Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 22:52
Static task
static1
Behavioral task
behavioral1
Sample
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe
Resource
win10-20230220-en
General
-
Target
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe
-
Size
699KB
-
MD5
647429c01f43a89170f674f9edfc6f06
-
SHA1
38f608d17bb6cc0d628a600e87bf3ef1e5c898f4
-
SHA256
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd
-
SHA512
196bea0299cb76d1f6737fdbc1ffe4ac4d09a59a39a82ce5e1c8eca11f7a15048b99f6c88167566c33f1614975e98d8c886d850d0630f798734ab38453069cf3
-
SSDEEP
12288:MMrVy90/YhxnSFEUQw6A79DHicAD0CdOpq6r9GFgxj7dDMKqsH0Al:py8YhpSmvZgCdcvcFsHdDMYh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4740-181-0x0000000002690000-0x00000000026D6000-memory.dmp family_redline behavioral1/memory/4740-182-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4740-183-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-184-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-186-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-188-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-190-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-192-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-194-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-196-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-198-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-200-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-202-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-204-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-208-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-206-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-210-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-212-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-214-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-216-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4740-1104-0x0000000002720000-0x0000000002730000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2268 un569710.exe 2624 pro7003.exe 4740 qu8796.exe 1340 si488006.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7003.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un569710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un569710.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2624 pro7003.exe 2624 pro7003.exe 4740 qu8796.exe 4740 qu8796.exe 1340 si488006.exe 1340 si488006.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2624 pro7003.exe Token: SeDebugPrivilege 4740 qu8796.exe Token: SeDebugPrivilege 1340 si488006.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2268 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 66 PID 1600 wrote to memory of 2268 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 66 PID 1600 wrote to memory of 2268 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 66 PID 2268 wrote to memory of 2624 2268 un569710.exe 67 PID 2268 wrote to memory of 2624 2268 un569710.exe 67 PID 2268 wrote to memory of 2624 2268 un569710.exe 67 PID 2268 wrote to memory of 4740 2268 un569710.exe 68 PID 2268 wrote to memory of 4740 2268 un569710.exe 68 PID 2268 wrote to memory of 4740 2268 un569710.exe 68 PID 1600 wrote to memory of 1340 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 70 PID 1600 wrote to memory of 1340 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 70 PID 1600 wrote to memory of 1340 1600 83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe"C:\Users\Admin\AppData\Local\Temp\83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fc9f5ae939daef5701bb1b823fbcb2b8
SHA1a45f260e6473477effa600c50c968950bf5c86ac
SHA256aecf3f4d520a6a9940d4e1fd8c590693372b435142458fc5a9c0001669dd6c23
SHA5123fc86d83a0fb75be830f98f77dde19b4ab456b547908d125c1e1770203c7efb64bc5cd02eafbb2c7187096bf4c71d48e9bc4e68a4c530154bec301ae60562b9c
-
Filesize
175KB
MD5fc9f5ae939daef5701bb1b823fbcb2b8
SHA1a45f260e6473477effa600c50c968950bf5c86ac
SHA256aecf3f4d520a6a9940d4e1fd8c590693372b435142458fc5a9c0001669dd6c23
SHA5123fc86d83a0fb75be830f98f77dde19b4ab456b547908d125c1e1770203c7efb64bc5cd02eafbb2c7187096bf4c71d48e9bc4e68a4c530154bec301ae60562b9c
-
Filesize
557KB
MD5ec4603e9f124594d8c1d438696e946ce
SHA1f03e1c670381ff95ee52cf861234f18ce6a6dc23
SHA256de56f38bd451d29d7c9fcb8cf08c025a4eb4c4147ecfc2ac35787336667a4eda
SHA51262a968eb2b1dbc1273b0317ccdaef2ee4cc02affd42cb46d4801c10dedf5e4097393495c1d443c1ce73dae588b9997a757d4252a21b501750a552b2696df065d
-
Filesize
557KB
MD5ec4603e9f124594d8c1d438696e946ce
SHA1f03e1c670381ff95ee52cf861234f18ce6a6dc23
SHA256de56f38bd451d29d7c9fcb8cf08c025a4eb4c4147ecfc2ac35787336667a4eda
SHA51262a968eb2b1dbc1273b0317ccdaef2ee4cc02affd42cb46d4801c10dedf5e4097393495c1d443c1ce73dae588b9997a757d4252a21b501750a552b2696df065d
-
Filesize
307KB
MD5c017e410ca54ed6a4a4bcbea8f2e961b
SHA19f51c525d6e3cf4b09d5dbe4279f5cef579beb61
SHA256b65f514ca58f50c38faa4ba39cb84015bc60abf0882af576f4e38f619edf1a2e
SHA512f4a9c595fd3fbaa14bc18ca1a0decb907c72e25d313f79155bee998c530742d4232510520ad517a56b8bdb2aca9448b8cd9d511b6d79f210ed4489c3a48c12b3
-
Filesize
307KB
MD5c017e410ca54ed6a4a4bcbea8f2e961b
SHA19f51c525d6e3cf4b09d5dbe4279f5cef579beb61
SHA256b65f514ca58f50c38faa4ba39cb84015bc60abf0882af576f4e38f619edf1a2e
SHA512f4a9c595fd3fbaa14bc18ca1a0decb907c72e25d313f79155bee998c530742d4232510520ad517a56b8bdb2aca9448b8cd9d511b6d79f210ed4489c3a48c12b3
-
Filesize
365KB
MD5cec31fa2797ffdf3fce7660896a3a805
SHA18e840047474696ac99a0eae48b73251920907f7f
SHA25643a41628ed9ce33d140a3e7725e6640774aca572be9943e2c7045f41bf365c14
SHA5120c8903d4dba3d2c767aa1b9259518cfcc3e262edcd360e246a9d8fb02be6bd9bc7d021304e6b02430004e597f102033ab47ae8a7b81c70d4ed6549346953e70f
-
Filesize
365KB
MD5cec31fa2797ffdf3fce7660896a3a805
SHA18e840047474696ac99a0eae48b73251920907f7f
SHA25643a41628ed9ce33d140a3e7725e6640774aca572be9943e2c7045f41bf365c14
SHA5120c8903d4dba3d2c767aa1b9259518cfcc3e262edcd360e246a9d8fb02be6bd9bc7d021304e6b02430004e597f102033ab47ae8a7b81c70d4ed6549346953e70f