Analysis
-
max time kernel
63s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:54
Static task
static1
Behavioral task
behavioral1
Sample
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe
Resource
win10v2004-20230220-en
General
-
Target
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe
-
Size
696KB
-
MD5
7052a49f3a3a914eae32f9144525dfc0
-
SHA1
b8441dca7e35c277db6ca296e192c070b4ec3e65
-
SHA256
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88
-
SHA512
e0e919c37d715f44e0b24d8148a2fdcd4358d19ff40b374793bcdff7402634d543ef5bfbd3765670f60b779f70d0270d048d8a11cc3e1efc79850a67c8ea158b
-
SSDEEP
12288:2MrQy90FIGq8uYH7WlqN27J9cKaunlWAnJkCdgoxyzpbGJ4/P+a:Wyyq4bPNabcKaGl5B9YpKgP+a
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4757.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1208-190-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-193-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-199-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-227-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1208-1110-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3756 un765379.exe 4760 pro4757.exe 1208 qu7821.exe 3944 si327780.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4757.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un765379.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un765379.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4760 pro4757.exe 4760 pro4757.exe 1208 qu7821.exe 1208 qu7821.exe 3944 si327780.exe 3944 si327780.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4760 pro4757.exe Token: SeDebugPrivilege 1208 qu7821.exe Token: SeDebugPrivilege 3944 si327780.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3756 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 80 PID 1188 wrote to memory of 3756 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 80 PID 1188 wrote to memory of 3756 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 80 PID 3756 wrote to memory of 4760 3756 un765379.exe 81 PID 3756 wrote to memory of 4760 3756 un765379.exe 81 PID 3756 wrote to memory of 4760 3756 un765379.exe 81 PID 3756 wrote to memory of 1208 3756 un765379.exe 87 PID 3756 wrote to memory of 1208 3756 un765379.exe 87 PID 3756 wrote to memory of 1208 3756 un765379.exe 87 PID 1188 wrote to memory of 3944 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 89 PID 1188 wrote to memory of 3944 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 89 PID 1188 wrote to memory of 3944 1188 bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe"C:\Users\Admin\AppData\Local\Temp\bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59a54b36feb0e1f83586b226811509aef
SHA1994016687e6449e3efca65dc5c2633cff40acd93
SHA2568f320b4d340e6b9ed383a17ffcea413e1a3aa8cf69a2ee450f7ed66488771a50
SHA512e8cae682af180e6d741765ca0ba0c1706748671c777b53c75f122d25fb728860c1b7245b2469dff3de0dd8f27d3df2d935602e48d2f17f7cec62d6c4ca24b3ae
-
Filesize
175KB
MD59a54b36feb0e1f83586b226811509aef
SHA1994016687e6449e3efca65dc5c2633cff40acd93
SHA2568f320b4d340e6b9ed383a17ffcea413e1a3aa8cf69a2ee450f7ed66488771a50
SHA512e8cae682af180e6d741765ca0ba0c1706748671c777b53c75f122d25fb728860c1b7245b2469dff3de0dd8f27d3df2d935602e48d2f17f7cec62d6c4ca24b3ae
-
Filesize
553KB
MD5dbed2aa509d3c7165fd1504573c93fd1
SHA1504694fe4d89e0f0b6431ea246c01864458f6aab
SHA2569839fe86a67d475c012cf9426ef904b0bc99ec7b14db483e00993456da11de65
SHA512ab54ceab4786a760ccb0d587d8237796058c39a14303598456f235cbd77aaac91ce959ba14bd5303ef19f47689f20863bf5860893b36aea9595ee54f9b4537db
-
Filesize
553KB
MD5dbed2aa509d3c7165fd1504573c93fd1
SHA1504694fe4d89e0f0b6431ea246c01864458f6aab
SHA2569839fe86a67d475c012cf9426ef904b0bc99ec7b14db483e00993456da11de65
SHA512ab54ceab4786a760ccb0d587d8237796058c39a14303598456f235cbd77aaac91ce959ba14bd5303ef19f47689f20863bf5860893b36aea9595ee54f9b4537db
-
Filesize
308KB
MD52528ba04641eabde72a0034f82b1018d
SHA1b092bcf396dc71a0d10ec1b7d1d96cf79adcbb4e
SHA2562ed447f43319098e669720120d47ac3d0d9ebd6846c0e03db02a6c232224d0ed
SHA5123229d0f02148bb5d8e73738333052de11072ab97eb5426ecd155a04cfdfb1123338e5b685cc4a68425d958d1da8decbcc55e868173dc02cc6f500d242acaeafb
-
Filesize
308KB
MD52528ba04641eabde72a0034f82b1018d
SHA1b092bcf396dc71a0d10ec1b7d1d96cf79adcbb4e
SHA2562ed447f43319098e669720120d47ac3d0d9ebd6846c0e03db02a6c232224d0ed
SHA5123229d0f02148bb5d8e73738333052de11072ab97eb5426ecd155a04cfdfb1123338e5b685cc4a68425d958d1da8decbcc55e868173dc02cc6f500d242acaeafb
-
Filesize
366KB
MD50363a545c48a6ab879ba75ad33d4e87e
SHA184fa162cfa6e48ef8336ee2c4600a66d664fad19
SHA256f8573473fe1c482f37baaa6189738b37d15e4bbf284cf978413b1c399fdbe49e
SHA512ab183cafd0665e158c0b9822432448150acba61d25f749416fdfb842cb25ba0fbcd5cfc5764ed27c517902b9d0aef63daa7ce08255aebadc6736261ee2ce2e89
-
Filesize
366KB
MD50363a545c48a6ab879ba75ad33d4e87e
SHA184fa162cfa6e48ef8336ee2c4600a66d664fad19
SHA256f8573473fe1c482f37baaa6189738b37d15e4bbf284cf978413b1c399fdbe49e
SHA512ab183cafd0665e158c0b9822432448150acba61d25f749416fdfb842cb25ba0fbcd5cfc5764ed27c517902b9d0aef63daa7ce08255aebadc6736261ee2ce2e89