Analysis
-
max time kernel
57s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 18:35
Static task
static1
Behavioral task
behavioral1
Sample
94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe
Resource
win10-20230220-en
General
-
Target
94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe
-
Size
700KB
-
MD5
d1e46b0ffed0c4fdf622a29c152bcd5a
-
SHA1
df41098b923d9f84da65c1a12cb1ca1e5fc782bb
-
SHA256
94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79
-
SHA512
0d533b7c2b6e407cf971cf1cf28a984ddb7ab7c54ad2b0a9eed2626d02c0ebbf8ce6044b9406c8b2b784b9c9c30819fc77ca48da0f382afd5a75b16372534794
-
SSDEEP
12288:1Mrby901HYD/WR0UVluaX4JAxMLDx3FXLqHscTNwP/YLdLP5F:CyUHYLal1X4JAxMLDxRysCNA/qtf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0294.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3784-177-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/3784-178-0x0000000004CC0000-0x0000000004D04000-memory.dmp family_redline behavioral1/memory/3784-180-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-179-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-182-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-184-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-186-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-188-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-190-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-198-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-202-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3784-1098-0x0000000004DE0000-0x0000000004DF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3968 un500881.exe 848 pro0294.exe 3784 qu8604.exe 4800 si228942.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0294.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un500881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un500881.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 848 pro0294.exe 848 pro0294.exe 3784 qu8604.exe 3784 qu8604.exe 4800 si228942.exe 4800 si228942.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 848 pro0294.exe Token: SeDebugPrivilege 3784 qu8604.exe Token: SeDebugPrivilege 4800 si228942.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 8 wrote to memory of 3968 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 66 PID 8 wrote to memory of 3968 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 66 PID 8 wrote to memory of 3968 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 66 PID 3968 wrote to memory of 848 3968 un500881.exe 67 PID 3968 wrote to memory of 848 3968 un500881.exe 67 PID 3968 wrote to memory of 848 3968 un500881.exe 67 PID 3968 wrote to memory of 3784 3968 un500881.exe 68 PID 3968 wrote to memory of 3784 3968 un500881.exe 68 PID 3968 wrote to memory of 3784 3968 un500881.exe 68 PID 8 wrote to memory of 4800 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 70 PID 8 wrote to memory of 4800 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 70 PID 8 wrote to memory of 4800 8 94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe"C:\Users\Admin\AppData\Local\Temp\94062fb97f3ea513c3e3830c734d56ea7e8927899830e24bf21ee2e4cc1f6d79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0294.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8604.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si228942.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si228942.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53ed4e9d1094210483bdb2bf77d164828
SHA1c5bbcab1f64b67fae399389480c4c275f779e2d5
SHA2566d244b0e65cb9b3f3da973f1283a14fb783916fbcc7c2ef30961930ae40616a4
SHA512d37460fecaedaf3cbff70d65994c82f0ec8549e4bcc3f9012a779c2172f00982295c5221e118fa1a9e4b65855d9b76d661b2eb67d35cb7c582a90deb6351fbd4
-
Filesize
175KB
MD53ed4e9d1094210483bdb2bf77d164828
SHA1c5bbcab1f64b67fae399389480c4c275f779e2d5
SHA2566d244b0e65cb9b3f3da973f1283a14fb783916fbcc7c2ef30961930ae40616a4
SHA512d37460fecaedaf3cbff70d65994c82f0ec8549e4bcc3f9012a779c2172f00982295c5221e118fa1a9e4b65855d9b76d661b2eb67d35cb7c582a90deb6351fbd4
-
Filesize
558KB
MD5234e6580e321c5c204d74b32fcada931
SHA1880e79953d46dc7da75a1f1acf76ea4e881de057
SHA2567d241245fc778a85123c496fb94103d31265a9d6b56467bcc0079ab2facd380a
SHA512897904df37f892b8a6b3d0481c4531c6c49cf64192fe1a6ae933d822d718e399a4c3c1a71ae082120ed298b9ff693727fc04611e54132a5eb622aaaa9c02f294
-
Filesize
558KB
MD5234e6580e321c5c204d74b32fcada931
SHA1880e79953d46dc7da75a1f1acf76ea4e881de057
SHA2567d241245fc778a85123c496fb94103d31265a9d6b56467bcc0079ab2facd380a
SHA512897904df37f892b8a6b3d0481c4531c6c49cf64192fe1a6ae933d822d718e399a4c3c1a71ae082120ed298b9ff693727fc04611e54132a5eb622aaaa9c02f294
-
Filesize
307KB
MD55e041d5b2f0879fe6b208bc708bb1ef0
SHA181c5ecb2cc19288ec8fc639cf258fa4362a34869
SHA256fd1994a5e1b12e0bba339fc908e7919281fdba45c2e59a5cc60962823a309439
SHA512c4d5281f0512ea326dde4b461343fe999346d02cfb5e8f159e47f2a175113634c61f3c4d4f82490a231e1af0e272f9f62283e9dcc12e71d705efd797a48fb460
-
Filesize
307KB
MD55e041d5b2f0879fe6b208bc708bb1ef0
SHA181c5ecb2cc19288ec8fc639cf258fa4362a34869
SHA256fd1994a5e1b12e0bba339fc908e7919281fdba45c2e59a5cc60962823a309439
SHA512c4d5281f0512ea326dde4b461343fe999346d02cfb5e8f159e47f2a175113634c61f3c4d4f82490a231e1af0e272f9f62283e9dcc12e71d705efd797a48fb460
-
Filesize
366KB
MD54f393c918a76bd307b8cdc8599d97b0f
SHA10308299480e298b553279ed0e14a727daaa7a434
SHA256aa9f6d2679545495faf46054c064798c2a1fac88d68b172f7ad7c5143c9e690c
SHA51296b831604121133380c96424e19aae5a60cde505dcadeb2cb40cc63c546a33744f29d218cd5b4b37ce50f697d77d1ab7ade767224be883e7db8ecf6bc26ae412
-
Filesize
366KB
MD54f393c918a76bd307b8cdc8599d97b0f
SHA10308299480e298b553279ed0e14a727daaa7a434
SHA256aa9f6d2679545495faf46054c064798c2a1fac88d68b172f7ad7c5143c9e690c
SHA51296b831604121133380c96424e19aae5a60cde505dcadeb2cb40cc63c546a33744f29d218cd5b4b37ce50f697d77d1ab7ade767224be883e7db8ecf6bc26ae412