Analysis
-
max time kernel
54s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 22:25
Static task
static1
Behavioral task
behavioral1
Sample
02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe
Resource
win10-20230220-en
General
-
Target
02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe
-
Size
699KB
-
MD5
481bef4c1c764bab725678be432ce10e
-
SHA1
687b14d17555ec60c9b50dd73d40e93916d8fdde
-
SHA256
02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042
-
SHA512
66dd4763c599c2cb90c9152d6e7680f5e241a6fb3d8c670a4846fdb7394fe525601003f42956cb8c4e76483d78825b48b94027baeba19819ed7bdabc36c95522
-
SSDEEP
12288:LMrpy90J+ww2GAV6+89W37LlU/42Nifluej7p07vQCx:yyq+PAN89WLLlU/uflueHp0DJx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1045.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1045.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3880-179-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/3880-180-0x00000000027C0000-0x0000000002804000-memory.dmp family_redline behavioral1/memory/3880-181-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-182-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-184-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-186-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-188-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-190-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-192-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-194-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-196-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-198-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-200-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-202-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-204-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-206-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-208-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-210-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-212-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/3880-215-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un714887.exepro1045.exequ8969.exesi787062.exepid process 4108 un714887.exe 4124 pro1045.exe 3880 qu8969.exe 1720 si787062.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1045.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1045.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1045.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exeun714887.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un714887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un714887.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1045.exequ8969.exesi787062.exepid process 4124 pro1045.exe 4124 pro1045.exe 3880 qu8969.exe 3880 qu8969.exe 1720 si787062.exe 1720 si787062.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1045.exequ8969.exesi787062.exedescription pid process Token: SeDebugPrivilege 4124 pro1045.exe Token: SeDebugPrivilege 3880 qu8969.exe Token: SeDebugPrivilege 1720 si787062.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exeun714887.exedescription pid process target process PID 5096 wrote to memory of 4108 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe un714887.exe PID 5096 wrote to memory of 4108 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe un714887.exe PID 5096 wrote to memory of 4108 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe un714887.exe PID 4108 wrote to memory of 4124 4108 un714887.exe pro1045.exe PID 4108 wrote to memory of 4124 4108 un714887.exe pro1045.exe PID 4108 wrote to memory of 4124 4108 un714887.exe pro1045.exe PID 4108 wrote to memory of 3880 4108 un714887.exe qu8969.exe PID 4108 wrote to memory of 3880 4108 un714887.exe qu8969.exe PID 4108 wrote to memory of 3880 4108 un714887.exe qu8969.exe PID 5096 wrote to memory of 1720 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe si787062.exe PID 5096 wrote to memory of 1720 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe si787062.exe PID 5096 wrote to memory of 1720 5096 02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe si787062.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe"C:\Users\Admin\AppData\Local\Temp\02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d39102a20fffad40eeecf55be36044e
SHA1a621fe9bcb651c60bae773b495b0477ba5fad947
SHA256ff3303ccd6baab95ab03578a796490d9b1f9f816a544ee3e1530e0ebe7ba2667
SHA512643e21e0e549b3c709223cc7e4c63dcd61707396c4b38d4c2b343e75b350f7f48094e6c5f42f5fb237f90cbbd301b6e6449564f42c44e17c87bdd5ea646e60b2
-
Filesize
175KB
MD50d39102a20fffad40eeecf55be36044e
SHA1a621fe9bcb651c60bae773b495b0477ba5fad947
SHA256ff3303ccd6baab95ab03578a796490d9b1f9f816a544ee3e1530e0ebe7ba2667
SHA512643e21e0e549b3c709223cc7e4c63dcd61707396c4b38d4c2b343e75b350f7f48094e6c5f42f5fb237f90cbbd301b6e6449564f42c44e17c87bdd5ea646e60b2
-
Filesize
557KB
MD5c1864f8ca478a7062a79b5836facee4f
SHA1ceb24e5dc26ab7419300744d0a8a4914bbac7457
SHA256970adf9ede6e2f703becd6c8779efaf49976981dd3f11fed3be1362c489341f0
SHA5126a120b544ca05884e32f0fe3835b36d1a18f4b5876a432e4c0e5332108c02c24175085bb48ee489037c2f105b75e2089e051a576b7d614d8ccfe61f44ea19e17
-
Filesize
557KB
MD5c1864f8ca478a7062a79b5836facee4f
SHA1ceb24e5dc26ab7419300744d0a8a4914bbac7457
SHA256970adf9ede6e2f703becd6c8779efaf49976981dd3f11fed3be1362c489341f0
SHA5126a120b544ca05884e32f0fe3835b36d1a18f4b5876a432e4c0e5332108c02c24175085bb48ee489037c2f105b75e2089e051a576b7d614d8ccfe61f44ea19e17
-
Filesize
307KB
MD513ca8f1c0562f7ee569dcf967d897845
SHA1b4d864dea7d7b19435a9913d439b139184004f73
SHA2561342a3613a94a1930c65c75f8126824636fed22395517057ca827f454926352d
SHA51267b66f6df19522a48c786703e1bf76b16e1123be41225faea1144bbc74422848c86ad01aad39d1dd20254e43e8632acb21a37f48f3debde4f9f0ec346545febc
-
Filesize
307KB
MD513ca8f1c0562f7ee569dcf967d897845
SHA1b4d864dea7d7b19435a9913d439b139184004f73
SHA2561342a3613a94a1930c65c75f8126824636fed22395517057ca827f454926352d
SHA51267b66f6df19522a48c786703e1bf76b16e1123be41225faea1144bbc74422848c86ad01aad39d1dd20254e43e8632acb21a37f48f3debde4f9f0ec346545febc
-
Filesize
365KB
MD5767ea544a4b6261587f23535b079bcb1
SHA10ed472a2e2e3daa892c488036939de8cb286dfbd
SHA25657ddb6d48a2bba40b2718a8b5d7d228058eb427dc7e7c0d064c51051edd8a93e
SHA512caad3100433b15f3a38afe165c2fb6f4962fe5c63574355cbfcae4045a53227b9ccb5cbd9f96359568d23a73ca201d648e35c79b46e70db4d1683f435e667476
-
Filesize
365KB
MD5767ea544a4b6261587f23535b079bcb1
SHA10ed472a2e2e3daa892c488036939de8cb286dfbd
SHA25657ddb6d48a2bba40b2718a8b5d7d228058eb427dc7e7c0d064c51051edd8a93e
SHA512caad3100433b15f3a38afe165c2fb6f4962fe5c63574355cbfcae4045a53227b9ccb5cbd9f96359568d23a73ca201d648e35c79b46e70db4d1683f435e667476