Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:21
Static task
static1
Behavioral task
behavioral1
Sample
beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe
Resource
win10-20230220-en
General
-
Target
beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe
-
Size
701KB
-
MD5
3d97864554b4daa8ddf91815983ee375
-
SHA1
3d722165c0db3b8de4263f8a6cac93ec8d8f7c90
-
SHA256
beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7
-
SHA512
bc4dedf350c0e6e64da5d77addbd2235844766f051dc4b5212dffacf659bcd414651ced7213369c6f5ca624263438968a510c99e659efdef0ff6d1455d06c03e
-
SSDEEP
12288:RMrzy90rqgi/9kEBuVNAXBARhh0iPrCG+7gLvN:eywq1kj7OBRiOGlrN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3583.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3583.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3592-180-0x0000000004C30000-0x0000000004C76000-memory.dmp family_redline behavioral1/memory/3592-181-0x00000000051E0000-0x0000000005224000-memory.dmp family_redline behavioral1/memory/3592-182-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-183-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-185-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-187-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-189-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-191-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-193-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-195-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-197-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-199-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-201-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-203-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-205-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-207-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-209-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-211-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-213-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-215-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/3592-229-0x0000000004CD0000-0x0000000004CE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un064465.exepro3583.exequ9052.exesi277670.exepid process 4144 un064465.exe 4132 pro3583.exe 3592 qu9052.exe 3920 si277670.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3583.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3583.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exeun064465.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un064465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un064465.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3583.exequ9052.exesi277670.exepid process 4132 pro3583.exe 4132 pro3583.exe 3592 qu9052.exe 3592 qu9052.exe 3920 si277670.exe 3920 si277670.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3583.exequ9052.exesi277670.exedescription pid process Token: SeDebugPrivilege 4132 pro3583.exe Token: SeDebugPrivilege 3592 qu9052.exe Token: SeDebugPrivilege 3920 si277670.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exeun064465.exedescription pid process target process PID 3796 wrote to memory of 4144 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe un064465.exe PID 3796 wrote to memory of 4144 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe un064465.exe PID 3796 wrote to memory of 4144 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe un064465.exe PID 4144 wrote to memory of 4132 4144 un064465.exe pro3583.exe PID 4144 wrote to memory of 4132 4144 un064465.exe pro3583.exe PID 4144 wrote to memory of 4132 4144 un064465.exe pro3583.exe PID 4144 wrote to memory of 3592 4144 un064465.exe qu9052.exe PID 4144 wrote to memory of 3592 4144 un064465.exe qu9052.exe PID 4144 wrote to memory of 3592 4144 un064465.exe qu9052.exe PID 3796 wrote to memory of 3920 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe si277670.exe PID 3796 wrote to memory of 3920 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe si277670.exe PID 3796 wrote to memory of 3920 3796 beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe si277670.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe"C:\Users\Admin\AppData\Local\Temp\beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ca3316b690404766b0c27a81d7ea5221
SHA11d4f1dbd39b513bd69b413eae3730d8cf73a3b80
SHA25687cd6ee3e16e3ea8ce3dcdafd4f618ab514e85a38d3578b27c1509c9ff444044
SHA51279133672805907ee895ce89fcac2a7dbdbf55d8914d26b89d05d611ff81ca61c7c911abebb68704039a0cba8143249abd41c1f672b46f82077eca4511a7d9384
-
Filesize
175KB
MD5ca3316b690404766b0c27a81d7ea5221
SHA11d4f1dbd39b513bd69b413eae3730d8cf73a3b80
SHA25687cd6ee3e16e3ea8ce3dcdafd4f618ab514e85a38d3578b27c1509c9ff444044
SHA51279133672805907ee895ce89fcac2a7dbdbf55d8914d26b89d05d611ff81ca61c7c911abebb68704039a0cba8143249abd41c1f672b46f82077eca4511a7d9384
-
Filesize
558KB
MD541bb71f62df95190df72e3436ee8b7c9
SHA11245838e67f4f4b9a69783d87ccd837e6b8213a1
SHA2567be1aaf035cc61668e1632906f66a071de0ac40be12606391b04d27be56900c5
SHA512eafb461ff7dd8fdced1b28c2d0abcae8fec0137120b6323d3fe96748bd572a27b3f297a65a668910e744f82a5d22214b88e674eccbcd8d7f3a1c08cc867edfd8
-
Filesize
558KB
MD541bb71f62df95190df72e3436ee8b7c9
SHA11245838e67f4f4b9a69783d87ccd837e6b8213a1
SHA2567be1aaf035cc61668e1632906f66a071de0ac40be12606391b04d27be56900c5
SHA512eafb461ff7dd8fdced1b28c2d0abcae8fec0137120b6323d3fe96748bd572a27b3f297a65a668910e744f82a5d22214b88e674eccbcd8d7f3a1c08cc867edfd8
-
Filesize
307KB
MD5d80f7c6a0f21195ae7248e315ad15af5
SHA178f53df3010c2073bacb3a18a73594dc5cdd3097
SHA2566c3b463e525f191309d37048b5773f65c07136db26b70a1097707b7770071433
SHA5125f5b2af88a57ed2effe91e6737fafca195cf103585da5387ba7dca07e145139941e8a7610c276b5a9d3ca1f913ab65c7efda6cf422243284bac3c923b131aa79
-
Filesize
307KB
MD5d80f7c6a0f21195ae7248e315ad15af5
SHA178f53df3010c2073bacb3a18a73594dc5cdd3097
SHA2566c3b463e525f191309d37048b5773f65c07136db26b70a1097707b7770071433
SHA5125f5b2af88a57ed2effe91e6737fafca195cf103585da5387ba7dca07e145139941e8a7610c276b5a9d3ca1f913ab65c7efda6cf422243284bac3c923b131aa79
-
Filesize
365KB
MD50aa8500b7b451f079adb8eb46632e0a2
SHA1a2e3f0ff788f2ff3bf53420897aba105e9d9b2dc
SHA2562e917cd19f64e0a91d2ab52689a7392be8e8b9ad091f34d5754a898a05b23770
SHA512b9895b7a9efa2196561f6b1ec21d7bbc20c094b6eeb8caf959068653e9bbb726669776e13ff5b4935a7f3e94098814a58491669fc17bc7807aa7b21389dd7f70
-
Filesize
365KB
MD50aa8500b7b451f079adb8eb46632e0a2
SHA1a2e3f0ff788f2ff3bf53420897aba105e9d9b2dc
SHA2562e917cd19f64e0a91d2ab52689a7392be8e8b9ad091f34d5754a898a05b23770
SHA512b9895b7a9efa2196561f6b1ec21d7bbc20c094b6eeb8caf959068653e9bbb726669776e13ff5b4935a7f3e94098814a58491669fc17bc7807aa7b21389dd7f70