Analysis
-
max time kernel
54s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:38
Static task
static1
Behavioral task
behavioral1
Sample
527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe
Resource
win10-20230220-en
General
-
Target
527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe
-
Size
700KB
-
MD5
a75cd6eb7d6470611bb6c529f6ced8e1
-
SHA1
7b2d31688f1b246ea0b6f432e1242eb8b789a2ff
-
SHA256
527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40
-
SHA512
bb3cf8e6432b12f420a4f17b8b735f880be06e67761a3f1e24975a4f69e0a59c34b2f03ec0ee2a6e379b95ee8ce35dc687fc695d7d967ba8696eed087825143c
-
SSDEEP
12288:QMruy90YkmmEhMM9DNYcAk8F5sPgq6UxPLjGfPwYkC7Ck1:uyF5mFNk8zsPB6UFEPwLC7Z1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4861.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
resource yara_rule behavioral1/memory/2032-179-0x0000000004B00000-0x0000000004B46000-memory.dmp family_redline behavioral1/memory/2032-180-0x0000000005200000-0x0000000005244000-memory.dmp family_redline behavioral1/memory/2032-181-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-182-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-184-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-186-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-188-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-190-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-192-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-194-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-196-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-198-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-200-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-202-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-204-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-206-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-208-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-210-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-212-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-214-0x0000000005200000-0x000000000523F000-memory.dmp family_redline behavioral1/memory/2032-506-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline behavioral1/memory/2032-507-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline behavioral1/memory/2032-510-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3276 un415629.exe 3748 pro4861.exe 2032 qu0302.exe 3156 si848725.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4861.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un415629.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un415629.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3748 pro4861.exe 3748 pro4861.exe 2032 qu0302.exe 2032 qu0302.exe 3156 si848725.exe 3156 si848725.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3748 pro4861.exe Token: SeDebugPrivilege 2032 qu0302.exe Token: SeDebugPrivilege 3156 si848725.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3076 wrote to memory of 3276 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 66 PID 3076 wrote to memory of 3276 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 66 PID 3076 wrote to memory of 3276 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 66 PID 3276 wrote to memory of 3748 3276 un415629.exe 67 PID 3276 wrote to memory of 3748 3276 un415629.exe 67 PID 3276 wrote to memory of 3748 3276 un415629.exe 67 PID 3276 wrote to memory of 2032 3276 un415629.exe 68 PID 3276 wrote to memory of 2032 3276 un415629.exe 68 PID 3276 wrote to memory of 2032 3276 un415629.exe 68 PID 3076 wrote to memory of 3156 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 70 PID 3076 wrote to memory of 3156 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 70 PID 3076 wrote to memory of 3156 3076 527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe"C:\Users\Admin\AppData\Local\Temp\527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a45a35496ef11c9b3b17d934ce9b901a
SHA158a1002cd0a7a660336f6581e4f19407705edc3e
SHA25638016703e867bd6c7af35e0063f556d6f5006b55ff8533cd2b0eb1a3033e06f5
SHA5126689ffb64190d80fde2557422c9843185e61bba61ed4e0b7446e62156d82c18c3fb6d7c494d06aa37afdad2c1eeb2950b7628ac76d7bda5b586422e2f0e38100
-
Filesize
175KB
MD5a45a35496ef11c9b3b17d934ce9b901a
SHA158a1002cd0a7a660336f6581e4f19407705edc3e
SHA25638016703e867bd6c7af35e0063f556d6f5006b55ff8533cd2b0eb1a3033e06f5
SHA5126689ffb64190d80fde2557422c9843185e61bba61ed4e0b7446e62156d82c18c3fb6d7c494d06aa37afdad2c1eeb2950b7628ac76d7bda5b586422e2f0e38100
-
Filesize
558KB
MD508673c2c734253029280fc7fdda305f1
SHA1d76bd8a2026cee5f988bf2a49549ec41f6d38457
SHA2565c58e01e7aaee091a35a271ca3cc83693a1af4c8988236596a9d9aa7c11ece87
SHA512e556859fc560ec2537001bd5b57f2fc987bc145b937a2bc17b21a4dac974f0d36b00364a0b41a3192702bb08232465f9d907c9060aa49737442d1f70d2ae448e
-
Filesize
558KB
MD508673c2c734253029280fc7fdda305f1
SHA1d76bd8a2026cee5f988bf2a49549ec41f6d38457
SHA2565c58e01e7aaee091a35a271ca3cc83693a1af4c8988236596a9d9aa7c11ece87
SHA512e556859fc560ec2537001bd5b57f2fc987bc145b937a2bc17b21a4dac974f0d36b00364a0b41a3192702bb08232465f9d907c9060aa49737442d1f70d2ae448e
-
Filesize
307KB
MD59f94dbd8ac86b6ffb23515258c93de2c
SHA1065556d31c637bc05b2872a71ff1a641abc09034
SHA256cc9e73307ccd7595903319298d7f872c3261833a7a6b6080c983478a5c8a6ce9
SHA5122741d8a470b0b2cffd60e65806977f4f3dc3654332701556a559ab2738abddc0c69b1bf23dd5a9a6925b1f9cb2300432f6ab38a5c2e85855454b702ece5e8f1d
-
Filesize
307KB
MD59f94dbd8ac86b6ffb23515258c93de2c
SHA1065556d31c637bc05b2872a71ff1a641abc09034
SHA256cc9e73307ccd7595903319298d7f872c3261833a7a6b6080c983478a5c8a6ce9
SHA5122741d8a470b0b2cffd60e65806977f4f3dc3654332701556a559ab2738abddc0c69b1bf23dd5a9a6925b1f9cb2300432f6ab38a5c2e85855454b702ece5e8f1d
-
Filesize
365KB
MD5383f8dbfaaf5c2458544ac59ee4fb6a7
SHA150301b32ad7df7aae22ecd43898970e3a73ac280
SHA256f28b2844cbac41c1661d53e49f859685fa9cb47d8cb67ca122496fa92d1c8e68
SHA512a7bedeb1c858daa1094815c855f2af403c8771d6cc7730a6fc862df9fcbfd15beacedfc0adda4d7a9f1e4fa76149dacb5c99ff07344ea07595bd3e365c725499
-
Filesize
365KB
MD5383f8dbfaaf5c2458544ac59ee4fb6a7
SHA150301b32ad7df7aae22ecd43898970e3a73ac280
SHA256f28b2844cbac41c1661d53e49f859685fa9cb47d8cb67ca122496fa92d1c8e68
SHA512a7bedeb1c858daa1094815c855f2af403c8771d6cc7730a6fc862df9fcbfd15beacedfc0adda4d7a9f1e4fa76149dacb5c99ff07344ea07595bd3e365c725499