Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe
Resource
win10v2004-20230221-en
General
-
Target
fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe
-
Size
695KB
-
MD5
c0797fc36f2ea366430996ac434532e2
-
SHA1
86714d1c1d4ea3aa9f06548217187d1b6071a680
-
SHA256
fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e
-
SHA512
713e02068119e9b5b0f997520ed37e3736a47dbf0e7bdf00abe3106bdfabda019c02a628edd0a424e3b4ddcbf99ffc3ec681dc417b095d1a23ea07309b0e1d6b
-
SSDEEP
12288:pMrLy90qIorXXe5PFX8mKgwu+hLGtTVljitruhzBDjeGz6uPJwplsRYr6lmc8E:uyZIoTA58+t+tsR6Mmp+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9814.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9814.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/644-192-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-191-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-194-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-196-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-198-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-200-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-202-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-204-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-206-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-208-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-210-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-212-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-214-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-216-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-218-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-222-0x0000000004F00000-0x0000000004F10000-memory.dmp family_redline behavioral1/memory/644-221-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-226-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/644-228-0x0000000002750000-0x000000000278F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4760 un708936.exe 4552 pro9814.exe 644 qu9264.exe 4320 si969269.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9814.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9814.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un708936.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un708936.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4552 pro9814.exe 4552 pro9814.exe 644 qu9264.exe 644 qu9264.exe 4320 si969269.exe 4320 si969269.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4552 pro9814.exe Token: SeDebugPrivilege 644 qu9264.exe Token: SeDebugPrivilege 4320 si969269.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2592 wrote to memory of 4760 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 83 PID 2592 wrote to memory of 4760 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 83 PID 2592 wrote to memory of 4760 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 83 PID 4760 wrote to memory of 4552 4760 un708936.exe 84 PID 4760 wrote to memory of 4552 4760 un708936.exe 84 PID 4760 wrote to memory of 4552 4760 un708936.exe 84 PID 4760 wrote to memory of 644 4760 un708936.exe 88 PID 4760 wrote to memory of 644 4760 un708936.exe 88 PID 4760 wrote to memory of 644 4760 un708936.exe 88 PID 2592 wrote to memory of 4320 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 90 PID 2592 wrote to memory of 4320 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 90 PID 2592 wrote to memory of 4320 2592 fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe"C:\Users\Admin\AppData\Local\Temp\fe61e55d4a2c10f85ee6c76d06aeacebc752da8c5b83d2f53672bff55afa953e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un708936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un708936.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9814.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9264.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si969269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si969269.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57bece3d4b29b39a4cf1cbafa5cdce60f
SHA1fcf91accc01f372c7af72afe29bc982332a82b74
SHA2566a706727b002519d78a14ea2930aa13f37358b4d88af1f3ffd5eaba323476584
SHA512c40fae87d0d9cdb65c4fdbf1a0df2f8c36ad47cfeb0032e21ccb2f90221890e30313849025f18ad7c23acdda130b76badbff92da3822451aaefb23d8ac81a1dd
-
Filesize
175KB
MD57bece3d4b29b39a4cf1cbafa5cdce60f
SHA1fcf91accc01f372c7af72afe29bc982332a82b74
SHA2566a706727b002519d78a14ea2930aa13f37358b4d88af1f3ffd5eaba323476584
SHA512c40fae87d0d9cdb65c4fdbf1a0df2f8c36ad47cfeb0032e21ccb2f90221890e30313849025f18ad7c23acdda130b76badbff92da3822451aaefb23d8ac81a1dd
-
Filesize
553KB
MD5c681364951b63dee2f6f742b0b93501b
SHA16d06ee545b80626a5d2e052ee2acd1f199de83c6
SHA2563aeac11786df5d21fd8da1df6698bd69879d2c84bd6f8c2956795f448cae1a5d
SHA512270eba55a722d62c18465f3f816cf6b4207f75ca31d1a23f7e13e91c48fe8fdd03a74cc41088ed11ece382280ceddd6925a42310acb1b229da81f8fc768b6227
-
Filesize
553KB
MD5c681364951b63dee2f6f742b0b93501b
SHA16d06ee545b80626a5d2e052ee2acd1f199de83c6
SHA2563aeac11786df5d21fd8da1df6698bd69879d2c84bd6f8c2956795f448cae1a5d
SHA512270eba55a722d62c18465f3f816cf6b4207f75ca31d1a23f7e13e91c48fe8fdd03a74cc41088ed11ece382280ceddd6925a42310acb1b229da81f8fc768b6227
-
Filesize
308KB
MD5f14a9c68cbc169d7c98d1cf32b0cf9bf
SHA1eb2c1b31bcdd63b0942e504911cccd1045281e65
SHA256ef496bae1f285a6a5739ec0dee8ff7c9334eed4631036156310105d5db8715fa
SHA5128347e9ea8b886e09e22387d14f429f3cc007ed6c7408b76649301560458c3979283313111e47151e621c3a90dd9c8e88a377199cc9161af5bbc29e370b3931e1
-
Filesize
308KB
MD5f14a9c68cbc169d7c98d1cf32b0cf9bf
SHA1eb2c1b31bcdd63b0942e504911cccd1045281e65
SHA256ef496bae1f285a6a5739ec0dee8ff7c9334eed4631036156310105d5db8715fa
SHA5128347e9ea8b886e09e22387d14f429f3cc007ed6c7408b76649301560458c3979283313111e47151e621c3a90dd9c8e88a377199cc9161af5bbc29e370b3931e1
-
Filesize
366KB
MD5a84695e0b44a12655c90ebe42811cc1f
SHA1e882a17b7c18d9b5817ec6a82b8286a1e9c1f58d
SHA2564c81f08e4c0a4b62f3dab581d755fa45cc7b37c46110a08fcf6c74224f3ab3bd
SHA512cdadac03412953d9b19b3d0dfb7e382419b0aa83d910e7e3cbe48976734a15b80708fc09c316cca01f7a95fb39b3341b8b13782bd1719db83d6b30c24a315638
-
Filesize
366KB
MD5a84695e0b44a12655c90ebe42811cc1f
SHA1e882a17b7c18d9b5817ec6a82b8286a1e9c1f58d
SHA2564c81f08e4c0a4b62f3dab581d755fa45cc7b37c46110a08fcf6c74224f3ab3bd
SHA512cdadac03412953d9b19b3d0dfb7e382419b0aa83d910e7e3cbe48976734a15b80708fc09c316cca01f7a95fb39b3341b8b13782bd1719db83d6b30c24a315638