Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe
Resource
win10v2004-20230220-en
General
-
Target
17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe
-
Size
696KB
-
MD5
af673137f046e418a7d4f2676ea914c0
-
SHA1
a5970d6c89584de7f0f76c9669a975235fb69d2c
-
SHA256
17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50
-
SHA512
f435c5695a367850c04f3020512e55fe1e08f3f74ddc0962ff7c1e3e31616d9075eb02c0f90f5dad401a4648ad369d65c123fca27ed30cb676b34e0bc31fc7ec
-
SSDEEP
12288:vMr7y90dM3LJjeKGgRseGmTonffKWlMf+Ztrf3olst/r4UUzhC3Jay1628hCQ:4yd3hezmaKWWetL3osj98hYQy16Pz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8207.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8207.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/888-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-190-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-193-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-195-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-197-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-199-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-201-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-203-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-205-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-207-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-209-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-211-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-213-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-215-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-217-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-225-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline behavioral1/memory/888-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/888-227-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4716 un029699.exe 4444 pro8207.exe 888 qu9348.exe 4288 si574031.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8207.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un029699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un029699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4444 pro8207.exe 4444 pro8207.exe 888 qu9348.exe 888 qu9348.exe 4288 si574031.exe 4288 si574031.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4444 pro8207.exe Token: SeDebugPrivilege 888 qu9348.exe Token: SeDebugPrivilege 4288 si574031.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4716 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 84 PID 4600 wrote to memory of 4716 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 84 PID 4600 wrote to memory of 4716 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 84 PID 4716 wrote to memory of 4444 4716 un029699.exe 85 PID 4716 wrote to memory of 4444 4716 un029699.exe 85 PID 4716 wrote to memory of 4444 4716 un029699.exe 85 PID 4716 wrote to memory of 888 4716 un029699.exe 90 PID 4716 wrote to memory of 888 4716 un029699.exe 90 PID 4716 wrote to memory of 888 4716 un029699.exe 90 PID 4600 wrote to memory of 4288 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 94 PID 4600 wrote to memory of 4288 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 94 PID 4600 wrote to memory of 4288 4600 17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe"C:\Users\Admin\AppData\Local\Temp\17bb654182369503af75dd756b5c0f4b8047c17228336c1a9ba71f75cb66ef50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8207.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9348.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574031.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD597fa437bf0a4fafc8ff8cd2cd22dfefd
SHA1773d4b341ffea0ad9272efea687fe91d8f1189e3
SHA256269839497d3a6597260a00e560d7864e3e908938889a8d8cb8d4dc40800b97ec
SHA51296008cd2ddb1b7db739bd7430e79102bbc6cadcc89d45d4a6ddf2c7f6774ceb0523f0cb114169f88e00611950aa0c757bc7ec53aac96e34736a95720797b0c7b
-
Filesize
175KB
MD597fa437bf0a4fafc8ff8cd2cd22dfefd
SHA1773d4b341ffea0ad9272efea687fe91d8f1189e3
SHA256269839497d3a6597260a00e560d7864e3e908938889a8d8cb8d4dc40800b97ec
SHA51296008cd2ddb1b7db739bd7430e79102bbc6cadcc89d45d4a6ddf2c7f6774ceb0523f0cb114169f88e00611950aa0c757bc7ec53aac96e34736a95720797b0c7b
-
Filesize
553KB
MD5937a1237c3c0143ba6e6522b79726fee
SHA1468b59ac76e4ed2853114ed1651d29f1fd412aab
SHA25635e2a33ccf9bda0aec8e604c674a7f4e3c2523bcf7c985094a2775de9985351b
SHA512512ae8ebc6af6eec960180f26ab196f71091f2268dcab124e663741c673863f68a74e4c072d124766baa748e3fcd4e8294e8dbb1764e860ed8b117f8308eb41a
-
Filesize
553KB
MD5937a1237c3c0143ba6e6522b79726fee
SHA1468b59ac76e4ed2853114ed1651d29f1fd412aab
SHA25635e2a33ccf9bda0aec8e604c674a7f4e3c2523bcf7c985094a2775de9985351b
SHA512512ae8ebc6af6eec960180f26ab196f71091f2268dcab124e663741c673863f68a74e4c072d124766baa748e3fcd4e8294e8dbb1764e860ed8b117f8308eb41a
-
Filesize
308KB
MD53ac221812f9262ed003503fabf811fab
SHA1c6d29be88434ad0760553060deecebc1a67bad44
SHA256d69442d469de062afade61a21e07cd0c30f734f15e3eab7c00b8024a9229ceaa
SHA5125873062a472a453bfe50bb0e2d62e3f67bb5b1e5f0395295c6882b6b4e65d09b4dbe31e1ac043bb11191f7fb7fca0a4c4342ce0fb5e92468c98021abac9043e9
-
Filesize
308KB
MD53ac221812f9262ed003503fabf811fab
SHA1c6d29be88434ad0760553060deecebc1a67bad44
SHA256d69442d469de062afade61a21e07cd0c30f734f15e3eab7c00b8024a9229ceaa
SHA5125873062a472a453bfe50bb0e2d62e3f67bb5b1e5f0395295c6882b6b4e65d09b4dbe31e1ac043bb11191f7fb7fca0a4c4342ce0fb5e92468c98021abac9043e9
-
Filesize
366KB
MD5bdd2eddb9014be837c132961f0207a65
SHA1503bf0f95d636980228531b8491914cd8b1b4da1
SHA2563f17ea8e14ef43820f941e968f445130bf3010b042841887fea1d5af95ae5ecf
SHA5129b12a0eb138c63e418370bd976d0b917bf1d515bfea356d2d46abf76518fe2330bee863c19c8caede627cff240bfb88156754dc981ee56779c2020e012e939f4
-
Filesize
366KB
MD5bdd2eddb9014be837c132961f0207a65
SHA1503bf0f95d636980228531b8491914cd8b1b4da1
SHA2563f17ea8e14ef43820f941e968f445130bf3010b042841887fea1d5af95ae5ecf
SHA5129b12a0eb138c63e418370bd976d0b917bf1d515bfea356d2d46abf76518fe2330bee863c19c8caede627cff240bfb88156754dc981ee56779c2020e012e939f4