Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe
Resource
win10-20230220-en
General
-
Target
82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe
-
Size
699KB
-
MD5
956dffa28ea0afdb4962172f865636a5
-
SHA1
29f2bb8ade401443a25ce00f6a3fbfa78de7c753
-
SHA256
82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de
-
SHA512
0a39c812908e5788d7a7fa2dbeeb9ea96291998d9d7c01eb457a53d3b4747ad9b60ccbf6e34998a49e4b0dad1acd597c8b44569fe720409512347b527de8f91d
-
SSDEEP
12288:DMrdy90riED/+wFRE6jUMX+oEt5rMANwP3SLDDLUrx:qyTED5RhUo+oEt5rMANA3oDUt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4542.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1472-176-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/1472-177-0x00000000051F0000-0x0000000005234000-memory.dmp family_redline behavioral1/memory/1472-178-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-179-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-181-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-183-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-185-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-187-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-189-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-193-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-197-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-199-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-201-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-203-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-205-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-207-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-209-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-211-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-213-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/1472-215-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3596 un047234.exe 2344 pro4542.exe 1472 qu3407.exe 1300 si222731.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4542.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un047234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un047234.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2344 pro4542.exe 2344 pro4542.exe 1472 qu3407.exe 1472 qu3407.exe 1300 si222731.exe 1300 si222731.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 pro4542.exe Token: SeDebugPrivilege 1472 qu3407.exe Token: SeDebugPrivilege 1300 si222731.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3596 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 66 PID 4148 wrote to memory of 3596 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 66 PID 4148 wrote to memory of 3596 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 66 PID 3596 wrote to memory of 2344 3596 un047234.exe 67 PID 3596 wrote to memory of 2344 3596 un047234.exe 67 PID 3596 wrote to memory of 2344 3596 un047234.exe 67 PID 3596 wrote to memory of 1472 3596 un047234.exe 68 PID 3596 wrote to memory of 1472 3596 un047234.exe 68 PID 3596 wrote to memory of 1472 3596 un047234.exe 68 PID 4148 wrote to memory of 1300 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 70 PID 4148 wrote to memory of 1300 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 70 PID 4148 wrote to memory of 1300 4148 82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe"C:\Users\Admin\AppData\Local\Temp\82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD533669a39d138dcf53f4708e55cdee917
SHA1cb9fcaa056827ecc52397222da4c564ff472a748
SHA2567401cea259cf27d8c575fac50e72dacbfb327b35a7408c37fce6289f4e66a7fa
SHA512ca2f5aff84d1273d3f9610c41868dfa40b91751273561baac08610266ba344292ea017346bfcf0f3b5735757380d0ee91d7b13ab27ec305dd4a7701ca03da944
-
Filesize
175KB
MD533669a39d138dcf53f4708e55cdee917
SHA1cb9fcaa056827ecc52397222da4c564ff472a748
SHA2567401cea259cf27d8c575fac50e72dacbfb327b35a7408c37fce6289f4e66a7fa
SHA512ca2f5aff84d1273d3f9610c41868dfa40b91751273561baac08610266ba344292ea017346bfcf0f3b5735757380d0ee91d7b13ab27ec305dd4a7701ca03da944
-
Filesize
557KB
MD531961e100bceedc055b03f81c18b93b0
SHA1ca72d31fff4f40c630ad0cee95d0cc95c3d83993
SHA256c4655599a27e024ee62216f3de7e42ca155a02185952ed288d10f74197d89f5a
SHA512ae49859e5dd8c0bc41615c5e71e8013f609732eeb6cd6ab7dd39ff67c759496d386f2c3a3f711f121bf73ac758cb3f50b6f0aade56f1ea837b4c361cfade137f
-
Filesize
557KB
MD531961e100bceedc055b03f81c18b93b0
SHA1ca72d31fff4f40c630ad0cee95d0cc95c3d83993
SHA256c4655599a27e024ee62216f3de7e42ca155a02185952ed288d10f74197d89f5a
SHA512ae49859e5dd8c0bc41615c5e71e8013f609732eeb6cd6ab7dd39ff67c759496d386f2c3a3f711f121bf73ac758cb3f50b6f0aade56f1ea837b4c361cfade137f
-
Filesize
307KB
MD5cae1cecd8a74ca4d36874211e2d1a5e1
SHA188d7987a0ffc37f036b764008cbb7cfc305cb9e6
SHA25602422f2bb745cb0e2dc3a48ea1c38ba6248de50eadacca21fb9049f4ca247a26
SHA512eb997210cb4e166a33a5240aad35bbb25768f4c3fe8e80c98e7e329fe6727b8ba375e45b5e7d60b14ace2f7d5ccdf38f03dcaef965561d5224b62d536bb3df97
-
Filesize
307KB
MD5cae1cecd8a74ca4d36874211e2d1a5e1
SHA188d7987a0ffc37f036b764008cbb7cfc305cb9e6
SHA25602422f2bb745cb0e2dc3a48ea1c38ba6248de50eadacca21fb9049f4ca247a26
SHA512eb997210cb4e166a33a5240aad35bbb25768f4c3fe8e80c98e7e329fe6727b8ba375e45b5e7d60b14ace2f7d5ccdf38f03dcaef965561d5224b62d536bb3df97
-
Filesize
366KB
MD5f09d4cd554cb4b8b2aa59099b79114bb
SHA1568a725ed5884850612a1e4f8edcb9c459912dc0
SHA256678fc51f21323f72dcfaabbfa057ba8d63823ae0fd2f4b2d7325169563ce8d25
SHA5122a3a33167d47c61cee8b1ee93d8fa3f8738a91efc086311bcd84096beb4a8488a7e59e2510e6e026c09468ce1277d82c80b7f1c806efdfc2cd0053d88844251d
-
Filesize
366KB
MD5f09d4cd554cb4b8b2aa59099b79114bb
SHA1568a725ed5884850612a1e4f8edcb9c459912dc0
SHA256678fc51f21323f72dcfaabbfa057ba8d63823ae0fd2f4b2d7325169563ce8d25
SHA5122a3a33167d47c61cee8b1ee93d8fa3f8738a91efc086311bcd84096beb4a8488a7e59e2510e6e026c09468ce1277d82c80b7f1c806efdfc2cd0053d88844251d