Analysis
-
max time kernel
56s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 22:13
Static task
static1
Behavioral task
behavioral1
Sample
79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe
Resource
win10-20230220-en
General
-
Target
79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe
-
Size
700KB
-
MD5
3b402a3990da483ba4c9d9f06f4e60ba
-
SHA1
e3fb4efa1b2be9791210cd3810b55425adf8bb77
-
SHA256
79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2
-
SHA512
34fdea30f905e7e6083d17ae74d5b70328f86bd7d4ea8b97ec87493d0a43975318aca1e867c8fdb2a40f7501c964251b6ffea7c90c2dcc1ef8bf3adab6759a7f
-
SSDEEP
12288:gMrfy904yjJ2d0vjduotNgGlB8kM3BQ9c0hFquPhR4:vycgdSoVGlwa9zk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9251.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1088-178-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/1088-179-0x0000000002680000-0x00000000026C4000-memory.dmp family_redline behavioral1/memory/1088-180-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-181-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-183-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-185-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-187-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-189-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-191-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-193-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-195-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-197-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-199-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-201-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-203-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-205-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-207-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-209-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-211-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1088-213-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4960 un847661.exe 3000 pro9251.exe 1088 qu9378.exe 3544 si750618.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9251.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un847661.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un847661.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3000 pro9251.exe 3000 pro9251.exe 1088 qu9378.exe 1088 qu9378.exe 3544 si750618.exe 3544 si750618.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3000 pro9251.exe Token: SeDebugPrivilege 1088 qu9378.exe Token: SeDebugPrivilege 3544 si750618.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4960 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 66 PID 1736 wrote to memory of 4960 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 66 PID 1736 wrote to memory of 4960 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 66 PID 4960 wrote to memory of 3000 4960 un847661.exe 67 PID 4960 wrote to memory of 3000 4960 un847661.exe 67 PID 4960 wrote to memory of 3000 4960 un847661.exe 67 PID 4960 wrote to memory of 1088 4960 un847661.exe 68 PID 4960 wrote to memory of 1088 4960 un847661.exe 68 PID 4960 wrote to memory of 1088 4960 un847661.exe 68 PID 1736 wrote to memory of 3544 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 70 PID 1736 wrote to memory of 3544 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 70 PID 1736 wrote to memory of 3544 1736 79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe"C:\Users\Admin\AppData\Local\Temp\79bf23b178ec5c6651f0b4d4883cca7497ba35b61fe4115a00556df52a8a33b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847661.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9251.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9378.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si750618.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si750618.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dc62dc647251fe3ddd5b2f59f312f3b4
SHA10b448e7a0721628d3cdcdddfda0a6a27bc0589f1
SHA2564d1d83a0406fe64a12ac57e7253d116a2fa9a228328c2a4d8bcf74f4896c5f18
SHA5121b94b35d879de49291385c64131271ed68093fffb82559d887c82875e3a0ba7f33f5e4b80632fb94b6baf9ac651d442d0db315c1c871c4e56878fd231f743740
-
Filesize
175KB
MD5dc62dc647251fe3ddd5b2f59f312f3b4
SHA10b448e7a0721628d3cdcdddfda0a6a27bc0589f1
SHA2564d1d83a0406fe64a12ac57e7253d116a2fa9a228328c2a4d8bcf74f4896c5f18
SHA5121b94b35d879de49291385c64131271ed68093fffb82559d887c82875e3a0ba7f33f5e4b80632fb94b6baf9ac651d442d0db315c1c871c4e56878fd231f743740
-
Filesize
558KB
MD55847ee0c8c1a1df5d9592b864a95b15e
SHA1cfe87f5be7b0f2f6ae8db1983d98b45129630f19
SHA25633d04ad7d38895256e49534aeb22f38c892c0296950d1f18d98b00aa38be9902
SHA512d719a4e17897eaf7602527f7b432d21a0f10744a3ec7c4a5630e8efad15e093f54703fc70ef9fd014555ddfee1f98dbfc361030ea0851f10d2edbcce874d10ed
-
Filesize
558KB
MD55847ee0c8c1a1df5d9592b864a95b15e
SHA1cfe87f5be7b0f2f6ae8db1983d98b45129630f19
SHA25633d04ad7d38895256e49534aeb22f38c892c0296950d1f18d98b00aa38be9902
SHA512d719a4e17897eaf7602527f7b432d21a0f10744a3ec7c4a5630e8efad15e093f54703fc70ef9fd014555ddfee1f98dbfc361030ea0851f10d2edbcce874d10ed
-
Filesize
307KB
MD5746266d3fc3b6af20107dbe647652c93
SHA1efd827117a16fe0fa461a7573c82a19c08524b2e
SHA256548d1b8884e93964c648a0c94b346f8f5ed28c71ffc5ba2a94e7f0cc43ea5476
SHA51241020cd1be1f81d71ea282f245e12df309c9d9580c5fad404c88a6b8d1e3d6ebeb0ba2796ce66c5745e6c8e57d32ff32cf29ecfaadbf84d6d30bf9c31c7d04cd
-
Filesize
307KB
MD5746266d3fc3b6af20107dbe647652c93
SHA1efd827117a16fe0fa461a7573c82a19c08524b2e
SHA256548d1b8884e93964c648a0c94b346f8f5ed28c71ffc5ba2a94e7f0cc43ea5476
SHA51241020cd1be1f81d71ea282f245e12df309c9d9580c5fad404c88a6b8d1e3d6ebeb0ba2796ce66c5745e6c8e57d32ff32cf29ecfaadbf84d6d30bf9c31c7d04cd
-
Filesize
365KB
MD5d88410ca5570cccd03d6fec244e533bd
SHA1ca337db1f300e91e0e4dea2edf91f96862eb61b6
SHA2562b26f619aa8c30aedfe33dd7581ece17468a61e46064088f9478a56c2a8aff5e
SHA512302a55e0188127790cc813ee6b0ecadc9a65684cf6d51e833cc7fa08dc8147e2d469b4a842538ff2bafcde2a473a6b437d6bbbfac5a1360f6bfc679c7565b561
-
Filesize
365KB
MD5d88410ca5570cccd03d6fec244e533bd
SHA1ca337db1f300e91e0e4dea2edf91f96862eb61b6
SHA2562b26f619aa8c30aedfe33dd7581ece17468a61e46064088f9478a56c2a8aff5e
SHA512302a55e0188127790cc813ee6b0ecadc9a65684cf6d51e833cc7fa08dc8147e2d469b4a842538ff2bafcde2a473a6b437d6bbbfac5a1360f6bfc679c7565b561