Analysis
-
max time kernel
95s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:33
Static task
static1
Behavioral task
behavioral1
Sample
ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe
Resource
win10v2004-20230221-en
General
-
Target
ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe
-
Size
695KB
-
MD5
006c16ec48a68326f9f85160fe83634f
-
SHA1
b6204989c5ce21a6bf7d5fa86519c242f91a1117
-
SHA256
ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e
-
SHA512
144ed6bc9b678a39cfd4d5bfe2cf3c76e1b1062a37b190a4bc78c37e4dd94c0399455abb9fbbbfebafd4a58a87bb832234626a1e389dc896dbda79215c8ff93f
-
SSDEEP
12288:WMrpy90TZhM+qie/JHMtIhpbGsl8ZR0mytz8etYSYagMuYz8D6JVrpXbDT+p:vyuuieBHEIhJ8L0m8zbgMuA8eDVXnip
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2740-190-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-191-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-193-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-195-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-197-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-199-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-201-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-203-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-205-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-207-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-209-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-211-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-213-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-215-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-217-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-219-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-221-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/2740-223-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 740 un074043.exe 2060 pro5186.exe 2740 qu1675.exe 3228 si891151.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5186.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un074043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un074043.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2060 pro5186.exe 2060 pro5186.exe 2740 qu1675.exe 2740 qu1675.exe 3228 si891151.exe 3228 si891151.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2060 pro5186.exe Token: SeDebugPrivilege 2740 qu1675.exe Token: SeDebugPrivilege 3228 si891151.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 740 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 83 PID 1728 wrote to memory of 740 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 83 PID 1728 wrote to memory of 740 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 83 PID 740 wrote to memory of 2060 740 un074043.exe 84 PID 740 wrote to memory of 2060 740 un074043.exe 84 PID 740 wrote to memory of 2060 740 un074043.exe 84 PID 740 wrote to memory of 2740 740 un074043.exe 88 PID 740 wrote to memory of 2740 740 un074043.exe 88 PID 740 wrote to memory of 2740 740 un074043.exe 88 PID 1728 wrote to memory of 3228 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 89 PID 1728 wrote to memory of 3228 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 89 PID 1728 wrote to memory of 3228 1728 ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe"C:\Users\Admin\AppData\Local\Temp\ae7b61d79fac8a9f66e98157dda73eb3b1a61e6bc48fec1605156274af5e7c6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un074043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un074043.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1675.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891151.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a88c2b3be2d960019e5e81415fa162e4
SHA14f51be16020f2eef045af3bbfa538477aeb8d7b6
SHA25627b19cf8bd73d03f4e6048749260c17f0355d2a21e55d03216155d763c3d1305
SHA51210fe886bdee5676dd1f64ae5b2b9ae7441c84eaab1e537548a3b9829574301c7b1a427b64cd0201ae3d941647454faa682b182dbf8b10c4f3f8e4f06fd1fc850
-
Filesize
175KB
MD5a88c2b3be2d960019e5e81415fa162e4
SHA14f51be16020f2eef045af3bbfa538477aeb8d7b6
SHA25627b19cf8bd73d03f4e6048749260c17f0355d2a21e55d03216155d763c3d1305
SHA51210fe886bdee5676dd1f64ae5b2b9ae7441c84eaab1e537548a3b9829574301c7b1a427b64cd0201ae3d941647454faa682b182dbf8b10c4f3f8e4f06fd1fc850
-
Filesize
553KB
MD5d2e2d44befcd6c19c17d6f60d5a0f30c
SHA10de6b368f0e722d62b4af0fd49c3de62b1bb20d3
SHA256614294db7dd7524c14a93a71a21b05e22d437f45548e3518a514cea88633fa5c
SHA5120eb34eab1478c5d5ba4bbab9872fe3c75a03f4ac62856f702e0854e3ead566aade4810df55fa13ca40841afcb4ebada72ddf3f5e3fd1459228856932cc341c50
-
Filesize
553KB
MD5d2e2d44befcd6c19c17d6f60d5a0f30c
SHA10de6b368f0e722d62b4af0fd49c3de62b1bb20d3
SHA256614294db7dd7524c14a93a71a21b05e22d437f45548e3518a514cea88633fa5c
SHA5120eb34eab1478c5d5ba4bbab9872fe3c75a03f4ac62856f702e0854e3ead566aade4810df55fa13ca40841afcb4ebada72ddf3f5e3fd1459228856932cc341c50
-
Filesize
308KB
MD567442311c0b3336962792d84143e15f5
SHA18d9e395ad4c78fc477f4829d5d9b2f4456d0e48f
SHA256f120ab84cbd02e8844a6bb4742dce499976d8cf87dc28ad771cdf853df26775b
SHA5120fc24af979774900b54d8239f64701d1ebb00fcca8e8aa70ed25d407113c2a98dfb870b64339eec64adb19042b28a20d51d8097de6a2b4088a9a85ff26e4e831
-
Filesize
308KB
MD567442311c0b3336962792d84143e15f5
SHA18d9e395ad4c78fc477f4829d5d9b2f4456d0e48f
SHA256f120ab84cbd02e8844a6bb4742dce499976d8cf87dc28ad771cdf853df26775b
SHA5120fc24af979774900b54d8239f64701d1ebb00fcca8e8aa70ed25d407113c2a98dfb870b64339eec64adb19042b28a20d51d8097de6a2b4088a9a85ff26e4e831
-
Filesize
366KB
MD5ca95d2a19b7c4b0106abcd8a7706c2e7
SHA1d342175c954c19822fb33b2b20041b18ebc98cb9
SHA256a4f30328ac78f71cbb382b387ea5a48dd775c00496d40f50e12118cfe60c7db1
SHA5121fb29354824d3721592e5d9b7e70372211718d6ecabd340684c9aab1f8db56e4368a7b8a16367891dbce02f6dee244beaa906e61e9d32994cd7a03d11566dc9f
-
Filesize
366KB
MD5ca95d2a19b7c4b0106abcd8a7706c2e7
SHA1d342175c954c19822fb33b2b20041b18ebc98cb9
SHA256a4f30328ac78f71cbb382b387ea5a48dd775c00496d40f50e12118cfe60c7db1
SHA5121fb29354824d3721592e5d9b7e70372211718d6ecabd340684c9aab1f8db56e4368a7b8a16367891dbce02f6dee244beaa906e61e9d32994cd7a03d11566dc9f