Analysis
-
max time kernel
51s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 17:11
Static task
static1
Behavioral task
behavioral1
Sample
0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe
Resource
win10-20230220-en
General
-
Target
0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe
-
Size
695KB
-
MD5
2c9ee479346717e4db2ed8baa58e5515
-
SHA1
dcee4e0de297ac4247a5c3f6997057c467010d63
-
SHA256
0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b
-
SHA512
fd0370b0df8d9ff3b8446555c16794f55e37993f23af6e64ec15bb5d111275fe7685384a5ffac4a6c0a5e6d1d427bb96d23e797e4569b1dbd34740bc0c21d2cf
-
SSDEEP
12288:NMrvy90z3yFko7VAXIA9qRPrEHuOkZoEnhKNmIHPCRwNg8:iyA3yka9UoPgx6hKwIHPYM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2140.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3528-177-0x00000000026C0000-0x0000000002706000-memory.dmp family_redline behavioral1/memory/3528-180-0x0000000002780000-0x00000000027C4000-memory.dmp family_redline behavioral1/memory/3528-184-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-183-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-186-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-188-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-190-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-192-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-194-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-196-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-198-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-200-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-202-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-204-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-206-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-208-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-210-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-212-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-214-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3528-216-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5048 un234534.exe 3560 pro2140.exe 3528 qu5193.exe 5000 si681493.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2140.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un234534.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un234534.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3560 pro2140.exe 3560 pro2140.exe 3528 qu5193.exe 3528 qu5193.exe 5000 si681493.exe 5000 si681493.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3560 pro2140.exe Token: SeDebugPrivilege 3528 qu5193.exe Token: SeDebugPrivilege 5000 si681493.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5048 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 66 PID 4452 wrote to memory of 5048 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 66 PID 4452 wrote to memory of 5048 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 66 PID 5048 wrote to memory of 3560 5048 un234534.exe 67 PID 5048 wrote to memory of 3560 5048 un234534.exe 67 PID 5048 wrote to memory of 3560 5048 un234534.exe 67 PID 5048 wrote to memory of 3528 5048 un234534.exe 68 PID 5048 wrote to memory of 3528 5048 un234534.exe 68 PID 5048 wrote to memory of 3528 5048 un234534.exe 68 PID 4452 wrote to memory of 5000 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 70 PID 4452 wrote to memory of 5000 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 70 PID 4452 wrote to memory of 5000 4452 0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe"C:\Users\Admin\AppData\Local\Temp\0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c4eed6d064ae5f3599c45cadabd13749
SHA16c28d2b7844ee57351d728fc3561623212da4c9b
SHA256f3dfc9bb12f37f9d845d6103ba722039cc9ec313862bb154d118961f33362aeb
SHA512eb7eb6fadc488a31c5317dfd9bd6c992ab5e8553ccdf75cc6003bce9c6a1c1e0729ea5b161c25f64bc5e5517251e43474d98b407449ac638d4a17125fd586b31
-
Filesize
175KB
MD5c4eed6d064ae5f3599c45cadabd13749
SHA16c28d2b7844ee57351d728fc3561623212da4c9b
SHA256f3dfc9bb12f37f9d845d6103ba722039cc9ec313862bb154d118961f33362aeb
SHA512eb7eb6fadc488a31c5317dfd9bd6c992ab5e8553ccdf75cc6003bce9c6a1c1e0729ea5b161c25f64bc5e5517251e43474d98b407449ac638d4a17125fd586b31
-
Filesize
553KB
MD56458b2685c8ca681bf4eb56b27ad8a59
SHA18f1a71f130513271faca23e085b4f585d432d375
SHA256deccee92e3de6f83eca6962940efd7f6d592f2c8ab1c9a620f1b4a77e39b05d0
SHA512287d0b0a98715f553f50d34bd496ca8e3c89d194f6f211d78dd533bafa53c42a50f51531160043578c132db9a7b8df9dcc88a3497f89f7521ca6d5796b51fdb8
-
Filesize
553KB
MD56458b2685c8ca681bf4eb56b27ad8a59
SHA18f1a71f130513271faca23e085b4f585d432d375
SHA256deccee92e3de6f83eca6962940efd7f6d592f2c8ab1c9a620f1b4a77e39b05d0
SHA512287d0b0a98715f553f50d34bd496ca8e3c89d194f6f211d78dd533bafa53c42a50f51531160043578c132db9a7b8df9dcc88a3497f89f7521ca6d5796b51fdb8
-
Filesize
308KB
MD59f95b96d9e4770758ae2cd3a84ab1077
SHA1de42650be5378e59ec825532eff6af419a8c0839
SHA2569c68fffd9e3387bd5b0d3350836cc1e314f320078f1b41f8182288167c4197ea
SHA512ea176cbd9949e2559cfd3da2c55a7342292b12a322fda93c436229798b6872ddb249325962d109be7dfd6ace0533683baa0f172668cb8474ea47debc095e3802
-
Filesize
308KB
MD59f95b96d9e4770758ae2cd3a84ab1077
SHA1de42650be5378e59ec825532eff6af419a8c0839
SHA2569c68fffd9e3387bd5b0d3350836cc1e314f320078f1b41f8182288167c4197ea
SHA512ea176cbd9949e2559cfd3da2c55a7342292b12a322fda93c436229798b6872ddb249325962d109be7dfd6ace0533683baa0f172668cb8474ea47debc095e3802
-
Filesize
366KB
MD5f35b26dc58879c8e2492715d8cd12c99
SHA1a7e6653cb4e427105e3627e9302662b29cb08c86
SHA256d6fb57e50d9928698318d162149b41da1c26780d048283af7a02c28e64c245f2
SHA51237f0d1051454166c8a3c51f55bf83ee1be0b691bdc233c2285a9416dc651204bd2a0c14da649a6b8042dac54f4ad56ad512b093f8eb139e66e0e212ccc261fb8
-
Filesize
366KB
MD5f35b26dc58879c8e2492715d8cd12c99
SHA1a7e6653cb4e427105e3627e9302662b29cb08c86
SHA256d6fb57e50d9928698318d162149b41da1c26780d048283af7a02c28e64c245f2
SHA51237f0d1051454166c8a3c51f55bf83ee1be0b691bdc233c2285a9416dc651204bd2a0c14da649a6b8042dac54f4ad56ad512b093f8eb139e66e0e212ccc261fb8