Analysis
-
max time kernel
71s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe
Resource
win10-20230220-en
General
-
Target
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe
-
Size
695KB
-
MD5
b5ae6515a92e70e42568d5a7278eee84
-
SHA1
f4d7ba423b295629943d1c69e5f62b44887efd59
-
SHA256
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33
-
SHA512
84e90229fcaf71589a83b0ff73dee6b56a2fa7e45afe2b657dc2d8093fad465658b00d89ad1a3d22d00ec123d0998c1dd0754ffae9638578b78c59381b77ee17
-
SSDEEP
12288:7Mrzy90LMO98LTvteRYrkVkRjaOEoaIET3ZEAQzF1WJkwwrmkYhY627xW:cy2MO983vtqmmjOAIu3ZEAIFskrmk2Ye
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9580.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3544-178-0x00000000022F0000-0x0000000002336000-memory.dmp family_redline behavioral1/memory/3544-179-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/3544-180-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-183-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-181-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-185-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-187-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-189-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-194-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-197-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-199-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-201-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-203-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-205-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-207-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-209-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-211-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-213-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-215-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3544-217-0x0000000002610000-0x000000000264F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3652 un467762.exe 4192 pro9580.exe 3544 qu3893.exe 4328 si905385.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9580.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un467762.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un467762.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4192 pro9580.exe 4192 pro9580.exe 3544 qu3893.exe 3544 qu3893.exe 4328 si905385.exe 4328 si905385.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4192 pro9580.exe Token: SeDebugPrivilege 3544 qu3893.exe Token: SeDebugPrivilege 4328 si905385.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3652 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 66 PID 4344 wrote to memory of 3652 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 66 PID 4344 wrote to memory of 3652 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 66 PID 3652 wrote to memory of 4192 3652 un467762.exe 67 PID 3652 wrote to memory of 4192 3652 un467762.exe 67 PID 3652 wrote to memory of 4192 3652 un467762.exe 67 PID 3652 wrote to memory of 3544 3652 un467762.exe 68 PID 3652 wrote to memory of 3544 3652 un467762.exe 68 PID 3652 wrote to memory of 3544 3652 un467762.exe 68 PID 4344 wrote to memory of 4328 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 70 PID 4344 wrote to memory of 4328 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 70 PID 4344 wrote to memory of 4328 4344 2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe"C:\Users\Admin\AppData\Local\Temp\2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467762.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9580.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3893.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si905385.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si905385.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50928336ab48d6e4c9933974ab03c3a58
SHA1a1e6831bb87b3faf5a3ed8468bc7601dd48daa0a
SHA256a274124815aae4cd3966b9af0633a31e0d042004004f80273e21bdbfc6ddcfc5
SHA512c241ad36d6670c62efab9a224c56cf084ff3d8a8f88d1189b04caa546778e97734b31761e0b122a55e13e5ea57912c4a98f1ff52e4c8311e73fa3a63d0606b54
-
Filesize
175KB
MD50928336ab48d6e4c9933974ab03c3a58
SHA1a1e6831bb87b3faf5a3ed8468bc7601dd48daa0a
SHA256a274124815aae4cd3966b9af0633a31e0d042004004f80273e21bdbfc6ddcfc5
SHA512c241ad36d6670c62efab9a224c56cf084ff3d8a8f88d1189b04caa546778e97734b31761e0b122a55e13e5ea57912c4a98f1ff52e4c8311e73fa3a63d0606b54
-
Filesize
553KB
MD5eb45a7ac66a2d00da8a6f3a5d6dc6601
SHA1b99119ec12d246c29f0cce666fd384e674190318
SHA256baf29fd84e5b6ebd13262efa85e9f54be7e81e69567768a3ea6dececa55d80f5
SHA51273b4703bb0c762e40b157307492c5bb5aebfe65288c978137b7c41b1025bcc12acdbf0a0165295724f3d168fcefc6a0135c45cbaed7933b3fd6985f8d5c2a5b5
-
Filesize
553KB
MD5eb45a7ac66a2d00da8a6f3a5d6dc6601
SHA1b99119ec12d246c29f0cce666fd384e674190318
SHA256baf29fd84e5b6ebd13262efa85e9f54be7e81e69567768a3ea6dececa55d80f5
SHA51273b4703bb0c762e40b157307492c5bb5aebfe65288c978137b7c41b1025bcc12acdbf0a0165295724f3d168fcefc6a0135c45cbaed7933b3fd6985f8d5c2a5b5
-
Filesize
308KB
MD56966d1efd1f66ed989d38a39e2cdd354
SHA1cf5a96f36557a3097b743dfc05203357838c0664
SHA256a4b877665736bcd0ac1a90bf7a5dd3d287b20a969e1a980b66860ff4bfad6de4
SHA5120f9b8b66ad9dbe98a34375a2564e31fbd1ba1720e29c73af157b5f7b423ce6bfc4de7dc51df6722a3588c1a9a913142ccd5778d414331b46e8a558212425f9a1
-
Filesize
308KB
MD56966d1efd1f66ed989d38a39e2cdd354
SHA1cf5a96f36557a3097b743dfc05203357838c0664
SHA256a4b877665736bcd0ac1a90bf7a5dd3d287b20a969e1a980b66860ff4bfad6de4
SHA5120f9b8b66ad9dbe98a34375a2564e31fbd1ba1720e29c73af157b5f7b423ce6bfc4de7dc51df6722a3588c1a9a913142ccd5778d414331b46e8a558212425f9a1
-
Filesize
366KB
MD5bd6aa54aa10c77d8fa0be7cfa0916307
SHA15965670c2755126c063cc2c4256b17711cac8f02
SHA256eb8e8e68d0f0676be518688c4c5d67d69c782d4e7a82f392ebc8fe5bd7b97daf
SHA5123402c9dfad4fb604cdd52bc09c432775ddd9543ead031107c60128c4f2e2301cfc50d040a367fe94d517b07e27e800a18f3482b512fa5bf44d80af21e705e345
-
Filesize
366KB
MD5bd6aa54aa10c77d8fa0be7cfa0916307
SHA15965670c2755126c063cc2c4256b17711cac8f02
SHA256eb8e8e68d0f0676be518688c4c5d67d69c782d4e7a82f392ebc8fe5bd7b97daf
SHA5123402c9dfad4fb604cdd52bc09c432775ddd9543ead031107c60128c4f2e2301cfc50d040a367fe94d517b07e27e800a18f3482b512fa5bf44d80af21e705e345