Analysis
-
max time kernel
53s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:06
Static task
static1
Behavioral task
behavioral1
Sample
552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe
Resource
win10-20230220-en
General
-
Target
552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe
-
Size
700KB
-
MD5
ea8b05d390c2acb08463fb87b8d3f928
-
SHA1
af983b5130bba508448012a518e091af0e0b2cd3
-
SHA256
552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3
-
SHA512
cfac0429848b2bdecdb9fb670d5e753c09bb6b06f380424ede3ceeac315a98d90e8f1c3bb4b038af7e20091866afc557f552aadc5717c3e2f60c7b3cc1e3ab4b
-
SSDEEP
12288:SMrTy90KIc0Kj5K0P9DGAcAZNkqOT8x3lx2fjT/YmE:ZyVj5jsqkY3lx2LUb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6872.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4780-177-0x0000000004C10000-0x0000000004C56000-memory.dmp family_redline behavioral1/memory/4780-178-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/4780-180-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-182-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-179-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-184-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-186-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-188-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-190-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-192-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-194-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-196-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-198-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-200-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-202-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-204-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-206-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-208-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-210-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-212-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/4780-1101-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3568 un196383.exe 1012 pro6872.exe 4780 qu9176.exe 4588 si276685.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6872.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un196383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un196383.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1012 pro6872.exe 1012 pro6872.exe 4780 qu9176.exe 4780 qu9176.exe 4588 si276685.exe 4588 si276685.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1012 pro6872.exe Token: SeDebugPrivilege 4780 qu9176.exe Token: SeDebugPrivilege 4588 si276685.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 8 wrote to memory of 3568 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 66 PID 8 wrote to memory of 3568 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 66 PID 8 wrote to memory of 3568 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 66 PID 3568 wrote to memory of 1012 3568 un196383.exe 67 PID 3568 wrote to memory of 1012 3568 un196383.exe 67 PID 3568 wrote to memory of 1012 3568 un196383.exe 67 PID 3568 wrote to memory of 4780 3568 un196383.exe 68 PID 3568 wrote to memory of 4780 3568 un196383.exe 68 PID 3568 wrote to memory of 4780 3568 un196383.exe 68 PID 8 wrote to memory of 4588 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 70 PID 8 wrote to memory of 4588 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 70 PID 8 wrote to memory of 4588 8 552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe"C:\Users\Admin\AppData\Local\Temp\552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52fc3b3b5da3f70229ea56b9fc8f280a8
SHA142f8f6ea3655b2ff8c67571650b913eb2ca30afe
SHA256406b0e7616db88ae9c2a335b1c07b08b00abee670298202fbe158dbbe5b32fa4
SHA5127cf95cb470d5c20b9322a251c12920f677428ff6e5f1be22a589cbdbba606639c84adefd42a5e1d37706567b95f3b4db14164894e7f0e93cbbee815647b79a48
-
Filesize
175KB
MD52fc3b3b5da3f70229ea56b9fc8f280a8
SHA142f8f6ea3655b2ff8c67571650b913eb2ca30afe
SHA256406b0e7616db88ae9c2a335b1c07b08b00abee670298202fbe158dbbe5b32fa4
SHA5127cf95cb470d5c20b9322a251c12920f677428ff6e5f1be22a589cbdbba606639c84adefd42a5e1d37706567b95f3b4db14164894e7f0e93cbbee815647b79a48
-
Filesize
558KB
MD5ddab96ec8f658aaccfeef55f9132c767
SHA1a20bf4876b254e8dac6be16059d9ef2575eb282c
SHA256e95c099a276de5c10b9f9cde13659e85dcb1c22868318c8a2ecd8907fd48e414
SHA512d8efe3baea1ec9c6a0e9c527bf766ea53118c0e4bc591424585dcb157509b4d9267f7961785ffe4eccad84b0e0b32e8a5c16d6b96b148802fe3d45b1686847dd
-
Filesize
558KB
MD5ddab96ec8f658aaccfeef55f9132c767
SHA1a20bf4876b254e8dac6be16059d9ef2575eb282c
SHA256e95c099a276de5c10b9f9cde13659e85dcb1c22868318c8a2ecd8907fd48e414
SHA512d8efe3baea1ec9c6a0e9c527bf766ea53118c0e4bc591424585dcb157509b4d9267f7961785ffe4eccad84b0e0b32e8a5c16d6b96b148802fe3d45b1686847dd
-
Filesize
307KB
MD5d97f174d8d5f808a10635931815cff91
SHA1ddecf50b35e6184d246a73941bf0ecd07c0c2ba1
SHA25670358ce6fddb44a95509f4c29f11bcf92476f797b80fcd8fb88a5abe5c879a18
SHA5123b3ca43f02473b6080a744048c6c3fec5f31a44c293829a94da50ed211b0526414d8aa8aa02bd3b5cf1c3be2b2dfbf5af1baf69c7aeda850b59efdc11df69d22
-
Filesize
307KB
MD5d97f174d8d5f808a10635931815cff91
SHA1ddecf50b35e6184d246a73941bf0ecd07c0c2ba1
SHA25670358ce6fddb44a95509f4c29f11bcf92476f797b80fcd8fb88a5abe5c879a18
SHA5123b3ca43f02473b6080a744048c6c3fec5f31a44c293829a94da50ed211b0526414d8aa8aa02bd3b5cf1c3be2b2dfbf5af1baf69c7aeda850b59efdc11df69d22
-
Filesize
365KB
MD5cc46179549220ccb857bb5898e2c571d
SHA12544ba3a0b28282f81234bd512551d81bd6cebda
SHA256460913b6b37cdb262d7bdf22797f569eefe23a3081a46c4e5b68a2dd11008c39
SHA512b1899c417d4374289aa561eac7b628c694d1df1263d4f7e28f06a292795a4c1ba9b40e7b5e990f46b4ac5a13a9894cc56e943c45bdc9a3746b4cb41ace7f5dba
-
Filesize
365KB
MD5cc46179549220ccb857bb5898e2c571d
SHA12544ba3a0b28282f81234bd512551d81bd6cebda
SHA256460913b6b37cdb262d7bdf22797f569eefe23a3081a46c4e5b68a2dd11008c39
SHA512b1899c417d4374289aa561eac7b628c694d1df1263d4f7e28f06a292795a4c1ba9b40e7b5e990f46b4ac5a13a9894cc56e943c45bdc9a3746b4cb41ace7f5dba