Analysis
-
max time kernel
63s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:27
Static task
static1
Behavioral task
behavioral1
Sample
881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe
Resource
win10-20230220-en
General
-
Target
881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe
-
Size
695KB
-
MD5
6e3ef26458ed7619e05a2ee72800daa6
-
SHA1
da7136d24433eee722ad2a324280f7e0be65bc6c
-
SHA256
881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310
-
SHA512
e42a7d3cdbdad43c440992959bc1c5895fa03eb83ab5b27ee098481b9a6e8fe79663061902b4e11a12fc55a6eb41c14e35cc7afab95ff87f8a2a8d8cf2419909
-
SSDEEP
12288:lMrty90hnniQ7ijYUPTzv3hFvTCXj/sXJ8J+4z8GGJVIqKdicFJe0HB+:wygnRUHjTCXoXJ1g89nIVdFFs0Y
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9246.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9246.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9246.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9246.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9246.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4312-179-0x0000000004C20000-0x0000000004C66000-memory.dmp family_redline behavioral1/memory/4312-180-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/4312-181-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-182-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-184-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-186-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-188-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-190-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-192-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-194-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-196-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-204-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-206-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-208-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-210-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-212-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-214-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-216-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-218-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4312-1102-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4116 un105913.exe 4576 pro9246.exe 4312 qu9006.exe 3240 si190904.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9246.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9246.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un105913.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un105913.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4576 pro9246.exe 4576 pro9246.exe 4312 qu9006.exe 4312 qu9006.exe 3240 si190904.exe 3240 si190904.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4576 pro9246.exe Token: SeDebugPrivilege 4312 qu9006.exe Token: SeDebugPrivilege 3240 si190904.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4116 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 66 PID 5040 wrote to memory of 4116 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 66 PID 5040 wrote to memory of 4116 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 66 PID 4116 wrote to memory of 4576 4116 un105913.exe 67 PID 4116 wrote to memory of 4576 4116 un105913.exe 67 PID 4116 wrote to memory of 4576 4116 un105913.exe 67 PID 4116 wrote to memory of 4312 4116 un105913.exe 68 PID 4116 wrote to memory of 4312 4116 un105913.exe 68 PID 4116 wrote to memory of 4312 4116 un105913.exe 68 PID 5040 wrote to memory of 3240 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 70 PID 5040 wrote to memory of 3240 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 70 PID 5040 wrote to memory of 3240 5040 881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe"C:\Users\Admin\AppData\Local\Temp\881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b7c133f20e2f21f24dc4cb92406bd28d
SHA10967e7a8ebfc28307b786ca572a716c378e1de9b
SHA256be3d07674d357b3b0334c361f3ea6410e14a273fe7c014e37cfab54dc58897a1
SHA51206db6056476f3d9c9c9703185b866edc0dae4d26c965efe9dc8ea634d4e40872841e434cc39f373fa1d08c22fd257c19c237aa780f68343aa737217e5e99f4f6
-
Filesize
175KB
MD5b7c133f20e2f21f24dc4cb92406bd28d
SHA10967e7a8ebfc28307b786ca572a716c378e1de9b
SHA256be3d07674d357b3b0334c361f3ea6410e14a273fe7c014e37cfab54dc58897a1
SHA51206db6056476f3d9c9c9703185b866edc0dae4d26c965efe9dc8ea634d4e40872841e434cc39f373fa1d08c22fd257c19c237aa780f68343aa737217e5e99f4f6
-
Filesize
553KB
MD54f6b7b33d478b0c3e1d1fd5af40bfcc5
SHA18caa3172f6879902cd83834fa05a1461cf328a42
SHA2567e373aa32739bfdb73b35187ed645ff14241b3fc38a77be896d86297556b4bad
SHA5127671f28fb17b9a0a2c13385d0051097ef81c4e39035afc11f55477a97dae8ecdfe8417258590d457db5e185174f4176df621c5210166d5e002b87a69fb050772
-
Filesize
553KB
MD54f6b7b33d478b0c3e1d1fd5af40bfcc5
SHA18caa3172f6879902cd83834fa05a1461cf328a42
SHA2567e373aa32739bfdb73b35187ed645ff14241b3fc38a77be896d86297556b4bad
SHA5127671f28fb17b9a0a2c13385d0051097ef81c4e39035afc11f55477a97dae8ecdfe8417258590d457db5e185174f4176df621c5210166d5e002b87a69fb050772
-
Filesize
308KB
MD52f932566273cf8ee86eb74b2b8c0244e
SHA1fabedc1fc0e8b60b78ce6b6abe3939141737146b
SHA25606b1bc474ebef283320c75daa243b5e7f0ff73a698984d695e6cb84513d41787
SHA5129f1632625be332e4c1deff7b4c887d6edf5da79b446ad83d09fbddae155a0226506c73fc916dff18daae0156e527ce3941fa3ccd3e08e132a3f21380c08115ef
-
Filesize
308KB
MD52f932566273cf8ee86eb74b2b8c0244e
SHA1fabedc1fc0e8b60b78ce6b6abe3939141737146b
SHA25606b1bc474ebef283320c75daa243b5e7f0ff73a698984d695e6cb84513d41787
SHA5129f1632625be332e4c1deff7b4c887d6edf5da79b446ad83d09fbddae155a0226506c73fc916dff18daae0156e527ce3941fa3ccd3e08e132a3f21380c08115ef
-
Filesize
366KB
MD58eb6786b10003db13b4e5a4aad997edf
SHA1b0a203a48a5e75f3818f351cb2d744e85cecc9c0
SHA256c74706fed8f4e1e62f4103cac2b64ac680a709d96254410905af949235765abf
SHA5128b3b4053b63e1deba7dcf1df54a14c22eeed21d3b352c00c769efa5ae01ec73ebaa0c4f707d046082197559200f4f1fdceecc478c7f0908cae4105362291ee9d
-
Filesize
366KB
MD58eb6786b10003db13b4e5a4aad997edf
SHA1b0a203a48a5e75f3818f351cb2d744e85cecc9c0
SHA256c74706fed8f4e1e62f4103cac2b64ac680a709d96254410905af949235765abf
SHA5128b3b4053b63e1deba7dcf1df54a14c22eeed21d3b352c00c769efa5ae01ec73ebaa0c4f707d046082197559200f4f1fdceecc478c7f0908cae4105362291ee9d