Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe
Resource
win10-20230220-en
General
-
Target
8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe
-
Size
699KB
-
MD5
afeab8491cc55a906e832b0a9f4c3516
-
SHA1
6360a04d8965a99b9fe5c4c2ede8264422e10d12
-
SHA256
8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a
-
SHA512
e0dc2966f4d2df832e86af1577e6f14c5856c0413308082ffd0c9de02bfee147a3db942a56a6e114a287bffaced4ae33f5a8ec82da09df8e6539617c21840c28
-
SSDEEP
12288:UMrVy90dlZoa7WWm0p9DoNcAQg8F5lMN/ZiNXBV+1QaAeoSe+r:RyAVEQg8zlMNRiNX6CaAfgr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3596.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4384-180-0x00000000025D0000-0x0000000002616000-memory.dmp family_redline behavioral1/memory/4384-181-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4384-182-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-183-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-185-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-187-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-189-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-191-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-193-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-195-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-197-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-199-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-201-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-203-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-205-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-207-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-209-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-211-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-213-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-215-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4384-337-0x00000000009A0000-0x00000000009B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2432 un359920.exe 2588 pro3596.exe 4384 qu6089.exe 3900 si855656.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3596.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3596.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un359920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un359920.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2588 pro3596.exe 2588 pro3596.exe 4384 qu6089.exe 4384 qu6089.exe 3900 si855656.exe 3900 si855656.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2588 pro3596.exe Token: SeDebugPrivilege 4384 qu6089.exe Token: SeDebugPrivilege 3900 si855656.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2432 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 66 PID 2132 wrote to memory of 2432 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 66 PID 2132 wrote to memory of 2432 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 66 PID 2432 wrote to memory of 2588 2432 un359920.exe 67 PID 2432 wrote to memory of 2588 2432 un359920.exe 67 PID 2432 wrote to memory of 2588 2432 un359920.exe 67 PID 2432 wrote to memory of 4384 2432 un359920.exe 68 PID 2432 wrote to memory of 4384 2432 un359920.exe 68 PID 2432 wrote to memory of 4384 2432 un359920.exe 68 PID 2132 wrote to memory of 3900 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 70 PID 2132 wrote to memory of 3900 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 70 PID 2132 wrote to memory of 3900 2132 8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe"C:\Users\Admin\AppData\Local\Temp\8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cc21a698513f5a6d54a189ca87138b5d
SHA1ddffe978623b1ce01628107e9abfbf70b4464a79
SHA2561d45c2bf736928d1be827ddfc0464bbc27549374b7512eb6d3ee45d52ca08fdb
SHA512ad9fb364d60b79c87395e335860504324fd900098bf9e5788ffbe0332a8fdd01c1dd40e5976c82d76644bfa638c31233e9bcd57c172432a19e11c8cf1be1ffb2
-
Filesize
175KB
MD5cc21a698513f5a6d54a189ca87138b5d
SHA1ddffe978623b1ce01628107e9abfbf70b4464a79
SHA2561d45c2bf736928d1be827ddfc0464bbc27549374b7512eb6d3ee45d52ca08fdb
SHA512ad9fb364d60b79c87395e335860504324fd900098bf9e5788ffbe0332a8fdd01c1dd40e5976c82d76644bfa638c31233e9bcd57c172432a19e11c8cf1be1ffb2
-
Filesize
558KB
MD5efb19515ca19f69e752d781a97e4e212
SHA1f9a6e5c9bc8637dcfc5ab3c434137def719fa948
SHA256f5122b9035a1a977ec64bc8fd4ce5c4014cfd1b1c0500fecb348c1b734a37087
SHA512836fb39a283848581d7483129cb9578ad3b8d23502940f890b641c33629a0d0d9966adc2d90d9cfa1b041426c2f2fd47b3e8e07ce0e032512e3b0de7e276702e
-
Filesize
558KB
MD5efb19515ca19f69e752d781a97e4e212
SHA1f9a6e5c9bc8637dcfc5ab3c434137def719fa948
SHA256f5122b9035a1a977ec64bc8fd4ce5c4014cfd1b1c0500fecb348c1b734a37087
SHA512836fb39a283848581d7483129cb9578ad3b8d23502940f890b641c33629a0d0d9966adc2d90d9cfa1b041426c2f2fd47b3e8e07ce0e032512e3b0de7e276702e
-
Filesize
307KB
MD53d97b82b583b776fbdeaad67c51b9462
SHA19237b8e0aef485b872763acdb5adb8ac7c539e00
SHA2565ac5dfcadb5073e66db650664714a7a34313e855fb1aa88aaab3da41126581c1
SHA512775b6844378f3d9c80ab1f7c1ae6a39b428045fcebca2961fd5d857a1c1bf46cc6fd0a58bd779fcb0e024c8112593649374708d9a575e1e952579e9cf4405e0f
-
Filesize
307KB
MD53d97b82b583b776fbdeaad67c51b9462
SHA19237b8e0aef485b872763acdb5adb8ac7c539e00
SHA2565ac5dfcadb5073e66db650664714a7a34313e855fb1aa88aaab3da41126581c1
SHA512775b6844378f3d9c80ab1f7c1ae6a39b428045fcebca2961fd5d857a1c1bf46cc6fd0a58bd779fcb0e024c8112593649374708d9a575e1e952579e9cf4405e0f
-
Filesize
365KB
MD5d45e5d94aeed35fd6598ba73ac50ced8
SHA1ff458e286d3756892272bfebd55b83f1fbb7b0fb
SHA256d1f4074bd732be08f2ab83519beb3ce4432042ac7c2ae7d415ae04809cf322a3
SHA512a4318de9d4fc92bd02380e74accf497b70eefd7ee48a73a0725860d30ff03a85bdadb5a82697f065964f7e370b9ccfd5c590f21fc449690e2bcde32f7ad369f3
-
Filesize
365KB
MD5d45e5d94aeed35fd6598ba73ac50ced8
SHA1ff458e286d3756892272bfebd55b83f1fbb7b0fb
SHA256d1f4074bd732be08f2ab83519beb3ce4432042ac7c2ae7d415ae04809cf322a3
SHA512a4318de9d4fc92bd02380e74accf497b70eefd7ee48a73a0725860d30ff03a85bdadb5a82697f065964f7e370b9ccfd5c590f21fc449690e2bcde32f7ad369f3