Analysis
-
max time kernel
128s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe
Resource
win10v2004-20230220-en
General
-
Target
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe
-
Size
695KB
-
MD5
307f8b9bd6937074b57130acc0d3b38d
-
SHA1
64f756f41857025a0813ad878d7a382e520335f6
-
SHA256
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0
-
SHA512
a5fe6972c8e21d8111fb0a8ec1cbd51b0cd01bbd49d995d38b8efcbccae14ea9bea7bf95b7ce073a850d881852e5265335e16e55bfc289eb922d55bc0831886e
-
SSDEEP
12288:RMroy90uvhFW+4RogBuwLsRzi8O+avPS0zvxfJ1kX/NINoPr:VyXT6RNkwLwzi8OPycvt4VINoD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5076.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5076.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1428-192-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-191-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-196-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-215-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-219-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-220-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline behavioral1/memory/1428-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-226-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-228-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1428-1111-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1252 un612799.exe 972 pro5076.exe 1428 qu4917.exe 1352 si449408.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un612799.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un612799.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1732 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 972 pro5076.exe 972 pro5076.exe 1428 qu4917.exe 1428 qu4917.exe 1352 si449408.exe 1352 si449408.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 972 pro5076.exe Token: SeDebugPrivilege 1428 qu4917.exe Token: SeDebugPrivilege 1352 si449408.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3820 wrote to memory of 1252 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 84 PID 3820 wrote to memory of 1252 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 84 PID 3820 wrote to memory of 1252 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 84 PID 1252 wrote to memory of 972 1252 un612799.exe 85 PID 1252 wrote to memory of 972 1252 un612799.exe 85 PID 1252 wrote to memory of 972 1252 un612799.exe 85 PID 1252 wrote to memory of 1428 1252 un612799.exe 91 PID 1252 wrote to memory of 1428 1252 un612799.exe 91 PID 1252 wrote to memory of 1428 1252 un612799.exe 91 PID 3820 wrote to memory of 1352 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 92 PID 3820 wrote to memory of 1352 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 92 PID 3820 wrote to memory of 1352 3820 c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe"C:\Users\Admin\AppData\Local\Temp\c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612799.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5076.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4917.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4917.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449408.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449408.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52aeaa5a0da725f5411b91bfc68dcea57
SHA16a4f85c0f05a103fd6c25ee4b3849608773c3cfc
SHA256a57f0a8e51d4dd54ad8e936eb99af69d44c83d75c2c1a3c8ff570b57d21f044d
SHA512d7ce6584ba24a1ed030eaf12017ad8ab962e7e5c5ff4698911ecca18a2539abec9b511b1411c97313ebbb20d57bfea7fe752dc3e0da63b9da943da55c086f900
-
Filesize
175KB
MD52aeaa5a0da725f5411b91bfc68dcea57
SHA16a4f85c0f05a103fd6c25ee4b3849608773c3cfc
SHA256a57f0a8e51d4dd54ad8e936eb99af69d44c83d75c2c1a3c8ff570b57d21f044d
SHA512d7ce6584ba24a1ed030eaf12017ad8ab962e7e5c5ff4698911ecca18a2539abec9b511b1411c97313ebbb20d57bfea7fe752dc3e0da63b9da943da55c086f900
-
Filesize
553KB
MD5a654ce79e0f1d7fdd5b3690667c25e1c
SHA1d02c3fea961ced074a61c8c8da3d737f889ec1f5
SHA256d4f18c08fa2c9ae6a669350ea4556478f242b3786b2c74e11ec9cc51701a4d77
SHA512b0d4891c8342cd8c5f7df24755243e2a4a91a20b0028344f29e1a6c12a5bc2c63a208dcba22c4182611d125225d118ab38bf88cdbe65036c03150e309b66199b
-
Filesize
553KB
MD5a654ce79e0f1d7fdd5b3690667c25e1c
SHA1d02c3fea961ced074a61c8c8da3d737f889ec1f5
SHA256d4f18c08fa2c9ae6a669350ea4556478f242b3786b2c74e11ec9cc51701a4d77
SHA512b0d4891c8342cd8c5f7df24755243e2a4a91a20b0028344f29e1a6c12a5bc2c63a208dcba22c4182611d125225d118ab38bf88cdbe65036c03150e309b66199b
-
Filesize
308KB
MD53879c1f2256a96bb074d802af8978aba
SHA115f7cee0d5c8b02f2611c0d79514abe01f389e67
SHA256f85e6982de269d3ce24bfb9469e86e6dbd44f3449bf99fa48b09f98ca816041b
SHA51216670a2c9a32502460d394ed609966d47672258951a3cff2d6834979b22c2efdab5eb5efb3ff51170daae6dc2f50240a9fef3aa20d40decf4e3cd723345d2624
-
Filesize
308KB
MD53879c1f2256a96bb074d802af8978aba
SHA115f7cee0d5c8b02f2611c0d79514abe01f389e67
SHA256f85e6982de269d3ce24bfb9469e86e6dbd44f3449bf99fa48b09f98ca816041b
SHA51216670a2c9a32502460d394ed609966d47672258951a3cff2d6834979b22c2efdab5eb5efb3ff51170daae6dc2f50240a9fef3aa20d40decf4e3cd723345d2624
-
Filesize
366KB
MD54b0aca5aa06c213b0643cb88e10cc572
SHA12bf77a334b1019fe254fd4db4b681b9571f56fee
SHA2560c410a5401da4b788b52e09fef9e83f84a287472d55730066872ae54f46b8786
SHA512fcfe31ae7e042bc869077ba77573515154fb33fc105b9b07294937bff4a7d6f9db88c162f678cd78aefcb9dea172f546fc6413a99e9bb3073479f90e16cbf31d
-
Filesize
366KB
MD54b0aca5aa06c213b0643cb88e10cc572
SHA12bf77a334b1019fe254fd4db4b681b9571f56fee
SHA2560c410a5401da4b788b52e09fef9e83f84a287472d55730066872ae54f46b8786
SHA512fcfe31ae7e042bc869077ba77573515154fb33fc105b9b07294937bff4a7d6f9db88c162f678cd78aefcb9dea172f546fc6413a99e9bb3073479f90e16cbf31d