Analysis
-
max time kernel
56s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:11
Static task
static1
Behavioral task
behavioral1
Sample
30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe
Resource
win10-20230220-en
General
-
Target
30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe
-
Size
700KB
-
MD5
2f857698c91a4d887f08487e80286d0d
-
SHA1
3e6d4e165006ebb41db4a05066e0b7bf5dd03489
-
SHA256
30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32
-
SHA512
941ff21158f1dfd38d0fa97c2f18ec31f5f9a369ffd0de1f8ba564235c9a209681fd150a402d90f47e4d81a9d51e6cced2c89d9fadfb933129475f2ab26d9911
-
SSDEEP
12288:eMrdy90rlH3O0nq8SuTg99DoHcAu8F3F/ztXW4RwJEMP1hoRhCewG:Ly0XvqR4geu8VB44yJEMt5ewG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2294.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3932-177-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/3932-178-0x0000000002880000-0x00000000028C4000-memory.dmp family_redline behavioral1/memory/3932-179-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-180-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-182-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-184-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-186-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-188-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-190-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-192-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-194-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-196-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-198-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-200-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-202-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-204-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-206-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-208-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-210-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/3932-212-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5028 un923937.exe 1860 pro2294.exe 3932 qu7350.exe 3788 si899921.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2294.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un923937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un923937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1860 pro2294.exe 1860 pro2294.exe 3932 qu7350.exe 3932 qu7350.exe 3788 si899921.exe 3788 si899921.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1860 pro2294.exe Token: SeDebugPrivilege 3932 qu7350.exe Token: SeDebugPrivilege 3788 si899921.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4540 wrote to memory of 5028 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 66 PID 4540 wrote to memory of 5028 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 66 PID 4540 wrote to memory of 5028 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 66 PID 5028 wrote to memory of 1860 5028 un923937.exe 67 PID 5028 wrote to memory of 1860 5028 un923937.exe 67 PID 5028 wrote to memory of 1860 5028 un923937.exe 67 PID 5028 wrote to memory of 3932 5028 un923937.exe 68 PID 5028 wrote to memory of 3932 5028 un923937.exe 68 PID 5028 wrote to memory of 3932 5028 un923937.exe 68 PID 4540 wrote to memory of 3788 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 70 PID 4540 wrote to memory of 3788 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 70 PID 4540 wrote to memory of 3788 4540 30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe"C:\Users\Admin\AppData\Local\Temp\30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58453d4a8e076adf8e39a68e2388dcde8
SHA1b047a6f119bc7d27d5a50e71223f18925d51049a
SHA25655bdad6036e61e16ae34e7f356f8c63a9ce90ae520103330bad4ebea9f9cb7d2
SHA5120a4024177dc0c246bab8ef71b28e397fce6228f0439bcc887194e89e6a0160e763cbe1b0bd4966d927d0c046acfafba99222dcc79eff69f19d543a48047debab
-
Filesize
175KB
MD58453d4a8e076adf8e39a68e2388dcde8
SHA1b047a6f119bc7d27d5a50e71223f18925d51049a
SHA25655bdad6036e61e16ae34e7f356f8c63a9ce90ae520103330bad4ebea9f9cb7d2
SHA5120a4024177dc0c246bab8ef71b28e397fce6228f0439bcc887194e89e6a0160e763cbe1b0bd4966d927d0c046acfafba99222dcc79eff69f19d543a48047debab
-
Filesize
558KB
MD51b235ae60ddf648186a3c5a8dfd0dbc6
SHA1a364d0fef2b5688d73aeed8747669411fd06f0d1
SHA2561db172ea2142a0b6c9a53d68419bb9a88df4a4c0a0ce503845e85ddf343a3387
SHA512636b609a801df9fa9cc010fe26f3c02e939ae70858959dd958ec5e38445133fdcf0e92c53bf22dc767aad963c76d6ba230bd98a3858426e1a98d9ed29c815516
-
Filesize
558KB
MD51b235ae60ddf648186a3c5a8dfd0dbc6
SHA1a364d0fef2b5688d73aeed8747669411fd06f0d1
SHA2561db172ea2142a0b6c9a53d68419bb9a88df4a4c0a0ce503845e85ddf343a3387
SHA512636b609a801df9fa9cc010fe26f3c02e939ae70858959dd958ec5e38445133fdcf0e92c53bf22dc767aad963c76d6ba230bd98a3858426e1a98d9ed29c815516
-
Filesize
307KB
MD58569ef2fc06413d84d67bf324c98c3ed
SHA18b6013658e0f0cd8f2cfae65b3e8a1417ecf9d8c
SHA256e0fd5d7b1a8fe5537e2ba31e264658d70fc2431785b70e598c7b35e3440cfa15
SHA5127ad57b1da77616f737e23b4821d418e33a57c332d93ef73bff5b085d8465b71079efd78e672647c600f505016b2ef314a4f360262dc09230fa619b1cba527376
-
Filesize
307KB
MD58569ef2fc06413d84d67bf324c98c3ed
SHA18b6013658e0f0cd8f2cfae65b3e8a1417ecf9d8c
SHA256e0fd5d7b1a8fe5537e2ba31e264658d70fc2431785b70e598c7b35e3440cfa15
SHA5127ad57b1da77616f737e23b4821d418e33a57c332d93ef73bff5b085d8465b71079efd78e672647c600f505016b2ef314a4f360262dc09230fa619b1cba527376
-
Filesize
365KB
MD521f7c904d244f75fa07b06796c3229e9
SHA1ce16b67f52138aeb515b998411ca273a7b9208c2
SHA256a6c9913d581f31d3e9511825bb249d788e9b9e4c670de14f09abab4fc83aa057
SHA5129b62b045909e3236395cc2c3b078defa8781c88b60bdb0561e09726771dae7cd7f2c28e84e6cbd539c0f0215541ed83f1bcacf6c2fd2375beec91827182d5139
-
Filesize
365KB
MD521f7c904d244f75fa07b06796c3229e9
SHA1ce16b67f52138aeb515b998411ca273a7b9208c2
SHA256a6c9913d581f31d3e9511825bb249d788e9b9e4c670de14f09abab4fc83aa057
SHA5129b62b045909e3236395cc2c3b078defa8781c88b60bdb0561e09726771dae7cd7f2c28e84e6cbd539c0f0215541ed83f1bcacf6c2fd2375beec91827182d5139