Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:37
Static task
static1
Behavioral task
behavioral1
Sample
32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe
Resource
win10v2004-20230220-en
General
-
Target
32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe
-
Size
695KB
-
MD5
38376aeb19e6e4e035dca7e61be9b641
-
SHA1
831747920e510446d5c9a935b1e7ec9b2fb8cb3a
-
SHA256
32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390
-
SHA512
24a84db7bc7f7b97229951fe1265c4170c7e0930cf09d803341abe0c0c8cdbaaf0fcb2a37c5289a56cbc6fe46c830634fba62bb2088c611d2d2c084f69fa5aee
-
SSDEEP
12288:6Mr3y90jz3XovatTFaIJDtUr122ouPlyQNkSmh6MSF0azzAsJ8HIag0d2DS58I:VyOHovaTJxo22oelyQNShKxzj+o2z
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9107.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9107.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3428-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3428-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3168 un294558.exe 1128 pro9107.exe 3428 qu9622.exe 1072 si803413.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9107.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un294558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un294558.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1128 pro9107.exe 1128 pro9107.exe 3428 qu9622.exe 3428 qu9622.exe 1072 si803413.exe 1072 si803413.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1128 pro9107.exe Token: SeDebugPrivilege 3428 qu9622.exe Token: SeDebugPrivilege 1072 si803413.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1956 wrote to memory of 3168 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 79 PID 1956 wrote to memory of 3168 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 79 PID 1956 wrote to memory of 3168 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 79 PID 3168 wrote to memory of 1128 3168 un294558.exe 80 PID 3168 wrote to memory of 1128 3168 un294558.exe 80 PID 3168 wrote to memory of 1128 3168 un294558.exe 80 PID 3168 wrote to memory of 3428 3168 un294558.exe 87 PID 3168 wrote to memory of 3428 3168 un294558.exe 87 PID 3168 wrote to memory of 3428 3168 un294558.exe 87 PID 1956 wrote to memory of 1072 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 91 PID 1956 wrote to memory of 1072 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 91 PID 1956 wrote to memory of 1072 1956 32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe"C:\Users\Admin\AppData\Local\Temp\32ab61332e9f6a8cd06d02f8a02feb5b4e8a2dd1bc05e4b43812dacb93aee390.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9107.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9107.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9622.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si803413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si803413.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ed961037458b2dbe070acc744367af14
SHA17aafda61550ae17d85bd20c33988fc01d6d740cd
SHA256437fc2729d3f32d6fcafea319bc4e6dcd88e4cc0410b4c7fc9b7f8013e79e3c3
SHA512b48b0bda6dfb22d33b0ed9cc7999543e2075f1bf0662092a12d4a9f058da816f1301b402b4b77e11c200ffe0f6168c6b58fa411c3db5fad697bd3a0c0ef9ec8c
-
Filesize
175KB
MD5ed961037458b2dbe070acc744367af14
SHA17aafda61550ae17d85bd20c33988fc01d6d740cd
SHA256437fc2729d3f32d6fcafea319bc4e6dcd88e4cc0410b4c7fc9b7f8013e79e3c3
SHA512b48b0bda6dfb22d33b0ed9cc7999543e2075f1bf0662092a12d4a9f058da816f1301b402b4b77e11c200ffe0f6168c6b58fa411c3db5fad697bd3a0c0ef9ec8c
-
Filesize
553KB
MD583739bfa4ec44be583455f118aabc06d
SHA14a3c66082893228aeea43be169be69387b16cda0
SHA256603748c73c7b1e9947711fa7249d8088f0bc1b459b353a7d8ecbf171a8363771
SHA512f153d13b74669bb7c027bb910bcbac47795563788a14c553d0900e4ced318f5691ec4f8bae66ddf183c3defecb614dc79142cf66d91f4616c15a78528064f30c
-
Filesize
553KB
MD583739bfa4ec44be583455f118aabc06d
SHA14a3c66082893228aeea43be169be69387b16cda0
SHA256603748c73c7b1e9947711fa7249d8088f0bc1b459b353a7d8ecbf171a8363771
SHA512f153d13b74669bb7c027bb910bcbac47795563788a14c553d0900e4ced318f5691ec4f8bae66ddf183c3defecb614dc79142cf66d91f4616c15a78528064f30c
-
Filesize
308KB
MD5797d3f47dfd6cf796aea3658da0ce9b0
SHA1e9a2e271ce78496a9f629fd1840b8086706edc9f
SHA2567ccc221f49db3f191c1cb8a2d808029f8fbe9d4e7d7d0db21cbca5f2f7fc12f0
SHA51208e3f01e6f258a62b27f4cde31688506be9adad80699da8a14f029e3df695ae13a8c7b94dc599ae6290a6609cfc173246b516748efe9bd4404ae97642b13e658
-
Filesize
308KB
MD5797d3f47dfd6cf796aea3658da0ce9b0
SHA1e9a2e271ce78496a9f629fd1840b8086706edc9f
SHA2567ccc221f49db3f191c1cb8a2d808029f8fbe9d4e7d7d0db21cbca5f2f7fc12f0
SHA51208e3f01e6f258a62b27f4cde31688506be9adad80699da8a14f029e3df695ae13a8c7b94dc599ae6290a6609cfc173246b516748efe9bd4404ae97642b13e658
-
Filesize
366KB
MD5307a0a3fd8a8e8b2bb2d29eb6557f908
SHA1525ac88f603cb72672159e14479c9bd73c8ed059
SHA256f78998b2b0a3e8993cb7e30a66609915f8f75310cf5c79276cd57c24b5592465
SHA5126a3f62d4bf8fa327c6c050868e0725167feee9061c3619733b9f59cca982de0022968c7230e1878ad24bd4ebcddd8064fda04b353160b65b9c96b372dc7b476f
-
Filesize
366KB
MD5307a0a3fd8a8e8b2bb2d29eb6557f908
SHA1525ac88f603cb72672159e14479c9bd73c8ed059
SHA256f78998b2b0a3e8993cb7e30a66609915f8f75310cf5c79276cd57c24b5592465
SHA5126a3f62d4bf8fa327c6c050868e0725167feee9061c3619733b9f59cca982de0022968c7230e1878ad24bd4ebcddd8064fda04b353160b65b9c96b372dc7b476f