Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe
Resource
win10v2004-20230220-en
General
-
Target
c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe
-
Size
695KB
-
MD5
0c40fc767d17b2c5dab60b30afd56c1b
-
SHA1
b59b680637eb61c4c29764a9c1b25386ec045405
-
SHA256
c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c
-
SHA512
9f13628652dcb06bce21667c7d39d6cbedf32bd8e34e8a019f1be1dd9fd168cf3dfa573872ad2c9c87214063d89a0ba048487c4b3e4d51ef1818606cff4377b5
-
SSDEEP
12288:+MrBy902eh/0v136pm5HFwLwDt3HCAJuPl/KWW4Gg0I7UhNztRjJxgpPMGkeXU:HyFm/8RXrwLwx/Jel/PW4G0UvtZs1MGa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0184.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3680-189-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-190-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-192-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-194-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-196-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-198-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-200-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-202-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-208-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-210-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-212-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-214-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-216-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-218-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-220-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-222-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-224-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-226-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3680-1109-0x0000000002710000-0x0000000002720000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1528 un985096.exe 1028 pro0184.exe 3680 qu7485.exe 1304 si976456.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0184.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un985096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un985096.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1004 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1028 pro0184.exe 1028 pro0184.exe 3680 qu7485.exe 3680 qu7485.exe 1304 si976456.exe 1304 si976456.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1028 pro0184.exe Token: SeDebugPrivilege 3680 qu7485.exe Token: SeDebugPrivilege 1304 si976456.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1528 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 85 PID 4272 wrote to memory of 1528 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 85 PID 4272 wrote to memory of 1528 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 85 PID 1528 wrote to memory of 1028 1528 un985096.exe 86 PID 1528 wrote to memory of 1028 1528 un985096.exe 86 PID 1528 wrote to memory of 1028 1528 un985096.exe 86 PID 1528 wrote to memory of 3680 1528 un985096.exe 90 PID 1528 wrote to memory of 3680 1528 un985096.exe 90 PID 1528 wrote to memory of 3680 1528 un985096.exe 90 PID 4272 wrote to memory of 1304 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 92 PID 4272 wrote to memory of 1304 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 92 PID 4272 wrote to memory of 1304 4272 c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe"C:\Users\Admin\AppData\Local\Temp\c746dac4a432b4d932d39d3885b928f44b14466e1b1309c0c88cf512ec75a76c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985096.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0184.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7485.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si976456.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si976456.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD556f5aec8536290b2ec7c5f45a2344988
SHA12c224cccdfbb69d24db12f8215592d9299df1f9d
SHA25680183f52347271680f2842a874e79c97bdec161072952793b3578b4859e46e3a
SHA512240a24c9db5d98e4f71ed12e5082a35bcb5f91f62fbcece9162e38a582ec3e68783ba397d302f9b22a91a0c4b3452d85aeacbb3362484a84babcbf4d94c005b8
-
Filesize
175KB
MD556f5aec8536290b2ec7c5f45a2344988
SHA12c224cccdfbb69d24db12f8215592d9299df1f9d
SHA25680183f52347271680f2842a874e79c97bdec161072952793b3578b4859e46e3a
SHA512240a24c9db5d98e4f71ed12e5082a35bcb5f91f62fbcece9162e38a582ec3e68783ba397d302f9b22a91a0c4b3452d85aeacbb3362484a84babcbf4d94c005b8
-
Filesize
553KB
MD599a9483a3e0740ed5dca6c269e010679
SHA187a49e8a463dfb2d9aa2070f9ac0e417b049e141
SHA25608bad6549120d86e5d1c9e0c12770a5c042f74cb960113a673592faa24fc66f9
SHA51255ef73dd25c21aac881c3e5a1cc3034728ac04c0bd4eeceada89633aa2a1e92e54ad4309b1c275c453a786f23cbe1bf73774ee06c280616e7d7b304495518ab2
-
Filesize
553KB
MD599a9483a3e0740ed5dca6c269e010679
SHA187a49e8a463dfb2d9aa2070f9ac0e417b049e141
SHA25608bad6549120d86e5d1c9e0c12770a5c042f74cb960113a673592faa24fc66f9
SHA51255ef73dd25c21aac881c3e5a1cc3034728ac04c0bd4eeceada89633aa2a1e92e54ad4309b1c275c453a786f23cbe1bf73774ee06c280616e7d7b304495518ab2
-
Filesize
308KB
MD552e3018c983fef24543b38e9376a6857
SHA1cbea71cf447df9a4b6e698f74d842cb808dd1b94
SHA256dfd2f96044539d49dc4bec25b6031467f5d1c580db9807969d81030d53b3ee27
SHA5126ccb27d5631f67cacc8d34792ab793161b53406eb85845b7ea5e3cadd6e1456fac56f627677d0717235373a7cac373f6de458b45cbba973bc52b9110ae6baeb2
-
Filesize
308KB
MD552e3018c983fef24543b38e9376a6857
SHA1cbea71cf447df9a4b6e698f74d842cb808dd1b94
SHA256dfd2f96044539d49dc4bec25b6031467f5d1c580db9807969d81030d53b3ee27
SHA5126ccb27d5631f67cacc8d34792ab793161b53406eb85845b7ea5e3cadd6e1456fac56f627677d0717235373a7cac373f6de458b45cbba973bc52b9110ae6baeb2
-
Filesize
366KB
MD5f4c572bc73ea107558b996a94f46c11c
SHA150f35e287575f9df57a0f6060e539a8824251377
SHA256961a7fa5ab4e304439ab53aab766dd6b097cc00a7eded71e57d4bcd37fe98368
SHA51251e3f2096b5a422c53848f215019b647549de171a13e7bcbb8cd66bc6f2f78b85c8b17ec84a14cf8ebf23a02905407cbc0bc418910ef5b949b8ac3b5f1185dd4
-
Filesize
366KB
MD5f4c572bc73ea107558b996a94f46c11c
SHA150f35e287575f9df57a0f6060e539a8824251377
SHA256961a7fa5ab4e304439ab53aab766dd6b097cc00a7eded71e57d4bcd37fe98368
SHA51251e3f2096b5a422c53848f215019b647549de171a13e7bcbb8cd66bc6f2f78b85c8b17ec84a14cf8ebf23a02905407cbc0bc418910ef5b949b8ac3b5f1185dd4