Analysis
-
max time kernel
52s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 22:14
Static task
static1
Behavioral task
behavioral1
Sample
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe
Resource
win10-20230220-en
General
-
Target
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe
-
Size
699KB
-
MD5
10619f6a2bf6b929981c72917e308a05
-
SHA1
b0085e52f46056c7ae391adba1af8b2783704f87
-
SHA256
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0
-
SHA512
11aea4bb8e7123ceaa6fe13693be583f9a0f2eaaf8efaead66b8c4c4a10c0f8e095c49d9419966f6e775e04cca58b37aff85c630fde0b783598347a2538f9301
-
SSDEEP
12288:oMrry90cICddHIEql9DuZcAY+pHLNDk0W9ea/b4m8Qixj7dO1zTQzqOC:TyrIQzY+pC0W4Akm8lxHdWzTn3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9825.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4748-180-0x0000000002320000-0x0000000002366000-memory.dmp family_redline behavioral1/memory/4748-182-0x0000000002820000-0x0000000002864000-memory.dmp family_redline behavioral1/memory/4748-186-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-187-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-189-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-191-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-193-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-195-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-197-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-199-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-201-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-203-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-205-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-207-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-209-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-211-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-213-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-215-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-217-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-219-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4748-1101-0x0000000004E10000-0x0000000004E20000-memory.dmp family_redline behavioral1/memory/4748-1102-0x0000000004E10000-0x0000000004E20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3488 un388256.exe 2692 pro9825.exe 4748 qu6635.exe 1252 si563325.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9825.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un388256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un388256.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 pro9825.exe 2692 pro9825.exe 4748 qu6635.exe 4748 qu6635.exe 1252 si563325.exe 1252 si563325.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro9825.exe Token: SeDebugPrivilege 4748 qu6635.exe Token: SeDebugPrivilege 1252 si563325.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3488 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 66 PID 4024 wrote to memory of 3488 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 66 PID 4024 wrote to memory of 3488 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 66 PID 3488 wrote to memory of 2692 3488 un388256.exe 67 PID 3488 wrote to memory of 2692 3488 un388256.exe 67 PID 3488 wrote to memory of 2692 3488 un388256.exe 67 PID 3488 wrote to memory of 4748 3488 un388256.exe 68 PID 3488 wrote to memory of 4748 3488 un388256.exe 68 PID 3488 wrote to memory of 4748 3488 un388256.exe 68 PID 4024 wrote to memory of 1252 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 70 PID 4024 wrote to memory of 1252 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 70 PID 4024 wrote to memory of 1252 4024 24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe"C:\Users\Admin\AppData\Local\Temp\24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388256.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388256.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9825.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6635.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563325.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c9f4008127658661036ec1c027556fb0
SHA1654c1e2a6ed62ce2ac16734e77f0e61d79063bd1
SHA256a31205530e764880217dc7bb13ba47bccc170fa83e702efa5c8b0527adfedaca
SHA512387070065ab75507f1f14280743b54ff9505e488aecca02668df9dd1c1e37d6a856341b24cd417b723c4fda0a6af598e71c883def9ee6550a34be8419ad5c07c
-
Filesize
175KB
MD5c9f4008127658661036ec1c027556fb0
SHA1654c1e2a6ed62ce2ac16734e77f0e61d79063bd1
SHA256a31205530e764880217dc7bb13ba47bccc170fa83e702efa5c8b0527adfedaca
SHA512387070065ab75507f1f14280743b54ff9505e488aecca02668df9dd1c1e37d6a856341b24cd417b723c4fda0a6af598e71c883def9ee6550a34be8419ad5c07c
-
Filesize
558KB
MD5f5fabe9894292e7fca4963ed2d11b473
SHA178259fd3a4c70a0c4eaab4dffc5d1869c3b960fd
SHA256b71afef0ac389137e6d2fd838af031240338c4f4d835dd9008ecc6185e8074ce
SHA5123d38f95df3bc2a267c1ed88a43dbd62a2e8ecf43d74e59a6b98bc4317a1c11079240be126132260495daca03186552c649fe15d1e26ae7751512435de0e71239
-
Filesize
558KB
MD5f5fabe9894292e7fca4963ed2d11b473
SHA178259fd3a4c70a0c4eaab4dffc5d1869c3b960fd
SHA256b71afef0ac389137e6d2fd838af031240338c4f4d835dd9008ecc6185e8074ce
SHA5123d38f95df3bc2a267c1ed88a43dbd62a2e8ecf43d74e59a6b98bc4317a1c11079240be126132260495daca03186552c649fe15d1e26ae7751512435de0e71239
-
Filesize
307KB
MD5e383d587eee0a7cf6c7f3d46b373416d
SHA1a17462c0a0bfd511611977361c705a8a3ac5e5d7
SHA25620f4c18530c94b9ff206390b4edea8164fde755822366e83264d9122c20cedb9
SHA512a33f38ae2ada7f67c574c1cf2a61dd1fc9f8d6763d09a23a507d8fa753baa04a817e49177093693e893c90236d231a32f7a890682469a923ad5eb1e210c28c4b
-
Filesize
307KB
MD5e383d587eee0a7cf6c7f3d46b373416d
SHA1a17462c0a0bfd511611977361c705a8a3ac5e5d7
SHA25620f4c18530c94b9ff206390b4edea8164fde755822366e83264d9122c20cedb9
SHA512a33f38ae2ada7f67c574c1cf2a61dd1fc9f8d6763d09a23a507d8fa753baa04a817e49177093693e893c90236d231a32f7a890682469a923ad5eb1e210c28c4b
-
Filesize
365KB
MD572a2ec36098a519a4a09144dcaff955e
SHA10ad7044c05f80df431e913248f557a6d1a27afe5
SHA2569706d56ba3b4fc0c7f8dd13ed9ec9bc0dac530372a51421dc36ee59f768714c8
SHA51234a5533d17977e62b82a40a5a7dd7b35981c112503ccd962ba4b7e4516cfb9019f384f4cac27e3fe56feb4a5cba981e0bd5d988edce802f1dc26249b9c6d8d7a
-
Filesize
365KB
MD572a2ec36098a519a4a09144dcaff955e
SHA10ad7044c05f80df431e913248f557a6d1a27afe5
SHA2569706d56ba3b4fc0c7f8dd13ed9ec9bc0dac530372a51421dc36ee59f768714c8
SHA51234a5533d17977e62b82a40a5a7dd7b35981c112503ccd962ba4b7e4516cfb9019f384f4cac27e3fe56feb4a5cba981e0bd5d988edce802f1dc26249b9c6d8d7a