Analysis
-
max time kernel
58s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe
Resource
win10-20230220-en
General
-
Target
f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe
-
Size
701KB
-
MD5
a3d482fe859d2d710e1334ca6baeb8e1
-
SHA1
6a3bb999a945dffbb3e51c5405b005893cc50d03
-
SHA256
f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8
-
SHA512
adfcbe7b46cc4d33beaa82a68bbffc264360529f3aa418d32f834ab7486f7ce6c80778d3f2386e964eee387de83d27531156b6cc9efcaa02db41d449076ccb16
-
SSDEEP
12288:/Mrvy90VonkWiO5bbY9ZuR4X6/VmNdPoTYD/mWfyehtanH0+/og:cyJnPNhV2oTz5ebkHZF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6413.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4120-181-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/4120-182-0x00000000027D0000-0x0000000002814000-memory.dmp family_redline behavioral1/memory/4120-183-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-184-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-186-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-188-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-190-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-192-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-194-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-196-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-198-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-200-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-202-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-204-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-206-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-208-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-210-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-212-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-214-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/4120-216-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2684 un692642.exe 3776 pro6413.exe 4120 qu8661.exe 4792 si121732.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6413.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un692642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un692642.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3776 pro6413.exe 3776 pro6413.exe 4120 qu8661.exe 4120 qu8661.exe 4792 si121732.exe 4792 si121732.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3776 pro6413.exe Token: SeDebugPrivilege 4120 qu8661.exe Token: SeDebugPrivilege 4792 si121732.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2684 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 66 PID 2448 wrote to memory of 2684 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 66 PID 2448 wrote to memory of 2684 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 66 PID 2684 wrote to memory of 3776 2684 un692642.exe 67 PID 2684 wrote to memory of 3776 2684 un692642.exe 67 PID 2684 wrote to memory of 3776 2684 un692642.exe 67 PID 2684 wrote to memory of 4120 2684 un692642.exe 68 PID 2684 wrote to memory of 4120 2684 un692642.exe 68 PID 2684 wrote to memory of 4120 2684 un692642.exe 68 PID 2448 wrote to memory of 4792 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 70 PID 2448 wrote to memory of 4792 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 70 PID 2448 wrote to memory of 4792 2448 f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe"C:\Users\Admin\AppData\Local\Temp\f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e65acd526be6da8f6f3853a4697e055a
SHA114e8e8a7a9a988919ac724a9c32c358bfba2ce09
SHA256b318d3112373935149a682d4a4565afda4f44cc8355e23837fcf491e91fb9353
SHA512af05669e9bdfa1cc9a266badb182be0bb5fd49b7f61eeb997d62def87ef18d4797033d24d6561b408db96ec146e4620f6eeea3a633f6b5bd851121f1f87b1b15
-
Filesize
175KB
MD5e65acd526be6da8f6f3853a4697e055a
SHA114e8e8a7a9a988919ac724a9c32c358bfba2ce09
SHA256b318d3112373935149a682d4a4565afda4f44cc8355e23837fcf491e91fb9353
SHA512af05669e9bdfa1cc9a266badb182be0bb5fd49b7f61eeb997d62def87ef18d4797033d24d6561b408db96ec146e4620f6eeea3a633f6b5bd851121f1f87b1b15
-
Filesize
558KB
MD58fc07e95f97444392383f44f265ece49
SHA153495d762fe2ddd9be510579b2c88691490633cc
SHA2563ca58684d63bd727b19b0ca48debb06b83e9baa3fcf5ae39f64c5f7cda23bb1d
SHA512f97570443896cf86962c805cfdb15bf83967be8622aa298140710180d2f869820cc03e5c73456c82b8041ae96e7631268a0aa21a40a54817fe872fd7b6beb250
-
Filesize
558KB
MD58fc07e95f97444392383f44f265ece49
SHA153495d762fe2ddd9be510579b2c88691490633cc
SHA2563ca58684d63bd727b19b0ca48debb06b83e9baa3fcf5ae39f64c5f7cda23bb1d
SHA512f97570443896cf86962c805cfdb15bf83967be8622aa298140710180d2f869820cc03e5c73456c82b8041ae96e7631268a0aa21a40a54817fe872fd7b6beb250
-
Filesize
307KB
MD5b6d1f30a4acbd67d7e6d547a9d6ff5d8
SHA1924539bac145eb8c80192f35929d89b1fbcd14be
SHA2566537651a78071a99a4b29f4f4740f325a5b2757c8ee944a22bc32da6ba15d17e
SHA5123eed3eb77c148bb9fa593b4b683e371b8b8d45568b1e5ab7e09b2a35dbf707a999e2b2f5630bac81dce7c30c3da59cedae6a0a480ef50037904ed5fb2c255a3f
-
Filesize
307KB
MD5b6d1f30a4acbd67d7e6d547a9d6ff5d8
SHA1924539bac145eb8c80192f35929d89b1fbcd14be
SHA2566537651a78071a99a4b29f4f4740f325a5b2757c8ee944a22bc32da6ba15d17e
SHA5123eed3eb77c148bb9fa593b4b683e371b8b8d45568b1e5ab7e09b2a35dbf707a999e2b2f5630bac81dce7c30c3da59cedae6a0a480ef50037904ed5fb2c255a3f
-
Filesize
365KB
MD50fc9571cbd69153877bb474829ba719b
SHA1585d4cab340dc75f7df5bf973d4a724bb5f306b2
SHA256358f77e10ad6f5650ef6a570023e4efe9281025fd11796a7efa66ffbe217ceb2
SHA512d854c25a584e94e710b1f335f9bfab80ae9228c1f6199464edc154cfecf653638f4b13051e7b4f9e042b4759ae7c2d039ab614ee00c6abf5008e053e4e9f6cdf
-
Filesize
365KB
MD50fc9571cbd69153877bb474829ba719b
SHA1585d4cab340dc75f7df5bf973d4a724bb5f306b2
SHA256358f77e10ad6f5650ef6a570023e4efe9281025fd11796a7efa66ffbe217ceb2
SHA512d854c25a584e94e710b1f335f9bfab80ae9228c1f6199464edc154cfecf653638f4b13051e7b4f9e042b4759ae7c2d039ab614ee00c6abf5008e053e4e9f6cdf