Analysis
-
max time kernel
45s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 22:11
Static task
static1
Behavioral task
behavioral1
Sample
de1eea25820f29bb1577de6c94741223.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
de1eea25820f29bb1577de6c94741223.exe
Resource
win10v2004-20230220-en
General
-
Target
de1eea25820f29bb1577de6c94741223.exe
-
Size
700KB
-
MD5
de1eea25820f29bb1577de6c94741223
-
SHA1
b111f79864ebdfd08a4f46798572eaabeb463d15
-
SHA256
efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af
-
SHA512
76bc290b0777c136ee66163d838fdcc41b9ecc0310509c86f35a05fb1e6a2db99f63095e4605f451e551db9536cc63ce3173b7f7bc788c3aae7d8c7d1e9e8aff
-
SSDEEP
12288:gMrby900qvhf41tO6hFwMf9DSrcAL8F38pOmEPWUBgjquP4XbKRbkxdqaABpH:ryqf41k6hn+L8VAsDg+uP4XbKlidqxBl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5811.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5811.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1356-123-0x00000000022B0000-0x00000000022F6000-memory.dmp family_redline behavioral1/memory/1356-124-0x0000000002410000-0x0000000002454000-memory.dmp family_redline behavioral1/memory/1356-125-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-126-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-128-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-130-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-132-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-134-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-136-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-138-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-140-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-142-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-144-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-146-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-148-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-150-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-152-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-154-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-156-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-158-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/1356-1033-0x0000000004E10000-0x0000000004E50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1528 un296880.exe 572 pro5811.exe 1356 qu2206.exe 960 si297584.exe -
Loads dropped DLL 10 IoCs
pid Process 1532 de1eea25820f29bb1577de6c94741223.exe 1528 un296880.exe 1528 un296880.exe 1528 un296880.exe 572 pro5811.exe 1528 un296880.exe 1528 un296880.exe 1356 qu2206.exe 1532 de1eea25820f29bb1577de6c94741223.exe 960 si297584.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5811.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un296880.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce de1eea25820f29bb1577de6c94741223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de1eea25820f29bb1577de6c94741223.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un296880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 572 pro5811.exe 572 pro5811.exe 1356 qu2206.exe 1356 qu2206.exe 960 si297584.exe 960 si297584.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 572 pro5811.exe Token: SeDebugPrivilege 1356 qu2206.exe Token: SeDebugPrivilege 960 si297584.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1532 wrote to memory of 1528 1532 de1eea25820f29bb1577de6c94741223.exe 28 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 572 1528 un296880.exe 29 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1528 wrote to memory of 1356 1528 un296880.exe 30 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32 PID 1532 wrote to memory of 960 1532 de1eea25820f29bb1577de6c94741223.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\de1eea25820f29bb1577de6c94741223.exe"C:\Users\Admin\AppData\Local\Temp\de1eea25820f29bb1577de6c94741223.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296880.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296880.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5811.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2206.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297584.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0