Analysis
-
max time kernel
55s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 17:28
Static task
static1
Behavioral task
behavioral1
Sample
5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe
Resource
win10-20230220-en
General
-
Target
5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe
-
Size
695KB
-
MD5
1720eb08ac3286cc3ccfe174cf599950
-
SHA1
9cea76060d030f0815749085ef419856d5ecf3c6
-
SHA256
5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35
-
SHA512
7fa2d1ef8c5395d4b47b9dfe8eb5ea0bf5468e26b29b411466dd25fcb6f3bb4b0cbfcd2133129adb559665f5be4c1ba74c6922f380b223df13e60538054571a1
-
SSDEEP
12288:qMrHy90/K4vm3HHAaqHiVJ9u1vMnh7oUoWdMljyppS:dyyJCHno6KCh7oBKM+pQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4391.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3048-180-0x0000000004AE0000-0x0000000004B26000-memory.dmp family_redline behavioral1/memory/3048-181-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/3048-183-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-182-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-185-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-187-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-189-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-191-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-193-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-195-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-199-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-205-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-202-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-207-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-209-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-211-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-213-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-215-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-217-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3048-219-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2120 un443203.exe 2512 pro4391.exe 3048 qu1947.exe 4176 si764033.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4391.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un443203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un443203.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2512 pro4391.exe 2512 pro4391.exe 3048 qu1947.exe 3048 qu1947.exe 4176 si764033.exe 4176 si764033.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2512 pro4391.exe Token: SeDebugPrivilege 3048 qu1947.exe Token: SeDebugPrivilege 4176 si764033.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2120 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 66 PID 1804 wrote to memory of 2120 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 66 PID 1804 wrote to memory of 2120 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 66 PID 2120 wrote to memory of 2512 2120 un443203.exe 67 PID 2120 wrote to memory of 2512 2120 un443203.exe 67 PID 2120 wrote to memory of 2512 2120 un443203.exe 67 PID 2120 wrote to memory of 3048 2120 un443203.exe 68 PID 2120 wrote to memory of 3048 2120 un443203.exe 68 PID 2120 wrote to memory of 3048 2120 un443203.exe 68 PID 1804 wrote to memory of 4176 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 70 PID 1804 wrote to memory of 4176 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 70 PID 1804 wrote to memory of 4176 1804 5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe"C:\Users\Admin\AppData\Local\Temp\5354743482cb420298cbc267bb7f3f46f91e318200ebba81a90fac0ffb921f35.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un443203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un443203.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4391.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1947.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1947.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764033.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD585f3991c12e8a2f38d1652af3f29bd51
SHA14f6445cf86225248c769ea0a8a1d212f95be40fd
SHA2562267192954262f75ef9e485297243a327eb108e819b3533908a3eee13e1d6b05
SHA512e60fbc4c060f9cc5e8889d72fe796608d1e9679e5dca19e45ff250958d8044fc9a5e797905c1dacddd63095ee0479b71fbcb12df1426516d5892ec2542bffd9a
-
Filesize
175KB
MD585f3991c12e8a2f38d1652af3f29bd51
SHA14f6445cf86225248c769ea0a8a1d212f95be40fd
SHA2562267192954262f75ef9e485297243a327eb108e819b3533908a3eee13e1d6b05
SHA512e60fbc4c060f9cc5e8889d72fe796608d1e9679e5dca19e45ff250958d8044fc9a5e797905c1dacddd63095ee0479b71fbcb12df1426516d5892ec2542bffd9a
-
Filesize
553KB
MD502af788c4e3863638aa3590f84bed854
SHA17ef0cdd342505c058ed062c5f38658bb2d8c9aa0
SHA2562f55dd98270d3515b4adf4ed515929b9794d34bc64d34337daabd53c5585cd92
SHA5128e90fa48e1243faf7e57237fa6d9962681d9c04e2a610bfab0bbb790eea2653a251f1de821113a84e343d62f54bd83afad3372f43e321709629ed652d790dffa
-
Filesize
553KB
MD502af788c4e3863638aa3590f84bed854
SHA17ef0cdd342505c058ed062c5f38658bb2d8c9aa0
SHA2562f55dd98270d3515b4adf4ed515929b9794d34bc64d34337daabd53c5585cd92
SHA5128e90fa48e1243faf7e57237fa6d9962681d9c04e2a610bfab0bbb790eea2653a251f1de821113a84e343d62f54bd83afad3372f43e321709629ed652d790dffa
-
Filesize
308KB
MD5fb843a64704b355da4dca96b3e255b58
SHA18571fa13e3f2f77ca501f4d46264c338e0de68bb
SHA25624372aa1e8ca15ef7f63e2e78262d1e5f1ea830d7cdf21f3f8c86ecd26a11cef
SHA512f648c6eb542b3f28c3af3e4ae30e17567f21fe831d643beaddea857bfe75cb99aa2e9b47a65f4e937af9a79415bd1f93c1f414122bc04c5afb7c6460fde5c539
-
Filesize
308KB
MD5fb843a64704b355da4dca96b3e255b58
SHA18571fa13e3f2f77ca501f4d46264c338e0de68bb
SHA25624372aa1e8ca15ef7f63e2e78262d1e5f1ea830d7cdf21f3f8c86ecd26a11cef
SHA512f648c6eb542b3f28c3af3e4ae30e17567f21fe831d643beaddea857bfe75cb99aa2e9b47a65f4e937af9a79415bd1f93c1f414122bc04c5afb7c6460fde5c539
-
Filesize
366KB
MD5118acc06e093441b954a79ad5e261f40
SHA17990cb369848342630f50b7fe8ea4a162fb1e144
SHA256058f912edca4b3befb4ed0762abb679b980d805f18bd0f65c29f77c36edca441
SHA51201f10f70b9ada29b221ca94cd426b0e091ae5ff0d6e190637c9daaa24a8c937814a9751da748e9f299bef27b9076037857b76c5f405f23a3b9c4f73ba48a04ed
-
Filesize
366KB
MD5118acc06e093441b954a79ad5e261f40
SHA17990cb369848342630f50b7fe8ea4a162fb1e144
SHA256058f912edca4b3befb4ed0762abb679b980d805f18bd0f65c29f77c36edca441
SHA51201f10f70b9ada29b221ca94cd426b0e091ae5ff0d6e190637c9daaa24a8c937814a9751da748e9f299bef27b9076037857b76c5f405f23a3b9c4f73ba48a04ed