Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:17
Static task
static1
Behavioral task
behavioral1
Sample
d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe
Resource
win10-20230220-en
General
-
Target
d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe
-
Size
700KB
-
MD5
11c93979b7626ee27df4310f7ef4df9d
-
SHA1
3b35d6484c166b2f43b5c71c1735b1b5850049b9
-
SHA256
d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1
-
SHA512
34ba49d8336427e283a0beffffda7c9786549c7b8c8ac819c380f808ff610e2b3a48b45d9e1c764a512ed903176df807b57615a34423900a63ea02a1650eee3e
-
SSDEEP
12288:bMr1y90JS2uvHkqpCTJGi9DzacAMO38F/wbo0pVvw0QoS6pi4tdwy+9dXLRMV:Kyq4HBkYMO38hwboLoS6Ft61C
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5638.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5638.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-176-0x00000000026F0000-0x0000000002736000-memory.dmp family_redline behavioral1/memory/2148-180-0x0000000004C90000-0x0000000004CD4000-memory.dmp family_redline behavioral1/memory/2148-182-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-183-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-185-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-187-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-189-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-191-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-193-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-195-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-197-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-199-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-201-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-203-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-205-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-207-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-209-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-211-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-213-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/2148-215-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un011361.exepro5638.exequ7402.exesi786777.exepid process 3596 un011361.exe 2344 pro5638.exe 2148 qu7402.exe 1528 si786777.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5638.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5638.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5638.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exeun011361.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011361.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5638.exequ7402.exesi786777.exepid process 2344 pro5638.exe 2344 pro5638.exe 2148 qu7402.exe 2148 qu7402.exe 1528 si786777.exe 1528 si786777.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5638.exequ7402.exesi786777.exedescription pid process Token: SeDebugPrivilege 2344 pro5638.exe Token: SeDebugPrivilege 2148 qu7402.exe Token: SeDebugPrivilege 1528 si786777.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exeun011361.exedescription pid process target process PID 4148 wrote to memory of 3596 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe un011361.exe PID 4148 wrote to memory of 3596 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe un011361.exe PID 4148 wrote to memory of 3596 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe un011361.exe PID 3596 wrote to memory of 2344 3596 un011361.exe pro5638.exe PID 3596 wrote to memory of 2344 3596 un011361.exe pro5638.exe PID 3596 wrote to memory of 2344 3596 un011361.exe pro5638.exe PID 3596 wrote to memory of 2148 3596 un011361.exe qu7402.exe PID 3596 wrote to memory of 2148 3596 un011361.exe qu7402.exe PID 3596 wrote to memory of 2148 3596 un011361.exe qu7402.exe PID 4148 wrote to memory of 1528 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe si786777.exe PID 4148 wrote to memory of 1528 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe si786777.exe PID 4148 wrote to memory of 1528 4148 d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe si786777.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe"C:\Users\Admin\AppData\Local\Temp\d9eb127e0e96b4c0bd7f00433b99fe1c4163247371d62f32ccc49251b8a203c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011361.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011361.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5638.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7402.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si786777.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si786777.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD538c3e32f9b358942b209e3661dd5aff4
SHA106d2d52ab5101520ab566f72907921ea88d99bc8
SHA2561ae7b322d97cf03f054fa2fbdd814e5fd0ae4289a8b1faa867dc30136e6e568e
SHA512e9e59bc9bf7fb3d77b3443af68c02df19d0a446fcc6eeda67e31bdb7ec798f36f3c9097333d6ffeb572e9eb8478b53fcd73581e68b02780a5067fca66e21d559
-
Filesize
175KB
MD538c3e32f9b358942b209e3661dd5aff4
SHA106d2d52ab5101520ab566f72907921ea88d99bc8
SHA2561ae7b322d97cf03f054fa2fbdd814e5fd0ae4289a8b1faa867dc30136e6e568e
SHA512e9e59bc9bf7fb3d77b3443af68c02df19d0a446fcc6eeda67e31bdb7ec798f36f3c9097333d6ffeb572e9eb8478b53fcd73581e68b02780a5067fca66e21d559
-
Filesize
558KB
MD5e086247dfbdb54a8c69b976870a94712
SHA17030a31c58dfe5b60e93a07f547d6297918d4a90
SHA256662fdd239d5da3f32aff551eb9f4930470aaff6fd2b1a2697919f1c058d4e6a4
SHA512849f07f6df529a1623391d9a0762983b27fad8506e9e10993173235ceb4583fb09c7a2462fc569e23421859bb8c371e10d0ef75f8d3500300e577f0541cb5b91
-
Filesize
558KB
MD5e086247dfbdb54a8c69b976870a94712
SHA17030a31c58dfe5b60e93a07f547d6297918d4a90
SHA256662fdd239d5da3f32aff551eb9f4930470aaff6fd2b1a2697919f1c058d4e6a4
SHA512849f07f6df529a1623391d9a0762983b27fad8506e9e10993173235ceb4583fb09c7a2462fc569e23421859bb8c371e10d0ef75f8d3500300e577f0541cb5b91
-
Filesize
307KB
MD50ee8c5f85fd82c1a34fd0d2beb5d8b4f
SHA1edf96c3380faa8dd728c457988a3c0b734047436
SHA256693aacee8edd8d95e0f98a57503f69f8412ad7835a06c07259c9132940e59bd6
SHA51297b8a6552d121df81e926813721fe8d3cbbce48e8812569433a448baf9915060517ae43713586bc57bdbdbb2ff755c5b0c6476273821dbf4d1c6e7536cbc031b
-
Filesize
307KB
MD50ee8c5f85fd82c1a34fd0d2beb5d8b4f
SHA1edf96c3380faa8dd728c457988a3c0b734047436
SHA256693aacee8edd8d95e0f98a57503f69f8412ad7835a06c07259c9132940e59bd6
SHA51297b8a6552d121df81e926813721fe8d3cbbce48e8812569433a448baf9915060517ae43713586bc57bdbdbb2ff755c5b0c6476273821dbf4d1c6e7536cbc031b
-
Filesize
365KB
MD59532a321f5e22d861f59f6ac9c825199
SHA1d5aba5bb5c7e139827b4eb6ccdefab4a1e15dd6b
SHA256159dbc95234108d8a40232c2c975646835591a4ad5d92f3f5afb320375742971
SHA51233cfe3e1166fc1274564d8a7bf41a7e8e700f789befcd99168dead0e040e5b429039f18f6e2b299376eb91ad9ee785f54692f6a1933e26b0784e3a9a4d189684
-
Filesize
365KB
MD59532a321f5e22d861f59f6ac9c825199
SHA1d5aba5bb5c7e139827b4eb6ccdefab4a1e15dd6b
SHA256159dbc95234108d8a40232c2c975646835591a4ad5d92f3f5afb320375742971
SHA51233cfe3e1166fc1274564d8a7bf41a7e8e700f789befcd99168dead0e040e5b429039f18f6e2b299376eb91ad9ee785f54692f6a1933e26b0784e3a9a4d189684