Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe
Resource
win10v2004-20230221-en
General
-
Target
362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe
-
Size
695KB
-
MD5
c6b2bb2bb922457cf0b8c447301a70d3
-
SHA1
6216e634adcb3c7439bf8fb2c0e5300fc2b7020a
-
SHA256
362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449
-
SHA512
eb523913fdf02693e04b6b6d2b048cbe36722a650d1ef34796908c62e14997807da82db0b782916e62a20bf9157a4f8ad6dc2dbdcdd12b21a97bdea92c51cdeb
-
SSDEEP
12288:1Mrpy90C5NnVsMn6tdRvSUV4ewFr2oLjdRvPSJzpQ3JSJ9LeCEhEe2DCH0OS:4y/ahShvNbjdRyZpKqU5hEPuS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9828.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4996-191-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-192-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-194-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-196-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-198-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-200-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-202-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-204-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-206-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-208-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-210-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-212-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-216-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-220-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-222-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-224-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-226-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4996-228-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3684 un803726.exe 1472 pro9828.exe 4996 qu3808.exe 388 si803599.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9828.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un803726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un803726.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1472 pro9828.exe 1472 pro9828.exe 4996 qu3808.exe 4996 qu3808.exe 388 si803599.exe 388 si803599.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1472 pro9828.exe Token: SeDebugPrivilege 4996 qu3808.exe Token: SeDebugPrivilege 388 si803599.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4320 wrote to memory of 3684 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 81 PID 4320 wrote to memory of 3684 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 81 PID 4320 wrote to memory of 3684 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 81 PID 3684 wrote to memory of 1472 3684 un803726.exe 82 PID 3684 wrote to memory of 1472 3684 un803726.exe 82 PID 3684 wrote to memory of 1472 3684 un803726.exe 82 PID 3684 wrote to memory of 4996 3684 un803726.exe 87 PID 3684 wrote to memory of 4996 3684 un803726.exe 87 PID 3684 wrote to memory of 4996 3684 un803726.exe 87 PID 4320 wrote to memory of 388 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 91 PID 4320 wrote to memory of 388 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 91 PID 4320 wrote to memory of 388 4320 362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe"C:\Users\Admin\AppData\Local\Temp\362d1b3eb9ddadf7b534418afe3b697772bba6d36b08b3aa0831f6e206fda449.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un803726.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un803726.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9828.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si803599.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si803599.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57b4fb415401933f220d191b0c5f963ac
SHA16b86bca2a0c5ba49f83f5c4edf54340adcb21288
SHA2568f95e4d4ebc412d2fecd3d212b41ec021c01a29c7c58e181de367d0a747e078c
SHA5120a1f42d4441581e3def3e86ddf9bc11b9ea0ce676f6a640192379b03f6cc735719bc512942088dbfde8eefe9a3530d05e4b7b0e1a17b11b0358481370eb06928
-
Filesize
175KB
MD57b4fb415401933f220d191b0c5f963ac
SHA16b86bca2a0c5ba49f83f5c4edf54340adcb21288
SHA2568f95e4d4ebc412d2fecd3d212b41ec021c01a29c7c58e181de367d0a747e078c
SHA5120a1f42d4441581e3def3e86ddf9bc11b9ea0ce676f6a640192379b03f6cc735719bc512942088dbfde8eefe9a3530d05e4b7b0e1a17b11b0358481370eb06928
-
Filesize
553KB
MD591df1e73960f4578b1366c06e306edae
SHA147602d788245a6f1a7ce0281d5968206e9688a5d
SHA256d712f545f5b04affcc0f344c20823a0e333fdd8526a82008572c41f622ebe624
SHA5123b187d16a9bba1475d902c482327e9f356a2a4ccc23992e8c09c057739603a307784bcdd9021d7d86f3c8ea15ae4a906bdab15bfb6bcb7c703b12906283a6cf7
-
Filesize
553KB
MD591df1e73960f4578b1366c06e306edae
SHA147602d788245a6f1a7ce0281d5968206e9688a5d
SHA256d712f545f5b04affcc0f344c20823a0e333fdd8526a82008572c41f622ebe624
SHA5123b187d16a9bba1475d902c482327e9f356a2a4ccc23992e8c09c057739603a307784bcdd9021d7d86f3c8ea15ae4a906bdab15bfb6bcb7c703b12906283a6cf7
-
Filesize
308KB
MD5d4f8c029d7bc66f468c897f29661181e
SHA115855c72492bd0e4ea745373395eecd79794273d
SHA256bd7e637086693d1c38aca4b090edc6a29a86c311348e1b1002f1145fb87bfef4
SHA512c2ca1dc1326dbf29354ee2b3ce58d7be64e19ea61baf6f5d43ea56529921b644ce5ac2c4bdc32184e8eaed64b2adf164e63fe81fc6eac5edadbc59024dda8090
-
Filesize
308KB
MD5d4f8c029d7bc66f468c897f29661181e
SHA115855c72492bd0e4ea745373395eecd79794273d
SHA256bd7e637086693d1c38aca4b090edc6a29a86c311348e1b1002f1145fb87bfef4
SHA512c2ca1dc1326dbf29354ee2b3ce58d7be64e19ea61baf6f5d43ea56529921b644ce5ac2c4bdc32184e8eaed64b2adf164e63fe81fc6eac5edadbc59024dda8090
-
Filesize
366KB
MD599720e0c2952704c8d07cf2a4b560a72
SHA13e6de64cbaa0b4227b5e409016747c29cf2cf03f
SHA256fbe0a647a42996ad4342bf2efd8dab79d4bb6c30c5ddad5a460c48a516d153d4
SHA512745b7135ff0a12ba4b64e6aa9601d628879a9915d261078602ffeb1d4d0701598a40086ae126bf783be99236ba4e61ae8a25955a4b3a6b53e19d274db109129d
-
Filesize
366KB
MD599720e0c2952704c8d07cf2a4b560a72
SHA13e6de64cbaa0b4227b5e409016747c29cf2cf03f
SHA256fbe0a647a42996ad4342bf2efd8dab79d4bb6c30c5ddad5a460c48a516d153d4
SHA512745b7135ff0a12ba4b64e6aa9601d628879a9915d261078602ffeb1d4d0701598a40086ae126bf783be99236ba4e61ae8a25955a4b3a6b53e19d274db109129d