Analysis
-
max time kernel
51s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:54
Static task
static1
Behavioral task
behavioral1
Sample
e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe
Resource
win10-20230220-en
General
-
Target
e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe
-
Size
700KB
-
MD5
ed6fb11df99569705d91aa95f06e63d3
-
SHA1
52155e28857bf8ada2e879b555ffb0d8153c3821
-
SHA256
e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36
-
SHA512
3cd3470bc6f9d5eaebe43b8fd7330754c3dc1ea1a39888cd7078855833f46d0da5c2af945b08a4d4047bff42cf2e30ff199cc04f7affa692d38773a6e80acff7
-
SSDEEP
12288:rMrxy900iLRMFPKhlUyJ9DuucAQ0uNDk0W9eg/wUobP+4Y1COVetGa/ur/:CyQLgKh1Q0T0W4iwUo7+V1H4tvur/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7886.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4552-180-0x0000000004AE0000-0x0000000004B26000-memory.dmp family_redline behavioral1/memory/4552-181-0x00000000051B0000-0x00000000051F4000-memory.dmp family_redline behavioral1/memory/4552-182-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-183-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-185-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-187-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-189-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-191-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-193-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-195-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-197-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-199-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-201-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-203-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-205-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-208-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-212-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-215-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-217-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/4552-219-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3936 un872928.exe 4348 pro7886.exe 4552 qu1182.exe 1528 si527220.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7886.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un872928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un872928.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 pro7886.exe 4348 pro7886.exe 4552 qu1182.exe 4552 qu1182.exe 1528 si527220.exe 1528 si527220.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4348 pro7886.exe Token: SeDebugPrivilege 4552 qu1182.exe Token: SeDebugPrivilege 1528 si527220.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3936 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 66 PID 4152 wrote to memory of 3936 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 66 PID 4152 wrote to memory of 3936 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 66 PID 3936 wrote to memory of 4348 3936 un872928.exe 67 PID 3936 wrote to memory of 4348 3936 un872928.exe 67 PID 3936 wrote to memory of 4348 3936 un872928.exe 67 PID 3936 wrote to memory of 4552 3936 un872928.exe 68 PID 3936 wrote to memory of 4552 3936 un872928.exe 68 PID 3936 wrote to memory of 4552 3936 un872928.exe 68 PID 4152 wrote to memory of 1528 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 70 PID 4152 wrote to memory of 1528 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 70 PID 4152 wrote to memory of 1528 4152 e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe"C:\Users\Admin\AppData\Local\Temp\e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57863a6170dab60a5d873d68a7586c2fd
SHA111d194b4205472b4a955573281aec756d45eab5b
SHA25698f15ea028378c732fb467c49a97e2a6100a0d65738ea53b738deb6e887da7a7
SHA51288a8045543b85add30bacde3539945e57186d89d80c079f51a0eef5f94f35962522d30326ca9fe08e3426b7da17013b10d0a3a6e8d9ce96b387c6f00d879a064
-
Filesize
175KB
MD57863a6170dab60a5d873d68a7586c2fd
SHA111d194b4205472b4a955573281aec756d45eab5b
SHA25698f15ea028378c732fb467c49a97e2a6100a0d65738ea53b738deb6e887da7a7
SHA51288a8045543b85add30bacde3539945e57186d89d80c079f51a0eef5f94f35962522d30326ca9fe08e3426b7da17013b10d0a3a6e8d9ce96b387c6f00d879a064
-
Filesize
558KB
MD5dddebe68e1791152d71e3365ff9136df
SHA1161d09e8b7e042a1133e6d3264118f27516a46ef
SHA256633a50e13e6fc68ddaf61f4cf293375ba33d30ac9e76f91ab38c532544929b19
SHA5123517766529f652f697cf45302196d6fa5ea3d4b6118ac2ab0815f4f09eac035ee842beb11949c8e5998306ee4c9d4e8ac1b585a3db78abf2a698162067f2252d
-
Filesize
558KB
MD5dddebe68e1791152d71e3365ff9136df
SHA1161d09e8b7e042a1133e6d3264118f27516a46ef
SHA256633a50e13e6fc68ddaf61f4cf293375ba33d30ac9e76f91ab38c532544929b19
SHA5123517766529f652f697cf45302196d6fa5ea3d4b6118ac2ab0815f4f09eac035ee842beb11949c8e5998306ee4c9d4e8ac1b585a3db78abf2a698162067f2252d
-
Filesize
307KB
MD53f9749335588b4f8a3b28179fad3d4db
SHA1df93df5e86b10a53275a143c576277c32fa31972
SHA25630c2a0746a17faef9421604afb238d3709e7059cdb295743f9be4730ee8ce3dc
SHA51263f91197050cf5dcdcb2bad4679bf1d45d9bcb92fb2f2b155dd155b16cbe82b1265bfe8d26f2514293cf53fe948646597eb2a4e97ce4edc995406d60ee4f8a1c
-
Filesize
307KB
MD53f9749335588b4f8a3b28179fad3d4db
SHA1df93df5e86b10a53275a143c576277c32fa31972
SHA25630c2a0746a17faef9421604afb238d3709e7059cdb295743f9be4730ee8ce3dc
SHA51263f91197050cf5dcdcb2bad4679bf1d45d9bcb92fb2f2b155dd155b16cbe82b1265bfe8d26f2514293cf53fe948646597eb2a4e97ce4edc995406d60ee4f8a1c
-
Filesize
365KB
MD521c4cffe0b8df2625805f0e48a0070f0
SHA164f9fd680d4651526f9adcd520d4a2c6f3d28739
SHA256a61440c55ea7251d4063cc38ad038de84dca2f12603eb843b737553b97d2715a
SHA512b577c183eea0aaf7dc8206d35bfedb476ed446971cb61a58823ea826f7a363ce1edc1a963b0f7504640e19f8ba9b8b0947a91e0efac53bacd93ab0be14a7856c
-
Filesize
365KB
MD521c4cffe0b8df2625805f0e48a0070f0
SHA164f9fd680d4651526f9adcd520d4a2c6f3d28739
SHA256a61440c55ea7251d4063cc38ad038de84dca2f12603eb843b737553b97d2715a
SHA512b577c183eea0aaf7dc8206d35bfedb476ed446971cb61a58823ea826f7a363ce1edc1a963b0f7504640e19f8ba9b8b0947a91e0efac53bacd93ab0be14a7856c