Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:27
Static task
static1
Behavioral task
behavioral1
Sample
0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe
Resource
win10v2004-20230221-en
General
-
Target
0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe
-
Size
695KB
-
MD5
98fb2ff21af33f082259195627e90802
-
SHA1
dc9963e398813e9551cc32b15c410fbd6b447a1e
-
SHA256
0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08
-
SHA512
898d28ba2bba703af467d7878675aa7f1d346df503ae1de67707aa22076e8ee3406b3a13793031b65c9d6e6f8bc7c4b60206ce87c119ef3086eb7c1925f9bab7
-
SSDEEP
12288:eMrUy90gF2YgTCErapzdnDtwV8dudleEbVxefWCSkmG8x0BzgjHJiobhF9:iyRgWmaXnxc8dcleEbDefWxkCigTUkz9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8611.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8611.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4928-190-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-199-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-201-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-203-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-205-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-207-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-219-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-221-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-223-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4928-1112-0x0000000004DE0000-0x0000000004DF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3684 un943933.exe 4376 pro8611.exe 4928 qu0625.exe 456 si344799.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8611.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un943933.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un943933.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4376 pro8611.exe 4376 pro8611.exe 4928 qu0625.exe 4928 qu0625.exe 456 si344799.exe 456 si344799.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4376 pro8611.exe Token: SeDebugPrivilege 4928 qu0625.exe Token: SeDebugPrivilege 456 si344799.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3684 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 82 PID 1188 wrote to memory of 3684 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 82 PID 1188 wrote to memory of 3684 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 82 PID 3684 wrote to memory of 4376 3684 un943933.exe 83 PID 3684 wrote to memory of 4376 3684 un943933.exe 83 PID 3684 wrote to memory of 4376 3684 un943933.exe 83 PID 3684 wrote to memory of 4928 3684 un943933.exe 87 PID 3684 wrote to memory of 4928 3684 un943933.exe 87 PID 3684 wrote to memory of 4928 3684 un943933.exe 87 PID 1188 wrote to memory of 456 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 88 PID 1188 wrote to memory of 456 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 88 PID 1188 wrote to memory of 456 1188 0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe"C:\Users\Admin\AppData\Local\Temp\0c9a7186c19c9664fbc5a2e08f603bf7a02920bbd4abf54230b9fbbb5080bf08.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943933.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943933.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8611.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0625.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0625.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si344799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si344799.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ba21be96ed2fcb2273eba917a62cc507
SHA1e1b3357822e0b050cbe3462c135d0e2c86e5d187
SHA2568da667bf9eef34fffa06126ec9cc27011b078b95d38dd0713aaccd74c8f4b3fe
SHA51238dd19b3f822cd88988f0b2bf27cd68919d99cfb603da5550a209a5d586794f9ac070d939143470291fc7c7f7f9266d97d030e9128a253f3ce01c3d548cb6fcf
-
Filesize
175KB
MD5ba21be96ed2fcb2273eba917a62cc507
SHA1e1b3357822e0b050cbe3462c135d0e2c86e5d187
SHA2568da667bf9eef34fffa06126ec9cc27011b078b95d38dd0713aaccd74c8f4b3fe
SHA51238dd19b3f822cd88988f0b2bf27cd68919d99cfb603da5550a209a5d586794f9ac070d939143470291fc7c7f7f9266d97d030e9128a253f3ce01c3d548cb6fcf
-
Filesize
553KB
MD51d593d8346aba2a4330ccc60124d6e78
SHA122752c6189fc9359b760d81e02e50225119fac8a
SHA2569d3e7a7e365ae1c97612cc14e18de6b62c851e23cdf0a85226036e758ea2ac1f
SHA5125da5c1d03c975de144ae5a202762e6823256ebb63807f89a778d6d22ebc05a9c447c6ec4adb095017c9348ff37bc2603077213cf3e20cdea627b9d7bff6feb82
-
Filesize
553KB
MD51d593d8346aba2a4330ccc60124d6e78
SHA122752c6189fc9359b760d81e02e50225119fac8a
SHA2569d3e7a7e365ae1c97612cc14e18de6b62c851e23cdf0a85226036e758ea2ac1f
SHA5125da5c1d03c975de144ae5a202762e6823256ebb63807f89a778d6d22ebc05a9c447c6ec4adb095017c9348ff37bc2603077213cf3e20cdea627b9d7bff6feb82
-
Filesize
308KB
MD5ee771d0ed5733a2eca9683231e101b51
SHA131cd3777c106137a0787c38033430e4a3d179349
SHA2568e9445b391667b66c7fa467fc1e1eb7d8292a1a11124431bbf4bf21f180ba150
SHA512a769b1178a4366d279de093d674b0e1d3e952c1a856d03cf8a5da09d4d645470402445477a21edf4a6e9dbc3918485a0e797a26a10a85acb412fd7a639c240ed
-
Filesize
308KB
MD5ee771d0ed5733a2eca9683231e101b51
SHA131cd3777c106137a0787c38033430e4a3d179349
SHA2568e9445b391667b66c7fa467fc1e1eb7d8292a1a11124431bbf4bf21f180ba150
SHA512a769b1178a4366d279de093d674b0e1d3e952c1a856d03cf8a5da09d4d645470402445477a21edf4a6e9dbc3918485a0e797a26a10a85acb412fd7a639c240ed
-
Filesize
366KB
MD5130df444cd44005e5815457d6d046514
SHA1e3f3e9ad63b16c2ac770f087b1250502b4b5592f
SHA2561147d106d561361b0b8f4c8dc29e3ae46c268a60d9373916a9b6d18a1e3d502c
SHA51241d522692ffa34fa92f94f717d2c2790e115180e1759f87299ee84c7dc2a0ddf1c800e3b1a968b39beef1a811f38775e6c8a8f802e18c8defaba06aff21a77ec
-
Filesize
366KB
MD5130df444cd44005e5815457d6d046514
SHA1e3f3e9ad63b16c2ac770f087b1250502b4b5592f
SHA2561147d106d561361b0b8f4c8dc29e3ae46c268a60d9373916a9b6d18a1e3d502c
SHA51241d522692ffa34fa92f94f717d2c2790e115180e1759f87299ee84c7dc2a0ddf1c800e3b1a968b39beef1a811f38775e6c8a8f802e18c8defaba06aff21a77ec