Analysis
-
max time kernel
79s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 17:56
Static task
static1
Behavioral task
behavioral1
Sample
40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe
Resource
win10v2004-20230220-en
General
-
Target
40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe
-
Size
686KB
-
MD5
aaece352b381652939d4e610a027edca
-
SHA1
7c62501547213f24d22864d9d678a5229e40bc6b
-
SHA256
40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3
-
SHA512
a17f69f08af0869c96d03e2175b299c1d6c575201819c357610a23f2fc0d8585c5902b0aed014c879acf360fe370bb2248477953f924fb29f466fff4fb1bd827
-
SSDEEP
12288:lMray905YUzgp8g7wimt2f/jZHRLhCZPeEJhip0HQ56XA4b2GfHB:Xy/gDimt2f7twIyHd
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2400.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1196-194-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-195-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-197-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-199-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-201-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-203-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-205-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-207-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-209-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-211-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-213-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-215-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-217-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-219-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-221-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-223-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-225-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-227-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1196-1111-0x0000000007290000-0x00000000072A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1172 un608231.exe 1420 pro2400.exe 1196 qu9917.exe 636 si251735.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2400.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un608231.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un608231.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 pro2400.exe 1420 pro2400.exe 1196 qu9917.exe 1196 qu9917.exe 636 si251735.exe 636 si251735.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1420 pro2400.exe Token: SeDebugPrivilege 1196 qu9917.exe Token: SeDebugPrivilege 636 si251735.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 436 wrote to memory of 1172 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 85 PID 436 wrote to memory of 1172 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 85 PID 436 wrote to memory of 1172 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 85 PID 1172 wrote to memory of 1420 1172 un608231.exe 86 PID 1172 wrote to memory of 1420 1172 un608231.exe 86 PID 1172 wrote to memory of 1420 1172 un608231.exe 86 PID 1172 wrote to memory of 1196 1172 un608231.exe 90 PID 1172 wrote to memory of 1196 1172 un608231.exe 90 PID 1172 wrote to memory of 1196 1172 un608231.exe 90 PID 436 wrote to memory of 636 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 94 PID 436 wrote to memory of 636 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 94 PID 436 wrote to memory of 636 436 40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe"C:\Users\Admin\AppData\Local\Temp\40fad2c24c3a6c8502d5a5255456478b44c3990177012f6b0a95c5dc89ab49d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un608231.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un608231.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2400.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2400.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9917.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9917.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si251735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si251735.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51d758710a97bebd096e28951b7d15f51
SHA1171b514a8d2e5aa590c0a26fc2ec9023d6412d08
SHA256ac793ef198d48750bccec4e75362c0eca8e453030bd4580f6fa540e06e33283c
SHA5128baaa27a657e10b22396c9f483418cb8661d8aac042381972aa602a6c01d0cd107b0c41637ed3229eb6303eae3d49eb6321fd891a311bee9ba9f924f567677c6
-
Filesize
175KB
MD51d758710a97bebd096e28951b7d15f51
SHA1171b514a8d2e5aa590c0a26fc2ec9023d6412d08
SHA256ac793ef198d48750bccec4e75362c0eca8e453030bd4580f6fa540e06e33283c
SHA5128baaa27a657e10b22396c9f483418cb8661d8aac042381972aa602a6c01d0cd107b0c41637ed3229eb6303eae3d49eb6321fd891a311bee9ba9f924f567677c6
-
Filesize
544KB
MD57efd45e0bb7af47d8f27ec7c6eda4663
SHA152141033dd16732f79b20d5f0705f6623d8ed656
SHA256e81411d0856bfb2a547a6ecf2b1cc33b96d86b18ac1f29b0cdd34ce169894c45
SHA5128af10d839ba8a16e54e16920aa984ffaed22c9c32df5e6c03cca017fb4926e0c4c77140b5d1784c2e80cda232ebaa10ae173def5d7ae0978f1c6ce9d5d663a55
-
Filesize
544KB
MD57efd45e0bb7af47d8f27ec7c6eda4663
SHA152141033dd16732f79b20d5f0705f6623d8ed656
SHA256e81411d0856bfb2a547a6ecf2b1cc33b96d86b18ac1f29b0cdd34ce169894c45
SHA5128af10d839ba8a16e54e16920aa984ffaed22c9c32df5e6c03cca017fb4926e0c4c77140b5d1784c2e80cda232ebaa10ae173def5d7ae0978f1c6ce9d5d663a55
-
Filesize
325KB
MD55fea307cb82d07a016d34a69af55ec2d
SHA1882e12b33d3af00fac47943eb5a711ea31c3801c
SHA256b5419b4a1afc83525196770b08e8ade3efbde38b07bad42c12fd8edf6173ac40
SHA51287eb6577ecbf7e959e753f12f161075fc89b5b426116897b9814dcccfa8f729667cd811a7697b68edb6ef03203ec680668fb4573b011100593d3fad0724f5394
-
Filesize
325KB
MD55fea307cb82d07a016d34a69af55ec2d
SHA1882e12b33d3af00fac47943eb5a711ea31c3801c
SHA256b5419b4a1afc83525196770b08e8ade3efbde38b07bad42c12fd8edf6173ac40
SHA51287eb6577ecbf7e959e753f12f161075fc89b5b426116897b9814dcccfa8f729667cd811a7697b68edb6ef03203ec680668fb4573b011100593d3fad0724f5394
-
Filesize
384KB
MD50e455df399f33d08b66a257034e63f82
SHA1b572ab3bb5f6c5fecb7d2cb287795aa109be43ee
SHA25617b5b52f1b5d7d5ecf507667c07024bf2be31d090137f69c9847d2b692b76d44
SHA5124ee442fdf0372fcaa89aeee16bf05d908d87d61b9663b4541233a6012e510d3261da995cf764986bff145df3d9faf081ca1b68f845036c27b92d09fa3e65ccbd
-
Filesize
384KB
MD50e455df399f33d08b66a257034e63f82
SHA1b572ab3bb5f6c5fecb7d2cb287795aa109be43ee
SHA25617b5b52f1b5d7d5ecf507667c07024bf2be31d090137f69c9847d2b692b76d44
SHA5124ee442fdf0372fcaa89aeee16bf05d908d87d61b9663b4541233a6012e510d3261da995cf764986bff145df3d9faf081ca1b68f845036c27b92d09fa3e65ccbd