Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:42
Static task
static1
Behavioral task
behavioral1
Sample
efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe
Resource
win10-20230220-en
General
-
Target
efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe
-
Size
700KB
-
MD5
de1eea25820f29bb1577de6c94741223
-
SHA1
b111f79864ebdfd08a4f46798572eaabeb463d15
-
SHA256
efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af
-
SHA512
76bc290b0777c136ee66163d838fdcc41b9ecc0310509c86f35a05fb1e6a2db99f63095e4605f451e551db9536cc63ce3173b7f7bc788c3aae7d8c7d1e9e8aff
-
SSDEEP
12288:gMrby900qvhf41tO6hFwMf9DSrcAL8F38pOmEPWUBgjquP4XbKRbkxdqaABpH:ryqf41k6hn+L8VAsDg+uP4XbKlidqxBl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5811.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2148-176-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/2148-179-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/2148-182-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-183-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-185-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-187-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-189-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-191-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-193-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-195-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-197-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-199-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-201-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-203-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-205-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-207-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-211-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-209-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-213-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2148-215-0x0000000002650000-0x000000000268F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3644 un296880.exe 2272 pro5811.exe 2148 qu2206.exe 3984 si297584.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5811.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un296880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un296880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2272 pro5811.exe 2272 pro5811.exe 2148 qu2206.exe 2148 qu2206.exe 3984 si297584.exe 3984 si297584.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2272 pro5811.exe Token: SeDebugPrivilege 2148 qu2206.exe Token: SeDebugPrivilege 3984 si297584.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3644 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 66 PID 4124 wrote to memory of 3644 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 66 PID 4124 wrote to memory of 3644 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 66 PID 3644 wrote to memory of 2272 3644 un296880.exe 67 PID 3644 wrote to memory of 2272 3644 un296880.exe 67 PID 3644 wrote to memory of 2272 3644 un296880.exe 67 PID 3644 wrote to memory of 2148 3644 un296880.exe 68 PID 3644 wrote to memory of 2148 3644 un296880.exe 68 PID 3644 wrote to memory of 2148 3644 un296880.exe 68 PID 4124 wrote to memory of 3984 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 70 PID 4124 wrote to memory of 3984 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 70 PID 4124 wrote to memory of 3984 4124 efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe"C:\Users\Admin\AppData\Local\Temp\efe0d4a3c991303083fd4ba828c9f898bdcb12a0d76b98b2193ade32c2f329af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296880.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296880.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5811.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2206.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297584.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
175KB
MD5a9bb09c38fb68073ad9cacee36e16ea5
SHA1096f6c1e39c22439e521ac3d04e3cac34fd37eef
SHA256656e6cca8e0578849fcd22e1518fbecc7969fbc105f77ee7aa2e3ce10c8d1d44
SHA5125c391f9cf9c692b7ac01279a46376440e6b4708a73f1bd09590fab1690a0d342e030a625a1da70eef842f8b2c9dff96e5fdcace975c0dcda2f84ee52e598ae12
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
558KB
MD55608c53159cbe291fb56d11388f06406
SHA1000b8b7bcd9ae0b81d9215e1a636a1c1791bda54
SHA2565bd7abe7da15a821464fec8247043a305cedbc27b0034c4f63f02cec6d59b07b
SHA51273570ccd2ded02552e8e4e00d362ec641d829b8e4c995ed692ae856c589147a0aada21c86f4ba9083a77cc8bca8a6243d05b498699258702ebc2a04f9c285fff
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
307KB
MD5eab94fb914202505f621f497d3756825
SHA180ff3028908f4672ce08da46ba6380bf688812de
SHA25685200c51c1863146ccaf7ccf6f30e838ef0465cda2f43b9df5575aad0fe4f67c
SHA512c6d41a557f4becf5ee94d034ad6d86daa4bc857db62934e13831bcb608f99b63fe37d6531cb5ab5d24d0cacb9a5c390b301ef984997125abbf2fb1628638e0a5
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0
-
Filesize
365KB
MD5deae244f21f6527a671f08525f1b7a00
SHA1de74ba16cce19e4ac1c41fa67f5d8ce129412691
SHA256308a23323d5770b65433c02660cf26f3c52c385513bd542a76e67b0386d44eeb
SHA51254fa19261b605d2f5c0283522a194fac3653d0d1beb4a54d4666b31c8fb6c54fe84ab6335307bad2fff1a8e1a9a1fc527028cef8b6666d9c9ca1898e1be339e0