Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:35
Static task
static1
Behavioral task
behavioral1
Sample
128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe
Resource
win10-20230220-en
General
-
Target
128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe
-
Size
700KB
-
MD5
459504d31915ebd972ac5f41fa3a8c54
-
SHA1
137c15974bdce3ff852945faab32e1d2b5f20328
-
SHA256
128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878
-
SHA512
b41c824cf75b602db9b230a9189f08caf34e6b033310094d9f753f9fb6b8b6672c6243d90d8734df3ebe83d08ebe8c2928a0026d493f7c61942c70d1b0203e35
-
SSDEEP
12288:LMr+y9004F9ltceHkc3eb6rc5SxMbXuLxlEGJEK7WPeuZDeBH:Byz47VkcHY5SxMbXWDf7WPeoqBH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3744.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4764-175-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/4764-179-0x0000000002780000-0x00000000027C4000-memory.dmp family_redline behavioral1/memory/4764-181-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-180-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-183-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-185-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-187-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-189-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-191-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-193-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-195-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-197-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-199-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-201-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-203-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-205-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-209-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-207-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-211-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-213-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4764-1100-0x0000000002770000-0x0000000002780000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1656 un531737.exe 3444 pro3744.exe 4764 qu7876.exe 2568 si637446.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3744.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un531737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un531737.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3444 pro3744.exe 3444 pro3744.exe 4764 qu7876.exe 4764 qu7876.exe 2568 si637446.exe 2568 si637446.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3444 pro3744.exe Token: SeDebugPrivilege 4764 qu7876.exe Token: SeDebugPrivilege 2568 si637446.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3480 wrote to memory of 1656 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 66 PID 3480 wrote to memory of 1656 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 66 PID 3480 wrote to memory of 1656 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 66 PID 1656 wrote to memory of 3444 1656 un531737.exe 67 PID 1656 wrote to memory of 3444 1656 un531737.exe 67 PID 1656 wrote to memory of 3444 1656 un531737.exe 67 PID 1656 wrote to memory of 4764 1656 un531737.exe 68 PID 1656 wrote to memory of 4764 1656 un531737.exe 68 PID 1656 wrote to memory of 4764 1656 un531737.exe 68 PID 3480 wrote to memory of 2568 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 70 PID 3480 wrote to memory of 2568 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 70 PID 3480 wrote to memory of 2568 3480 128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe"C:\Users\Admin\AppData\Local\Temp\128d8c84f073250cc24f194fb287ec70e74da1d0560e1f4741d9ec0dfd262878.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un531737.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un531737.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7876.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si637446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si637446.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD514718df1cfde802c41015f643e462cbc
SHA1c3f70e857a955d7bda149c26c126aa8f87ad2152
SHA256c36cf04b4b5928732c98e8e36feb1fe5c5dc15b0bb2e7bbfcca94f41c871e1f2
SHA5126242c53ba119a31adaebbf116503d5d35c77920ac7427a2e27355b5fe47223f58f5a7a3e10c725882efe0325dff40bcb69c3133411f6341cf522975b33f35499
-
Filesize
175KB
MD514718df1cfde802c41015f643e462cbc
SHA1c3f70e857a955d7bda149c26c126aa8f87ad2152
SHA256c36cf04b4b5928732c98e8e36feb1fe5c5dc15b0bb2e7bbfcca94f41c871e1f2
SHA5126242c53ba119a31adaebbf116503d5d35c77920ac7427a2e27355b5fe47223f58f5a7a3e10c725882efe0325dff40bcb69c3133411f6341cf522975b33f35499
-
Filesize
558KB
MD57aeff034e03e990d0e5439f5215b954c
SHA195ee9d47c9b1cdc5b46dd01e8392d298d1fdf829
SHA2565efb81d3c5d0f184b32d045786d4e28b3e88bc2cb72cc994c701664800363037
SHA5121482847e6788597f5cf261d6c4aacfc758aac162b9e4c5f7a05608b5aa8fc7df508220ecf9044ef4d989279d90bce5ac7c2e7ca484e37d7cd72e99dea33bd7fc
-
Filesize
558KB
MD57aeff034e03e990d0e5439f5215b954c
SHA195ee9d47c9b1cdc5b46dd01e8392d298d1fdf829
SHA2565efb81d3c5d0f184b32d045786d4e28b3e88bc2cb72cc994c701664800363037
SHA5121482847e6788597f5cf261d6c4aacfc758aac162b9e4c5f7a05608b5aa8fc7df508220ecf9044ef4d989279d90bce5ac7c2e7ca484e37d7cd72e99dea33bd7fc
-
Filesize
307KB
MD5252a1f8487e49751015faef51beb3317
SHA1e701c3ae59cc23a29a1bfe1f9c1b672b6fa5af24
SHA2567e87bf5ee342780205244ee5b77a99dfb8ad2cddf843792b5e3ca40be3046b7e
SHA512e48d82a2e3b6933768835ecb6e5b5a8563f4c094b35633b5836528540779371a03420f9f6d995da7ddd30644b4c4c11e44d609c781b9a9abf5b515c2ed8f838d
-
Filesize
307KB
MD5252a1f8487e49751015faef51beb3317
SHA1e701c3ae59cc23a29a1bfe1f9c1b672b6fa5af24
SHA2567e87bf5ee342780205244ee5b77a99dfb8ad2cddf843792b5e3ca40be3046b7e
SHA512e48d82a2e3b6933768835ecb6e5b5a8563f4c094b35633b5836528540779371a03420f9f6d995da7ddd30644b4c4c11e44d609c781b9a9abf5b515c2ed8f838d
-
Filesize
365KB
MD580c2bbfb25ae207c9c363866d444de63
SHA1bba13e2cb331b85e62bf4fd45d0d84988c8402ff
SHA256db0c7d39ed5ff689da2a6f5bf36e148687cc407606b5c2e55f8f33fb14954ba1
SHA5129c4a0f78ab4ef3ddbf9e44274d5b067ea467849a28bccaa85744d94977c12298498aed5f31db09f6ee3b6dae217b61a166ca150633f80e9322c7b793dbf5c725
-
Filesize
365KB
MD580c2bbfb25ae207c9c363866d444de63
SHA1bba13e2cb331b85e62bf4fd45d0d84988c8402ff
SHA256db0c7d39ed5ff689da2a6f5bf36e148687cc407606b5c2e55f8f33fb14954ba1
SHA5129c4a0f78ab4ef3ddbf9e44274d5b067ea467849a28bccaa85744d94977c12298498aed5f31db09f6ee3b6dae217b61a166ca150633f80e9322c7b793dbf5c725