Analysis
-
max time kernel
49s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:23
Static task
static1
Behavioral task
behavioral1
Sample
420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe
Resource
win10-20230220-en
General
-
Target
420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe
-
Size
700KB
-
MD5
8f04e4cdfa690277625d061fad803b80
-
SHA1
5a5676c5eeec7878483c005d6af3f37b643194f8
-
SHA256
420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389
-
SHA512
7c8ac071139f89e7829ef11c6ab3dec3cf889e85a264297d378be90857fae9461c601c2a639bf8e0e88eede6baaa6164c41be17b0317676fbfd650b85dc52db9
-
SSDEEP
12288:iMrTy90CCLkKmiTpd5kC9DVUcAwNCfXBTQs46uc47FywPnnMD:hyzuzK/f9m9pnMD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2608.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1904-179-0x00000000026A0000-0x00000000026E6000-memory.dmp family_redline behavioral1/memory/1904-181-0x00000000051A0000-0x00000000051E4000-memory.dmp family_redline behavioral1/memory/1904-182-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-183-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-185-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-187-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-189-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-191-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-193-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-195-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-197-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-199-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-201-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-203-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-205-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-207-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-209-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-211-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-213-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-215-0x00000000051A0000-0x00000000051DF000-memory.dmp family_redline behavioral1/memory/1904-1097-0x00000000022D0000-0x00000000022E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3320 un342580.exe 3572 pro2608.exe 1904 qu2330.exe 4148 si737830.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2608.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2608.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un342580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un342580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3572 pro2608.exe 3572 pro2608.exe 1904 qu2330.exe 1904 qu2330.exe 4148 si737830.exe 4148 si737830.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3572 pro2608.exe Token: SeDebugPrivilege 1904 qu2330.exe Token: SeDebugPrivilege 4148 si737830.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3228 wrote to memory of 3320 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 66 PID 3228 wrote to memory of 3320 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 66 PID 3228 wrote to memory of 3320 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 66 PID 3320 wrote to memory of 3572 3320 un342580.exe 67 PID 3320 wrote to memory of 3572 3320 un342580.exe 67 PID 3320 wrote to memory of 3572 3320 un342580.exe 67 PID 3320 wrote to memory of 1904 3320 un342580.exe 68 PID 3320 wrote to memory of 1904 3320 un342580.exe 68 PID 3320 wrote to memory of 1904 3320 un342580.exe 68 PID 3228 wrote to memory of 4148 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 70 PID 3228 wrote to memory of 4148 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 70 PID 3228 wrote to memory of 4148 3228 420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe"C:\Users\Admin\AppData\Local\Temp\420091b4de56268794bdaad3ba81e4e89e09f225365670accf09824eb05d0389.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2608.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si737830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si737830.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51796b04e12fc1e39e653c3c5a99d5f7f
SHA185c8bcd3e4d7ae67d0d52b0841c47c9aee98d5f9
SHA256f018865ad662bddac7465dd7f6220b988b01a66da11e32de73aa1f037a5e6613
SHA512b8eaaaee94dcca0e8ef1f3d71b3839e0702b13221785bc2328df9627deb02b209e4fa8f927ee463527025995a4e0c8d88bf8c8fade7a7af37e3092f581655496
-
Filesize
175KB
MD51796b04e12fc1e39e653c3c5a99d5f7f
SHA185c8bcd3e4d7ae67d0d52b0841c47c9aee98d5f9
SHA256f018865ad662bddac7465dd7f6220b988b01a66da11e32de73aa1f037a5e6613
SHA512b8eaaaee94dcca0e8ef1f3d71b3839e0702b13221785bc2328df9627deb02b209e4fa8f927ee463527025995a4e0c8d88bf8c8fade7a7af37e3092f581655496
-
Filesize
558KB
MD5ebaffb0805a3831d31e5be93a1f4a155
SHA10e7ef91cc5f63ef9eaf8c1d101174b78ecfeef1c
SHA25663bd9d5a6aae247f56f68f3a1bedbae27d309ac92330c7c7ca627f631c1e3f77
SHA512a367674a44dfffa447262ad428a74c4d8b4211b041aa6e275ef6e7c3901cab4028b6cc7d83cc0f42192e7d0e34b4b4585e92eefc13f1c4d07513ff076ea6b5fd
-
Filesize
558KB
MD5ebaffb0805a3831d31e5be93a1f4a155
SHA10e7ef91cc5f63ef9eaf8c1d101174b78ecfeef1c
SHA25663bd9d5a6aae247f56f68f3a1bedbae27d309ac92330c7c7ca627f631c1e3f77
SHA512a367674a44dfffa447262ad428a74c4d8b4211b041aa6e275ef6e7c3901cab4028b6cc7d83cc0f42192e7d0e34b4b4585e92eefc13f1c4d07513ff076ea6b5fd
-
Filesize
307KB
MD535549f470c522b726fc8fe30fdd29cc3
SHA19599fe86d89210cc8955ea44d1d93d6e0b921853
SHA256b41ccaeaf477f2c55821a2663f0d8d8e2f945b451501534fc8bb02ed04929848
SHA5120469bce55a298405870a99b83519131a00ac3df4a9f6127c00202361a38e44caa510b1ce1a1e26411f4659a12e3a173b835e67865764a0892c4c763738e4c957
-
Filesize
307KB
MD535549f470c522b726fc8fe30fdd29cc3
SHA19599fe86d89210cc8955ea44d1d93d6e0b921853
SHA256b41ccaeaf477f2c55821a2663f0d8d8e2f945b451501534fc8bb02ed04929848
SHA5120469bce55a298405870a99b83519131a00ac3df4a9f6127c00202361a38e44caa510b1ce1a1e26411f4659a12e3a173b835e67865764a0892c4c763738e4c957
-
Filesize
365KB
MD5971f12acedb887471c0f82f92ca08313
SHA1e0fe78c9c4d0c5aae5dad71b416799f5527869cd
SHA256918e5d3fca3dc54c5046d127855f2020f0af586cb2b4b048e96c21e1de80a0ba
SHA512254717dc1ef117d11663d46987bbd73a29d8554826b2d45d43e8eee1b28da4998dbdbfc745672c82a90ca146d7bf8c3aa8618a6a78a0b67c4817b6fa80769323
-
Filesize
365KB
MD5971f12acedb887471c0f82f92ca08313
SHA1e0fe78c9c4d0c5aae5dad71b416799f5527869cd
SHA256918e5d3fca3dc54c5046d127855f2020f0af586cb2b4b048e96c21e1de80a0ba
SHA512254717dc1ef117d11663d46987bbd73a29d8554826b2d45d43e8eee1b28da4998dbdbfc745672c82a90ca146d7bf8c3aa8618a6a78a0b67c4817b6fa80769323