Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:32
Static task
static1
Behavioral task
behavioral1
Sample
24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe
Resource
win10v2004-20230220-en
General
-
Target
24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe
-
Size
695KB
-
MD5
a128840439ff46a5da1c33715c52cb73
-
SHA1
c55e93ecea51fa365c009760aadfe24a423919d2
-
SHA256
24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2
-
SHA512
01a828a7400e96ce1d65d50f398248af23d98d58eedc1b576a971fd0c599a0a9b6bba27a7f3fd9409fbc98ca011eaef0ba7898b6a71fbf427c200dd193ed44e4
-
SSDEEP
12288:iMrBGy90GtC/ZqqKpDTFukWv3hFvPNVQvGuB1gJvPSmza5uJ9uC89W:uyg/gq+cjPNVyGur+yiag35+W
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4240.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4108-191-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-192-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-194-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-196-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-198-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-200-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-202-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-204-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-206-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-208-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-210-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-212-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-214-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-216-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-218-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-220-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-222-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-224-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/4108-240-0x00000000025D0000-0x00000000025E0000-memory.dmp family_redline behavioral1/memory/4108-1110-0x00000000025D0000-0x00000000025E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3464 un467049.exe 3840 pro4240.exe 4108 qu0653.exe 1012 si318716.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4240.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un467049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un467049.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 pro4240.exe 3840 pro4240.exe 4108 qu0653.exe 4108 qu0653.exe 1012 si318716.exe 1012 si318716.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3840 pro4240.exe Token: SeDebugPrivilege 4108 qu0653.exe Token: SeDebugPrivilege 1012 si318716.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3464 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 86 PID 2128 wrote to memory of 3464 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 86 PID 2128 wrote to memory of 3464 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 86 PID 3464 wrote to memory of 3840 3464 un467049.exe 87 PID 3464 wrote to memory of 3840 3464 un467049.exe 87 PID 3464 wrote to memory of 3840 3464 un467049.exe 87 PID 3464 wrote to memory of 4108 3464 un467049.exe 91 PID 3464 wrote to memory of 4108 3464 un467049.exe 91 PID 3464 wrote to memory of 4108 3464 un467049.exe 91 PID 2128 wrote to memory of 1012 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 93 PID 2128 wrote to memory of 1012 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 93 PID 2128 wrote to memory of 1012 2128 24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe"C:\Users\Admin\AppData\Local\Temp\24f979289bdf2fe72d592299273cb44481ccecb385c8f2494cc3f277193bf1d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467049.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4240.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0653.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0653.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si318716.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si318716.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f9876687384c881db0b5206aa0f6d607
SHA1d11e0388f8e47a117707f4be48dda751b94a2c7e
SHA256ef4cfe3a1b0c8e05d2773b2e59e7b195e2334d7d5deec79eabf73c8d37d22592
SHA51202f03c14d5bd987fc3dee79de1269eb49f132483716568a93fb56360adbb27684addab323ca9e1a4aac48c84197869b436b35adf29b5135e64633d972e9b6405
-
Filesize
175KB
MD5f9876687384c881db0b5206aa0f6d607
SHA1d11e0388f8e47a117707f4be48dda751b94a2c7e
SHA256ef4cfe3a1b0c8e05d2773b2e59e7b195e2334d7d5deec79eabf73c8d37d22592
SHA51202f03c14d5bd987fc3dee79de1269eb49f132483716568a93fb56360adbb27684addab323ca9e1a4aac48c84197869b436b35adf29b5135e64633d972e9b6405
-
Filesize
553KB
MD585d16a9ba9b96d8b779400c310ba784b
SHA1193935983f4636747ab2b61ce6b8f98321b9c4f2
SHA25616734a66f0e25fbf3a832fcb37050782da579a1c7a7e83927a1a26560a62c85d
SHA5123b83ff054117a4d1f2823dca246c9484bfd9569548867eb7f0ddc4767e4382ceb6474ef43ebc44c3e69e4c6dada10bc57305e34c41b62becf8a37c4b37a3fdb2
-
Filesize
553KB
MD585d16a9ba9b96d8b779400c310ba784b
SHA1193935983f4636747ab2b61ce6b8f98321b9c4f2
SHA25616734a66f0e25fbf3a832fcb37050782da579a1c7a7e83927a1a26560a62c85d
SHA5123b83ff054117a4d1f2823dca246c9484bfd9569548867eb7f0ddc4767e4382ceb6474ef43ebc44c3e69e4c6dada10bc57305e34c41b62becf8a37c4b37a3fdb2
-
Filesize
308KB
MD56d240f4b6042ebcec0127187bd7aedad
SHA12300e82e251756824bffde181e8bd1a68088403a
SHA2560da96fa331a76c969c7c798fe34c04e0f2f7b41f180e80d1e487ff41818a25b4
SHA51206a75ca923a2caac8e3e2f1f39255b6bae5d25dcfe5db5c41cf0625b889679a040a2f5b8f7b148bdc969c000e74ebf77fd799e515f3b74e30c6656ed93b7639a
-
Filesize
308KB
MD56d240f4b6042ebcec0127187bd7aedad
SHA12300e82e251756824bffde181e8bd1a68088403a
SHA2560da96fa331a76c969c7c798fe34c04e0f2f7b41f180e80d1e487ff41818a25b4
SHA51206a75ca923a2caac8e3e2f1f39255b6bae5d25dcfe5db5c41cf0625b889679a040a2f5b8f7b148bdc969c000e74ebf77fd799e515f3b74e30c6656ed93b7639a
-
Filesize
366KB
MD5f92393c90cc407842d65554bb357da99
SHA192fb3e67c7f2cb7d11f678d4e2ebaa11b8ced6f1
SHA2567001b64690b160ac2ddaeaffa51f2e749426cbb6e6f7ad27d08a7f24f50f9a07
SHA5124e3857d3f5e36740445c936d91bb7910a0936d8f7976413563682552c9de48cc89138cb34a996c7b0ddf41e65309562b7602e9cbd53b70ad21fc6dcd63810a7c
-
Filesize
366KB
MD5f92393c90cc407842d65554bb357da99
SHA192fb3e67c7f2cb7d11f678d4e2ebaa11b8ced6f1
SHA2567001b64690b160ac2ddaeaffa51f2e749426cbb6e6f7ad27d08a7f24f50f9a07
SHA5124e3857d3f5e36740445c936d91bb7910a0936d8f7976413563682552c9de48cc89138cb34a996c7b0ddf41e65309562b7602e9cbd53b70ad21fc6dcd63810a7c