Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 18:15
Static task
static1
Behavioral task
behavioral1
Sample
c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe
Resource
win10-20230220-en
General
-
Target
c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe
-
Size
699KB
-
MD5
92c445efed02564eb3eb2416301faaaa
-
SHA1
11d4ca0bc10eaeec383689dbc4ed59aa6869fe9c
-
SHA256
c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39
-
SHA512
a3b342c09716a1c40b9e6aa8110cea155adac936cb8f0d961ae568cd6ec40c56f6cfebd600c900d09722bceef1754304469f167920a2706c9b33205e875a648a
-
SSDEEP
12288:jMrvy90b/DZol17dBA+Ure2qOyre7sFyT86jWir4i2kyouoBWVrMONwPqMLhXkpz:8yAZonxkebO1YFk5RfqFrMONAq2hXGGO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4199.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2204-181-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/2204-182-0x0000000004D10000-0x0000000004D54000-memory.dmp family_redline behavioral1/memory/2204-183-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-184-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-186-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-188-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-190-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-192-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2204-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2412 un227497.exe 2680 pro4199.exe 2204 qu1635.exe 3748 si546512.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4199.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un227497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un227497.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2680 pro4199.exe 2680 pro4199.exe 2204 qu1635.exe 2204 qu1635.exe 3748 si546512.exe 3748 si546512.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2680 pro4199.exe Token: SeDebugPrivilege 2204 qu1635.exe Token: SeDebugPrivilege 3748 si546512.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2412 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 66 PID 2140 wrote to memory of 2412 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 66 PID 2140 wrote to memory of 2412 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 66 PID 2412 wrote to memory of 2680 2412 un227497.exe 67 PID 2412 wrote to memory of 2680 2412 un227497.exe 67 PID 2412 wrote to memory of 2680 2412 un227497.exe 67 PID 2412 wrote to memory of 2204 2412 un227497.exe 68 PID 2412 wrote to memory of 2204 2412 un227497.exe 68 PID 2412 wrote to memory of 2204 2412 un227497.exe 68 PID 2140 wrote to memory of 3748 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 70 PID 2140 wrote to memory of 3748 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 70 PID 2140 wrote to memory of 3748 2140 c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe"C:\Users\Admin\AppData\Local\Temp\c054e8e4916cd8fbff8b96819a978c353b40b73c3f2065f40f561957ebcd4d39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un227497.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un227497.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4199.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1635.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si546512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si546512.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c95ef0aa6be7b09a945a685a995c7733
SHA1c5b964940abbb18e7c62293390d7dae2c91eb863
SHA256bf2628a225f495f346539fd4d191db87d6fbbca3db6e7faf7bc941f5c49754ec
SHA512f2440bd1a78d4a9649b91a0d1b0aba47bbcb6eeddc1081f76ebccf38dde20323e885c84fa199d241c0fb0b79bb61cbbc315ae6e177d8d71dada466a4fd4032fb
-
Filesize
175KB
MD5c95ef0aa6be7b09a945a685a995c7733
SHA1c5b964940abbb18e7c62293390d7dae2c91eb863
SHA256bf2628a225f495f346539fd4d191db87d6fbbca3db6e7faf7bc941f5c49754ec
SHA512f2440bd1a78d4a9649b91a0d1b0aba47bbcb6eeddc1081f76ebccf38dde20323e885c84fa199d241c0fb0b79bb61cbbc315ae6e177d8d71dada466a4fd4032fb
-
Filesize
557KB
MD5716033ac93278c6acf6426fadd44dbbf
SHA1020606315b428bd2b13e93277a2329f8b0b7d5e3
SHA2565350726129d8a42d5f5670baa16ca0d9cc3e15941bd1f95227e49d23c1e0de12
SHA51295915c5bb096593252a824cf2f550f5d30e1af341cad636d8e13d691d84e38af713e5786617b575307d7d34a017ac01cddb228f3a6e04abe747a8c66681e9951
-
Filesize
557KB
MD5716033ac93278c6acf6426fadd44dbbf
SHA1020606315b428bd2b13e93277a2329f8b0b7d5e3
SHA2565350726129d8a42d5f5670baa16ca0d9cc3e15941bd1f95227e49d23c1e0de12
SHA51295915c5bb096593252a824cf2f550f5d30e1af341cad636d8e13d691d84e38af713e5786617b575307d7d34a017ac01cddb228f3a6e04abe747a8c66681e9951
-
Filesize
307KB
MD59b9cb4b8c5276cdc755940e21a06e8da
SHA19f93da945260a55f7fede7600855b26e487bfa62
SHA2567e87d425cb0ac14a71f06f4d4a2609e417203c79c54cc67b03df518e8b9710b1
SHA512d5be928f71867994097feff6e92a4f33b5b73deafa1baf21578737949db340b2f07201ab7af6a7bd5af97f015d1981b529bef903dc880ca5fca1b3a554f76627
-
Filesize
307KB
MD59b9cb4b8c5276cdc755940e21a06e8da
SHA19f93da945260a55f7fede7600855b26e487bfa62
SHA2567e87d425cb0ac14a71f06f4d4a2609e417203c79c54cc67b03df518e8b9710b1
SHA512d5be928f71867994097feff6e92a4f33b5b73deafa1baf21578737949db340b2f07201ab7af6a7bd5af97f015d1981b529bef903dc880ca5fca1b3a554f76627
-
Filesize
366KB
MD5500c7441dc85f1cafd86c0af103a5b5b
SHA13764ba36ef72bd7f70ebb598875a14824fadaf05
SHA256250bec0fd51d228dcf9eca12ffd3c4012c03107174f3ed15fdac21908464e886
SHA51242472e6f0e35056ebd37f5ec700d5ae1fb888841707370b38349eb90851d41da9b88216a186a85ef8dcf9d5a4a35ab8805f5213277e792b61d8c27b8b1cefd82
-
Filesize
366KB
MD5500c7441dc85f1cafd86c0af103a5b5b
SHA13764ba36ef72bd7f70ebb598875a14824fadaf05
SHA256250bec0fd51d228dcf9eca12ffd3c4012c03107174f3ed15fdac21908464e886
SHA51242472e6f0e35056ebd37f5ec700d5ae1fb888841707370b38349eb90851d41da9b88216a186a85ef8dcf9d5a4a35ab8805f5213277e792b61d8c27b8b1cefd82