Analysis
-
max time kernel
50s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 17:54
Static task
static1
Behavioral task
behavioral1
Sample
692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe
Resource
win10-20230220-en
General
-
Target
692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe
-
Size
695KB
-
MD5
a9aecdfd40a0c217b02e958616786f90
-
SHA1
1ee309b56b0aba8b6f74697673e4ef2f6668a897
-
SHA256
692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe
-
SHA512
41d90d029ccb45de21af14d61cfee14997062bc790b3f22715c99bfc92bfb51610ac9c9de2e27a3a65a60b3e23d70846f5a5076d42aabf934e162c9632693488
-
SSDEEP
12288:aMrty90oYDac+uZ3bLZuk9hWGxE7DYGQ6u3kna4bVnh9djTbk+YBB9:XyNYDac+MPZ5etYGza2th91bkzx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0169.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3672-176-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/3672-177-0x0000000002850000-0x0000000002894000-memory.dmp family_redline behavioral1/memory/3672-179-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-178-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-181-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-183-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-185-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-187-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-189-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-191-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-193-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-195-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-197-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-201-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-204-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-207-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-209-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-211-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-213-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-215-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/3672-1095-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4632 un735919.exe 2952 pro0169.exe 3672 qu6454.exe 4148 si832947.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0169.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un735919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un735919.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2952 pro0169.exe 2952 pro0169.exe 3672 qu6454.exe 3672 qu6454.exe 4148 si832947.exe 4148 si832947.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2952 pro0169.exe Token: SeDebugPrivilege 3672 qu6454.exe Token: SeDebugPrivilege 4148 si832947.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4632 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 66 PID 4460 wrote to memory of 4632 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 66 PID 4460 wrote to memory of 4632 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 66 PID 4632 wrote to memory of 2952 4632 un735919.exe 67 PID 4632 wrote to memory of 2952 4632 un735919.exe 67 PID 4632 wrote to memory of 2952 4632 un735919.exe 67 PID 4632 wrote to memory of 3672 4632 un735919.exe 68 PID 4632 wrote to memory of 3672 4632 un735919.exe 68 PID 4632 wrote to memory of 3672 4632 un735919.exe 68 PID 4460 wrote to memory of 4148 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 70 PID 4460 wrote to memory of 4148 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 70 PID 4460 wrote to memory of 4148 4460 692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe"C:\Users\Admin\AppData\Local\Temp\692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51a54fc998bed8f88deb4569924c5e5bc
SHA130602e11ffecf29125f1f8a4b2727a569b6c33bb
SHA2568d81fd065bc81ed702f003445a154fd20f01d2947ea72266bebc20052095a50b
SHA5125d1be5e107da564d89cce7f2088772fd4e298a7f3c2f406aa058e8971674b86026827056d9a8dfa9a9d3c379468943aed0cc52464d6a176d3b26db25503a4b83
-
Filesize
175KB
MD51a54fc998bed8f88deb4569924c5e5bc
SHA130602e11ffecf29125f1f8a4b2727a569b6c33bb
SHA2568d81fd065bc81ed702f003445a154fd20f01d2947ea72266bebc20052095a50b
SHA5125d1be5e107da564d89cce7f2088772fd4e298a7f3c2f406aa058e8971674b86026827056d9a8dfa9a9d3c379468943aed0cc52464d6a176d3b26db25503a4b83
-
Filesize
553KB
MD5950dac6f48f7b36e22e2951ad806f154
SHA173363bcebc516ae3f9c97d4d9ef448a8e4fe2969
SHA256b5807d9b21e7c717d49d35fd866f92812e52746c0b966630a69fd625922c69f9
SHA51235ab06fffc0e21aced0024ef4055312588eeded573aae356ae1d845095f52f2b293f5c838227018a133e7c12532daf16d95d67a07bf9826182afaa95fb556b91
-
Filesize
553KB
MD5950dac6f48f7b36e22e2951ad806f154
SHA173363bcebc516ae3f9c97d4d9ef448a8e4fe2969
SHA256b5807d9b21e7c717d49d35fd866f92812e52746c0b966630a69fd625922c69f9
SHA51235ab06fffc0e21aced0024ef4055312588eeded573aae356ae1d845095f52f2b293f5c838227018a133e7c12532daf16d95d67a07bf9826182afaa95fb556b91
-
Filesize
308KB
MD5be5ae46640a76db92f17a2589bc88efe
SHA1c10c606d66554e1a2ca37156409fbcfc3bfd6e56
SHA256a3b4417c3f7924d23b4c0ef1ae928469645d96c8dfa1c4d5ef50e478e13e1b74
SHA512d7cd6673fe98f3e9937871f03944a1c691dd2f2b2e4bff513ff11253ec47076541555a722a18530543d0fb804e9df018eec062c35d3188107bed7449ef7f43c2
-
Filesize
308KB
MD5be5ae46640a76db92f17a2589bc88efe
SHA1c10c606d66554e1a2ca37156409fbcfc3bfd6e56
SHA256a3b4417c3f7924d23b4c0ef1ae928469645d96c8dfa1c4d5ef50e478e13e1b74
SHA512d7cd6673fe98f3e9937871f03944a1c691dd2f2b2e4bff513ff11253ec47076541555a722a18530543d0fb804e9df018eec062c35d3188107bed7449ef7f43c2
-
Filesize
366KB
MD5ff63faa557b6ad48e9a0048e8a6c39ec
SHA1f65efcbad4911ae75f75f4825a360ed2ff4a996f
SHA256735721c12ddcaa6b7dd6de68e4985e7895f5772a6348c1b21e9d2ba75803a247
SHA512b893e7ce45930b4c8dede8350e141df12583755195c000bf64b3726a0a1657025cb13c60a23ceed5e50634e01918d29cfe9aab3ad7cbef29eaae71acf0ce9be4
-
Filesize
366KB
MD5ff63faa557b6ad48e9a0048e8a6c39ec
SHA1f65efcbad4911ae75f75f4825a360ed2ff4a996f
SHA256735721c12ddcaa6b7dd6de68e4985e7895f5772a6348c1b21e9d2ba75803a247
SHA512b893e7ce45930b4c8dede8350e141df12583755195c000bf64b3726a0a1657025cb13c60a23ceed5e50634e01918d29cfe9aab3ad7cbef29eaae71acf0ce9be4