrote to memory of 1596 2304 un647047.exe 91 PID 2304 wrote to memory of 1596 2304 un647047.exe 91 PID 1264 wrote to memory of 3636 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 93 PID 1264 wrote to memory of 3636 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 93 PID 1264 wrote to memory of 3636 1264 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe"C:\Users\Admin\AppData\Local\Temp\cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7336.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9075.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477485.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5aff4cc2c983859db6284240db9780ec1
SHA17d076ecb395b3a9a42842f17172419b95f43f94c
SHA256e583bfb7e1cdbf6a45f48a00fdc0a90c69e87950b92670bc24856203f0272a03
SHA51234cb63295903ee9cf69e3e846e217d1f63e92451b321d6a12d527cfbb0f2ccb70ad2f44d1762ce722e397049cbbde9b41504d8e637461c6772872e6d74c8abf7
-
Filesize
175KB
MD5aff4cc2c983859db6284240db9780ec1
SHA17d076ecb395b3a9a42842f17172419b95f43f94c
SHA256e583bfb7e1cdbf6a45f48a00fdc0a90c69e87950b92670bc24856203f0272a03
SHA51234cb63295903ee9cf69e3e846e217d1f63e92451b321d6a12d527cfbb0f2ccb70ad2f44d1762ce722e397049cbbde9b41504d8e637461c6772872e6d74c8abf7
-
Filesize
544KB
MD599a06c47eabfabd9217b63922b811f8c
SHA12d56079ada889c7dcb3bb0dd1515dd12fed203e8
SHA256306dfd2f9d2452b2ac277053d1ea743b1101dcf9bcf8e472f4ceb4d5b7f254b7
SHA5121480c6d80718fd7ba455ae170a7e6e5ec131ff63d4db589315552e0ac63a78dc8585a499303af5baf8d431d50f64a12b5e0d0ce5f6b959d89afe05b9f34ba0c0
-
Filesize
544KB
MD599a06c47eabfabd9217b63922b811f8c
SHA12d56079ada889c7dcb3bb0dd1515dd12fed203e8
SHA256306dfd2f9d2452b2ac277053d1ea743b1101dcf9bcf8e472f4ceb4d5b7f254b7
SHA5121480c6d80718fd7ba455ae170a7e6e5ec131ff63d4db589315552e0ac63a78dc8585a499303af5baf8d431d50f64a12b5e0d0ce5f6b959d89afe05b9f34ba0c0
-
Filesize
325KB
MD54f902904a145e357bab3aa0626fc81df
SHA144b1b3f8efd7ac081b706105d92fb6160d1f63e5
SHA2566795ca593e37a6f96b6ec679d9be971df0077db240ba88c8cb37c568f599bd2d
SHA512fba556f1e32b6329ebaa14016312cd38148e3b26d596309eb08f281af4db860eead966663008c330a8d8ba10fdd09ce4667bc0e098e556d0a3e9af1dae627485
-
Filesize
325KB
MD54f902904a145e357bab3aa0626fc81df
SHA144b1b3f8efd7ac081b706105d92fb6160d1f63e5
SHA2566795ca593e37a6f96b6ec679d9be971df0077db240ba88c8cb37c568f599bd2d
SHA512fba556f1e32b6329ebaa14016312cd38148e3b26d596309eb08f281af4db860eead966663008c330a8d8ba10fdd09ce4667bc0e098e556d0a3e9af1dae627485
-
Filesize
384KB
MD5461398ae701db529c82b245bc7acc831
SHA1eb966f74e5c02e61bcbdd4f9a5bf83e28d120d44
SHA25665ac4453bf7d95bce2e8b96247dbf95bfa30fa957c991ba9c79b522f2514903f
SHA512aa3462d826d2a7fca52248c552ddede9c6c5bccdf23bf7ae334c29b49210bdda600b1fffce853e1aa0581819b4ae42dd8497923b13eb94e648fcdf471ab9a145
-
Filesize
384KB
MD5461398ae701db529c82b245bc7acc831
SHA1eb966f74e5c02e61bcbdd4f9a5bf83e28d120d44
SHA25665ac4453bf7d95bce2e8b96247dbf95bfa30fa957c991ba9c79b522f2514903f
SHA512aa3462d826d2a7fca52248c552ddede9c6c5bccdf23bf7ae334c29b49210bdda600b1fffce853e1aa0581819b4ae42dd8497923b13eb94e648fcdf471ab9a145