Analysis
-
max time kernel
61s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:20
Static task
static1
Behavioral task
behavioral1
Sample
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe
Resource
win10v2004-20230220-en
General
-
Target
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe
-
Size
695KB
-
MD5
e28ca4dbf89ec2417e4e6d177147fc84
-
SHA1
5f0c23f0dd62c926ff7b8dfcece4ed5f2b9317d1
-
SHA256
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a
-
SHA512
92136ebf9a0743902551437a28d23fa27697affd2f5a8836e4d3c138d918d007b8c93d67bb5411272d5736a3ba32f015ff8a88bfc4c3ad90181780e7f41ff96b
-
SSDEEP
12288:BMr7y90TfNx4Mwrbqa1UWfQq5AMylytMeO47k+vyZvzNr9JcXjx5:iyClehvbsMylyueN7TvqNxejx5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9214.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3368-189-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-190-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3368-262-0x0000000004EC0000-0x0000000004ED0000-memory.dmp family_redline behavioral1/memory/3368-264-0x0000000004EC0000-0x0000000004ED0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2492 un456702.exe 1920 pro9214.exe 3368 qu8063.exe 1016 si560228.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9214.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un456702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un456702.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1920 pro9214.exe 1920 pro9214.exe 3368 qu8063.exe 3368 qu8063.exe 1016 si560228.exe 1016 si560228.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1920 pro9214.exe Token: SeDebugPrivilege 3368 qu8063.exe Token: SeDebugPrivilege 1016 si560228.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4124 wrote to memory of 2492 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 84 PID 4124 wrote to memory of 2492 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 84 PID 4124 wrote to memory of 2492 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 84 PID 2492 wrote to memory of 1920 2492 un456702.exe 85 PID 2492 wrote to memory of 1920 2492 un456702.exe 85 PID 2492 wrote to memory of 1920 2492 un456702.exe 85 PID 2492 wrote to memory of 3368 2492 un456702.exe 89 PID 2492 wrote to memory of 3368 2492 un456702.exe 89 PID 2492 wrote to memory of 3368 2492 un456702.exe 89 PID 4124 wrote to memory of 1016 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 91 PID 4124 wrote to memory of 1016 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 91 PID 4124 wrote to memory of 1016 4124 404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe"C:\Users\Admin\AppData\Local\Temp\404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9214.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8063.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si560228.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si560228.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5738e66588507f88f42df8aa18183a17b
SHA1152ec39362dd7014960e6a6f4b34069fad4baee4
SHA2563397b86bee5dddbfb50313930711bf3dae950c20dcd2112165c839f60af06d4d
SHA5127e9d78f700b2515ef0b0a63fcaf2d0af580256b6ff0e00d2359c7a5cbd11936c64fd9c3343a8be6a7ef3d028db0b83795ca891195753f4bff692f9cee17fb3d8
-
Filesize
175KB
MD5738e66588507f88f42df8aa18183a17b
SHA1152ec39362dd7014960e6a6f4b34069fad4baee4
SHA2563397b86bee5dddbfb50313930711bf3dae950c20dcd2112165c839f60af06d4d
SHA5127e9d78f700b2515ef0b0a63fcaf2d0af580256b6ff0e00d2359c7a5cbd11936c64fd9c3343a8be6a7ef3d028db0b83795ca891195753f4bff692f9cee17fb3d8
-
Filesize
553KB
MD54699a139de882aba0b2d3ebb9870d5df
SHA18b16c7ba67c0c5688879a5302df2a11906771dac
SHA25698130baeb90844705b9fed7a93a07fdb7f3a09fdd113b670f01dedb9412327e7
SHA512e98a0dc3856d26a03c4036dc28cbb017d3243098bc60c154e916861831d4c96dcbbc4118b66646514b3d093dd3797817196c2d0d2ea10191abaa908ff1bc0676
-
Filesize
553KB
MD54699a139de882aba0b2d3ebb9870d5df
SHA18b16c7ba67c0c5688879a5302df2a11906771dac
SHA25698130baeb90844705b9fed7a93a07fdb7f3a09fdd113b670f01dedb9412327e7
SHA512e98a0dc3856d26a03c4036dc28cbb017d3243098bc60c154e916861831d4c96dcbbc4118b66646514b3d093dd3797817196c2d0d2ea10191abaa908ff1bc0676
-
Filesize
308KB
MD59c3a563510f85eaf115731f2de65dfd6
SHA11aed5374aac3275adace3b2939b104a2e0e6b59b
SHA256a61a6d0f1b47f661646911ad05dd34f862a7d22c398eeac0842047e6472e862e
SHA512f192a0c1de8af1cb6a5320277a0ebf0e9962fa9349b2bf7519d1dc0fc85c1a1763be957253315360541016e25a3967887d3307f98770ef28a79a43dce157f767
-
Filesize
308KB
MD59c3a563510f85eaf115731f2de65dfd6
SHA11aed5374aac3275adace3b2939b104a2e0e6b59b
SHA256a61a6d0f1b47f661646911ad05dd34f862a7d22c398eeac0842047e6472e862e
SHA512f192a0c1de8af1cb6a5320277a0ebf0e9962fa9349b2bf7519d1dc0fc85c1a1763be957253315360541016e25a3967887d3307f98770ef28a79a43dce157f767
-
Filesize
366KB
MD54a2243634c7ffe3eeb286a2b441ef662
SHA1c9e2a48df6383e59fc5b05ef9c1904e97bf99c2a
SHA2568bc8f719f985a325238046844b8f4eff620bb91e0a908f6bf1801dd0298c8cb9
SHA512a8681ae8c8640b18ed32511d822c5c5acd50900b90a3ff516c065d8903dbe05c4637b01a08c74246f746abfde36af42a6f7294499337f0d7a89a2f22b5cabf18
-
Filesize
366KB
MD54a2243634c7ffe3eeb286a2b441ef662
SHA1c9e2a48df6383e59fc5b05ef9c1904e97bf99c2a
SHA2568bc8f719f985a325238046844b8f4eff620bb91e0a908f6bf1801dd0298c8cb9
SHA512a8681ae8c8640b18ed32511d822c5c5acd50900b90a3ff516c065d8903dbe05c4637b01a08c74246f746abfde36af42a6f7294499337f0d7a89a2f22b5cabf18