Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe
Resource
win10v2004-20230220-en
General
-
Target
7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe
-
Size
695KB
-
MD5
0bdb50db27e3a582914deeffdb0db3d5
-
SHA1
45489b92bf83cb236546cb59a7c6df00e33520ef
-
SHA256
7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5
-
SHA512
1f1267ce21bd8fe0d371a5b5045d419d7fd2539c2b985171bd2558762ce0ccc4f337c18619258a606352f3f8a25830a166bf3a63b54c44b0e76211dcd5c1449e
-
SSDEEP
12288:vMrNy90oh3SvVPr4Fz79i6jjLPfQUMylWgz4W1IjzM7zskrJ186EZWPrr:CyxhC1r4d48zHMylW44W1WzAs0BEITr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3547.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3547.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1396-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1396-252-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1592 un652832.exe 1324 pro3547.exe 1396 qu4043.exe 3912 si302681.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3547.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3547.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un652832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un652832.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1324 pro3547.exe 1324 pro3547.exe 1396 qu4043.exe 1396 qu4043.exe 3912 si302681.exe 3912 si302681.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 pro3547.exe Token: SeDebugPrivilege 1396 qu4043.exe Token: SeDebugPrivilege 3912 si302681.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1592 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 84 PID 1512 wrote to memory of 1592 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 84 PID 1512 wrote to memory of 1592 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 84 PID 1592 wrote to memory of 1324 1592 un652832.exe 85 PID 1592 wrote to memory of 1324 1592 un652832.exe 85 PID 1592 wrote to memory of 1324 1592 un652832.exe 85 PID 1592 wrote to memory of 1396 1592 un652832.exe 90 PID 1592 wrote to memory of 1396 1592 un652832.exe 90 PID 1592 wrote to memory of 1396 1592 un652832.exe 90 PID 1512 wrote to memory of 3912 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 94 PID 1512 wrote to memory of 3912 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 94 PID 1512 wrote to memory of 3912 1512 7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe"C:\Users\Admin\AppData\Local\Temp\7b73677a40d5ec0a2af9f23fef8356ea27683eee3d116da92d53ad70e9cb2bb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652832.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652832.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3547.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4043.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302681.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302681.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efd1c0ec3b3f5d70e2d4fd43351c81a4
SHA1ea2869b33807e1d01b8901bccf785e47598ed86f
SHA2564b373fe4f094ac74db89698f1a1cce5c458810389206a43dbc33d4fe8e18d7c6
SHA51216d0b6ffbabe01b97fcea2b94cc05907c89dbf4d7356f83ab1e5fdf621af5d3224ef1dfd17772a544c2895f25d3b4111afde9c5aebb856b0c8c04fcf2b3ff377
-
Filesize
175KB
MD5efd1c0ec3b3f5d70e2d4fd43351c81a4
SHA1ea2869b33807e1d01b8901bccf785e47598ed86f
SHA2564b373fe4f094ac74db89698f1a1cce5c458810389206a43dbc33d4fe8e18d7c6
SHA51216d0b6ffbabe01b97fcea2b94cc05907c89dbf4d7356f83ab1e5fdf621af5d3224ef1dfd17772a544c2895f25d3b4111afde9c5aebb856b0c8c04fcf2b3ff377
-
Filesize
553KB
MD53ed9295d62ed9e15d70636606e9ad158
SHA1e7d292f620566346ccbce530a7ed05b17bf0d3b5
SHA256181a043ee70c68fc9d1fe7d47fd98acadeefc1dd16cc24e61db9f272c91efb1f
SHA5120cf51e1d21a79c69a7f27eb0176047a260b3ae0f17f199fcf0e70fec536fb09aac6266f38def2702ebd26582aa33d71da02fc3300ee555a727a395b4f8d0f9f8
-
Filesize
553KB
MD53ed9295d62ed9e15d70636606e9ad158
SHA1e7d292f620566346ccbce530a7ed05b17bf0d3b5
SHA256181a043ee70c68fc9d1fe7d47fd98acadeefc1dd16cc24e61db9f272c91efb1f
SHA5120cf51e1d21a79c69a7f27eb0176047a260b3ae0f17f199fcf0e70fec536fb09aac6266f38def2702ebd26582aa33d71da02fc3300ee555a727a395b4f8d0f9f8
-
Filesize
308KB
MD5ac7558bfcc52f73a995f92f2b93afa5f
SHA1b59e60bfcebf6e304b83569bf3f941b393eeb9b5
SHA2569a0783fe18586014eb144f5d5b8c6f09575e818cc5d31ade5b2e16d9f34269eb
SHA512150ae79e5120808f4b68b00cdaee3ca4065206e4986c57d3df07073eddf346dc80d1205d54004975562cac165b52f2ef97aecbce98c7bd46d3909d3375d06f86
-
Filesize
308KB
MD5ac7558bfcc52f73a995f92f2b93afa5f
SHA1b59e60bfcebf6e304b83569bf3f941b393eeb9b5
SHA2569a0783fe18586014eb144f5d5b8c6f09575e818cc5d31ade5b2e16d9f34269eb
SHA512150ae79e5120808f4b68b00cdaee3ca4065206e4986c57d3df07073eddf346dc80d1205d54004975562cac165b52f2ef97aecbce98c7bd46d3909d3375d06f86
-
Filesize
366KB
MD5f09d659ca5ee4767333b59bfcac51de3
SHA136ab71983bdae700c39c469ef7b771f692c73712
SHA256109d37259d7ea4a7449d479e3075381dea4ae40ab53b3fb1c3ae49ae7b44362f
SHA5129d755db23da5c3198aac903181669fc3be5500bc66e11c755c7714917dea66079ee3cbfd8487546b6bab3408a5398dd4dc0d8eb6d316021fb93990825d97da51
-
Filesize
366KB
MD5f09d659ca5ee4767333b59bfcac51de3
SHA136ab71983bdae700c39c469ef7b771f692c73712
SHA256109d37259d7ea4a7449d479e3075381dea4ae40ab53b3fb1c3ae49ae7b44362f
SHA5129d755db23da5c3198aac903181669fc3be5500bc66e11c755c7714917dea66079ee3cbfd8487546b6bab3408a5398dd4dc0d8eb6d316021fb93990825d97da51