Analysis
-
max time kernel
57s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe
Resource
win10-20230220-en
General
-
Target
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe
-
Size
700KB
-
MD5
00115cd14159ea81f10a7cecce3cc851
-
SHA1
49a82228887494053337c913a3e9a3ad35f1478f
-
SHA256
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441
-
SHA512
41530a728a6519355d63fd5dd845a3d185fcb90b86f268a682a247edc671bcbb44e43ad694d5daece3868fc3aea5f2e0f72fac89b69a76bbf63ce15d77cc4a01
-
SSDEEP
12288:sMrzy90ejgGykXwrrvwQzLOKDew0khrM2NwPaSLPHEycA:fyZcIOzzLdDew0MrM2NAaoPHiA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2764.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4920-176-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/4920-177-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4920-179-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-178-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-181-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-183-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-185-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-187-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-189-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-191-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-193-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-195-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-197-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-199-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-201-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-203-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-205-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-207-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-209-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-211-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4920-1099-0x0000000002580000-0x0000000002590000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1716 un901872.exe 1436 pro2764.exe 4920 qu1971.exe 3568 si870601.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2764.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un901872.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un901872.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1436 pro2764.exe 1436 pro2764.exe 4920 qu1971.exe 4920 qu1971.exe 3568 si870601.exe 3568 si870601.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1436 pro2764.exe Token: SeDebugPrivilege 4920 qu1971.exe Token: SeDebugPrivilege 3568 si870601.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4220 wrote to memory of 1716 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 67 PID 4220 wrote to memory of 1716 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 67 PID 4220 wrote to memory of 1716 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 67 PID 1716 wrote to memory of 1436 1716 un901872.exe 68 PID 1716 wrote to memory of 1436 1716 un901872.exe 68 PID 1716 wrote to memory of 1436 1716 un901872.exe 68 PID 1716 wrote to memory of 4920 1716 un901872.exe 69 PID 1716 wrote to memory of 4920 1716 un901872.exe 69 PID 1716 wrote to memory of 4920 1716 un901872.exe 69 PID 4220 wrote to memory of 3568 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 71 PID 4220 wrote to memory of 3568 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 71 PID 4220 wrote to memory of 3568 4220 91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe"C:\Users\Admin\AppData\Local\Temp\91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59901ffc47d267ef30a2ec3822b4b300b
SHA1791c0aa4409dab24634a446f9ceaef274afa2801
SHA256f26077b4af16170abcd4d5ad968028aa714b657d3f20eb4ffc02568faf839471
SHA5129e1aebbffdfa9ed9f9cac468f694c81aad44a32b0631499b6aae96b4b33e0fa17f7145aa6bef82f2f906bc960ee21ab9c3c6dccd9031ca45256a704494d53861
-
Filesize
175KB
MD59901ffc47d267ef30a2ec3822b4b300b
SHA1791c0aa4409dab24634a446f9ceaef274afa2801
SHA256f26077b4af16170abcd4d5ad968028aa714b657d3f20eb4ffc02568faf839471
SHA5129e1aebbffdfa9ed9f9cac468f694c81aad44a32b0631499b6aae96b4b33e0fa17f7145aa6bef82f2f906bc960ee21ab9c3c6dccd9031ca45256a704494d53861
-
Filesize
557KB
MD57791270a40be805b9f30dfea3146dfa3
SHA1a43720297dd4bf609937c83cd31d9548b00a7059
SHA25699c4a26d138908d5ae276ea1a60e34009fa5ec568ed1ded6c88b1a4e3ee83a3b
SHA51229679b661406769e8978aabdc914c8ea9bb9690e3f585272145ac6cf941c834261aa3a19b2f1e3a7c52d16d05749eef28d3832473dfa4aa278355622ef07f1bc
-
Filesize
557KB
MD57791270a40be805b9f30dfea3146dfa3
SHA1a43720297dd4bf609937c83cd31d9548b00a7059
SHA25699c4a26d138908d5ae276ea1a60e34009fa5ec568ed1ded6c88b1a4e3ee83a3b
SHA51229679b661406769e8978aabdc914c8ea9bb9690e3f585272145ac6cf941c834261aa3a19b2f1e3a7c52d16d05749eef28d3832473dfa4aa278355622ef07f1bc
-
Filesize
307KB
MD5c08dd59291842a106313352196008fd1
SHA13297dbd000d550f6fab9a55547e6c51b84c9d515
SHA256f3da5103395c0b61c9f0a3fc002e7ef3b1cc1349fa6a5683844df5531fd310d8
SHA51241dec7499d15f13696ac98d335829767a7492bf26e95f27fa5df811a45c5cc7c4a2e51dcca3b53f9daaa70c886b5adc0732ce8961962dcafaa7c6e3fd9918f9a
-
Filesize
307KB
MD5c08dd59291842a106313352196008fd1
SHA13297dbd000d550f6fab9a55547e6c51b84c9d515
SHA256f3da5103395c0b61c9f0a3fc002e7ef3b1cc1349fa6a5683844df5531fd310d8
SHA51241dec7499d15f13696ac98d335829767a7492bf26e95f27fa5df811a45c5cc7c4a2e51dcca3b53f9daaa70c886b5adc0732ce8961962dcafaa7c6e3fd9918f9a
-
Filesize
366KB
MD5d3927fb19196d6cac6e5937988808ddb
SHA10dc5044f8e15dbf576c157cb4b42504d0d90f1aa
SHA2569c768239b7c959133bd2b1614c24ed15a8189f3a4da6dfec67bfbc4bba4f5129
SHA51247674156cc862c8cf4c84c4872ee4759590937a34bc0ff0d2dc4c263f531bf2bdceffea415ff421382918e760ef1ab76a826e62cbaae5bcdccf0ce2fe9489b9f
-
Filesize
366KB
MD5d3927fb19196d6cac6e5937988808ddb
SHA10dc5044f8e15dbf576c157cb4b42504d0d90f1aa
SHA2569c768239b7c959133bd2b1614c24ed15a8189f3a4da6dfec67bfbc4bba4f5129
SHA51247674156cc862c8cf4c84c4872ee4759590937a34bc0ff0d2dc4c263f531bf2bdceffea415ff421382918e760ef1ab76a826e62cbaae5bcdccf0ce2fe9489b9f