Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 17:51
Static task
static1
Behavioral task
behavioral1
Sample
d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe
Resource
win10-20230220-en
General
-
Target
d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe
-
Size
695KB
-
MD5
f826ae85c3f2443448942633e7879db7
-
SHA1
b364563cec1239db008ed414c31f590961bb4361
-
SHA256
d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f
-
SHA512
f961871b20628d1b6c2f6128dcbc94253146d99ba80dc1706aa2c779c51648bee83f790c1b913429723c400b250e54647ba613dee060e4afbdc04b8f612b38ba
-
SSDEEP
12288:CMrTy90JuZdfNMVTmKf0A8qIxuIszeLzOS0nh/4Qs69IQ0iVvB+A:RyvnfNMRMNFh/ZKh/4QssIsgA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4485.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3560-181-0x00000000025D0000-0x0000000002616000-memory.dmp family_redline behavioral1/memory/3560-182-0x0000000004C80000-0x0000000004CC4000-memory.dmp family_redline behavioral1/memory/3560-183-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-184-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-186-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-188-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-190-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-192-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-194-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-196-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-198-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-200-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-206-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-209-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-211-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline behavioral1/memory/3560-212-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-202-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-214-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-216-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-218-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/3560-220-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2804 un230970.exe 2592 pro4485.exe 3560 qu5157.exe 4728 si837553.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4485.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un230970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un230970.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 pro4485.exe 2592 pro4485.exe 3560 qu5157.exe 3560 qu5157.exe 4728 si837553.exe 4728 si837553.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2592 pro4485.exe Token: SeDebugPrivilege 3560 qu5157.exe Token: SeDebugPrivilege 4728 si837553.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2804 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 66 PID 2456 wrote to memory of 2804 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 66 PID 2456 wrote to memory of 2804 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 66 PID 2804 wrote to memory of 2592 2804 un230970.exe 67 PID 2804 wrote to memory of 2592 2804 un230970.exe 67 PID 2804 wrote to memory of 2592 2804 un230970.exe 67 PID 2804 wrote to memory of 3560 2804 un230970.exe 68 PID 2804 wrote to memory of 3560 2804 un230970.exe 68 PID 2804 wrote to memory of 3560 2804 un230970.exe 68 PID 2456 wrote to memory of 4728 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 70 PID 2456 wrote to memory of 4728 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 70 PID 2456 wrote to memory of 4728 2456 d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe"C:\Users\Admin\AppData\Local\Temp\d31a20d47acb6f78287e40f249f833dfc1ac7bfec8a16732d05088f17119d12f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un230970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un230970.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5157.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si837553.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si837553.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51a73e5a046c68aab510e0f287dc17ec7
SHA14b258df37f6c7a5e1e68b10e0afc54b834e732e5
SHA25631b9d60c7ed2fe347a7c5ea919afa7b5028da1b24bc8d686171f3407fdea1b58
SHA5122308b4369e8f0bbbbef49b063494a28f5051580245cd849dc1cca3947c39b87cd171675b601e5b084ff453f1302b0e7822ef428e25bf05ee87460c94e8122a08
-
Filesize
175KB
MD51a73e5a046c68aab510e0f287dc17ec7
SHA14b258df37f6c7a5e1e68b10e0afc54b834e732e5
SHA25631b9d60c7ed2fe347a7c5ea919afa7b5028da1b24bc8d686171f3407fdea1b58
SHA5122308b4369e8f0bbbbef49b063494a28f5051580245cd849dc1cca3947c39b87cd171675b601e5b084ff453f1302b0e7822ef428e25bf05ee87460c94e8122a08
-
Filesize
553KB
MD53306ef28dde2f70c9202ef7a7c3c5a86
SHA11e70820ebf5661ab2766028911e7b4337e176bfa
SHA2567f94188629921da6a497df3c7ca7f53fae1530000eca4e0a9ab0983ccce0fcd8
SHA512188cdedc5b4cdc59b18e017f8cef0d51557ead5a177a08315d6aa0ad9cffdaf2b2fe24a68d84596ce990babed64e5c1b5b4f3acc547dc90012f9c0e29681e892
-
Filesize
553KB
MD53306ef28dde2f70c9202ef7a7c3c5a86
SHA11e70820ebf5661ab2766028911e7b4337e176bfa
SHA2567f94188629921da6a497df3c7ca7f53fae1530000eca4e0a9ab0983ccce0fcd8
SHA512188cdedc5b4cdc59b18e017f8cef0d51557ead5a177a08315d6aa0ad9cffdaf2b2fe24a68d84596ce990babed64e5c1b5b4f3acc547dc90012f9c0e29681e892
-
Filesize
308KB
MD5e813a0d7a4fdaf3908ca0a281a7bbe1f
SHA17ecbb2a6e352137b3b482c251e15b24dd3f1f0e2
SHA256431b4bc24e31c5f518dec79ba8c59b6f092cd9fcdb6ccdb0ae76ad6b2b48860d
SHA5126e02a001c711bb7cf132c172df5c58ed8bb2e93ad11bac9ba498852b70ed35489bc49184c7bdbb3dc628d2b2e88c643d7ff66cd051528a2a05877a4f66f9a965
-
Filesize
308KB
MD5e813a0d7a4fdaf3908ca0a281a7bbe1f
SHA17ecbb2a6e352137b3b482c251e15b24dd3f1f0e2
SHA256431b4bc24e31c5f518dec79ba8c59b6f092cd9fcdb6ccdb0ae76ad6b2b48860d
SHA5126e02a001c711bb7cf132c172df5c58ed8bb2e93ad11bac9ba498852b70ed35489bc49184c7bdbb3dc628d2b2e88c643d7ff66cd051528a2a05877a4f66f9a965
-
Filesize
366KB
MD5d3411496b845daf5b5ab1c7c43b20624
SHA1c9452812196ddca69da385cd2f17045b87b05d81
SHA25664a82d2cea95238cb8c85861fe15980655622bb4e8eb63fddead1fb2194e2838
SHA5129dd67ad7986d0db5caefaad59859e15d5350714d93ff1553e75ba27666bcd56e896eb21243b8e2aea33dba2caa132a3efe361b61fc8b37dec478dcf22fedd744
-
Filesize
366KB
MD5d3411496b845daf5b5ab1c7c43b20624
SHA1c9452812196ddca69da385cd2f17045b87b05d81
SHA25664a82d2cea95238cb8c85861fe15980655622bb4e8eb63fddead1fb2194e2838
SHA5129dd67ad7986d0db5caefaad59859e15d5350714d93ff1553e75ba27666bcd56e896eb21243b8e2aea33dba2caa132a3efe361b61fc8b37dec478dcf22fedd744