Analysis
-
max time kernel
53s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:13
Static task
static1
Behavioral task
behavioral1
Sample
1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe
Resource
win10-20230220-en
General
-
Target
1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe
-
Size
700KB
-
MD5
4dadd71064ea322a923af4a568e27012
-
SHA1
e2512b3c87955d226184b9bb04ece4a06d32ae49
-
SHA256
1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e
-
SHA512
6ea567fae2b5442c007985f2732f73496804592a38973d9d9905e3ef05f3358e2cd238db70bd23c3f6d058f146b3b3b13287af57dbb670d1e33138f753c4436b
-
SSDEEP
12288:pMrNy9000NmT8MiBTYh/G9D7ncAa+pmNGfQG9fV6tgyk7o3:4yhz8pT46a+p5fQ4V6q7o3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8475.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8475.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4480-176-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/4480-177-0x00000000051A0000-0x00000000051E4000-memory.dmp family_redline behavioral1/memory/4480-179-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-178-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-181-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-183-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-185-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-187-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-189-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-191-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-193-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-195-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-197-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-199-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-201-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-203-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-205-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-207-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-209-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/4480-211-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un511679.exepro8475.exequ5647.exesi758865.exepid process 3528 un511679.exe 1600 pro8475.exe 4480 qu5647.exe 4156 si758865.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8475.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8475.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exeun511679.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un511679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un511679.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8475.exequ5647.exesi758865.exepid process 1600 pro8475.exe 1600 pro8475.exe 4480 qu5647.exe 4480 qu5647.exe 4156 si758865.exe 4156 si758865.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8475.exequ5647.exesi758865.exedescription pid process Token: SeDebugPrivilege 1600 pro8475.exe Token: SeDebugPrivilege 4480 qu5647.exe Token: SeDebugPrivilege 4156 si758865.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exeun511679.exedescription pid process target process PID 4224 wrote to memory of 3528 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe un511679.exe PID 4224 wrote to memory of 3528 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe un511679.exe PID 4224 wrote to memory of 3528 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe un511679.exe PID 3528 wrote to memory of 1600 3528 un511679.exe pro8475.exe PID 3528 wrote to memory of 1600 3528 un511679.exe pro8475.exe PID 3528 wrote to memory of 1600 3528 un511679.exe pro8475.exe PID 3528 wrote to memory of 4480 3528 un511679.exe qu5647.exe PID 3528 wrote to memory of 4480 3528 un511679.exe qu5647.exe PID 3528 wrote to memory of 4480 3528 un511679.exe qu5647.exe PID 4224 wrote to memory of 4156 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe si758865.exe PID 4224 wrote to memory of 4156 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe si758865.exe PID 4224 wrote to memory of 4156 4224 1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe si758865.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe"C:\Users\Admin\AppData\Local\Temp\1f6323e237ee4181e7c3e700d9a0a44ee53996a1d9daf0d1dbdc427fae5f143e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511679.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8475.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8475.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5647.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758865.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD533f71e665e065860627be79397b21617
SHA19474308d381af4e2f214f3086f77eee1184f5330
SHA256a85c5fdb4042d0aa4743c0cc394fb520c95a43143cf1cb0434d7bff5e3616d90
SHA5127fbe3214c9bde1a35ebb87d8a872e669a9e8761803b42086af79de3ee90473f2b969c66961745456f08554024ae5814b7eb9157e9ac44dd00413d9b43a5c6c69
-
Filesize
175KB
MD533f71e665e065860627be79397b21617
SHA19474308d381af4e2f214f3086f77eee1184f5330
SHA256a85c5fdb4042d0aa4743c0cc394fb520c95a43143cf1cb0434d7bff5e3616d90
SHA5127fbe3214c9bde1a35ebb87d8a872e669a9e8761803b42086af79de3ee90473f2b969c66961745456f08554024ae5814b7eb9157e9ac44dd00413d9b43a5c6c69
-
Filesize
558KB
MD5d09fb94a9b95aebce5211c8b3fe93e59
SHA19b3156b53e15644207efad0d0409135d94667ecb
SHA256ff25069da05d613d4bd3a6930487863e6900014ba67625207a9a135afe189d70
SHA512e54c26995438e4c539230763f89039812dca04f2ba276eb576b8863fc1a7bbbd96bb72e5b67ba52f35515206b5d0d0e76ed402558f7cdd5bbc85124eca5c9823
-
Filesize
558KB
MD5d09fb94a9b95aebce5211c8b3fe93e59
SHA19b3156b53e15644207efad0d0409135d94667ecb
SHA256ff25069da05d613d4bd3a6930487863e6900014ba67625207a9a135afe189d70
SHA512e54c26995438e4c539230763f89039812dca04f2ba276eb576b8863fc1a7bbbd96bb72e5b67ba52f35515206b5d0d0e76ed402558f7cdd5bbc85124eca5c9823
-
Filesize
307KB
MD5bea88189b80410586cef2a6a6d46b2b9
SHA1626a9cd9dd1fe047c5c7e499595da5f3847d4209
SHA2564ca49a321fc087e109f4b188bba39b4c4530edb61f7141d65cd4f736010ef8a0
SHA512d12b9461a6e53182466a93e53cfe2bb00ac7b94e3d569d9d594cd08aefcc454a1cd76cba08bf89ba81974ea26510e5ef007d19734c1a7aa5dded1b9370443445
-
Filesize
307KB
MD5bea88189b80410586cef2a6a6d46b2b9
SHA1626a9cd9dd1fe047c5c7e499595da5f3847d4209
SHA2564ca49a321fc087e109f4b188bba39b4c4530edb61f7141d65cd4f736010ef8a0
SHA512d12b9461a6e53182466a93e53cfe2bb00ac7b94e3d569d9d594cd08aefcc454a1cd76cba08bf89ba81974ea26510e5ef007d19734c1a7aa5dded1b9370443445
-
Filesize
365KB
MD5ca4c855fe2a2a489179859472a2d9f51
SHA1ffe816f6091c8cee4b78af92145622e9692fd644
SHA256dd5efa60e5436c90ba84eda5fd2e6c28564a9c1469068e1a581383d89f91440a
SHA512410e8ef4bc9c3476b1f96db25b87b7826c1b9bc02c6ec7514f07fddd6514ede775d80ceab03981940255ed1ae0d766374d948dba40c30ff605133a8a2b23055c
-
Filesize
365KB
MD5ca4c855fe2a2a489179859472a2d9f51
SHA1ffe816f6091c8cee4b78af92145622e9692fd644
SHA256dd5efa60e5436c90ba84eda5fd2e6c28564a9c1469068e1a581383d89f91440a
SHA512410e8ef4bc9c3476b1f96db25b87b7826c1b9bc02c6ec7514f07fddd6514ede775d80ceab03981940255ed1ae0d766374d948dba40c30ff605133a8a2b23055c