Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe
Resource
win10v2004-20230221-en
General
-
Target
c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe
-
Size
695KB
-
MD5
2685dd13218d5d1d046f5f9622812a37
-
SHA1
b5da7487af60ce5847cac64f14e2c901a0531fde
-
SHA256
c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449
-
SHA512
e77051d0f2500827583dbf07f74fc734242ac44043e23c0a0e0ebe03ebc8045c0f9b10aee2b842e471d0629588e7469c87c12c04811c8793ebd4e788e4fa9584
-
SSDEEP
12288:vMrzy90QPaiQikEGZgmwOaDtmZWNuPlyfYgFRM58Fkezo6bJBmjX0kFw:0yUi/GZgqaxvNelyfYEM6po4qjdu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6797.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4588-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4588-354-0x0000000004C80000-0x0000000004C90000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4776 un775501.exe 1904 pro6797.exe 4588 qu3747.exe 1156 si770406.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6797.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un775501.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un775501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1904 pro6797.exe 1904 pro6797.exe 4588 qu3747.exe 4588 qu3747.exe 1156 si770406.exe 1156 si770406.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1904 pro6797.exe Token: SeDebugPrivilege 4588 qu3747.exe Token: SeDebugPrivilege 1156 si770406.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4776 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 83 PID 1736 wrote to memory of 4776 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 83 PID 1736 wrote to memory of 4776 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 83 PID 4776 wrote to memory of 1904 4776 un775501.exe 84 PID 4776 wrote to memory of 1904 4776 un775501.exe 84 PID 4776 wrote to memory of 1904 4776 un775501.exe 84 PID 4776 wrote to memory of 4588 4776 un775501.exe 89 PID 4776 wrote to memory of 4588 4776 un775501.exe 89 PID 4776 wrote to memory of 4588 4776 un775501.exe 89 PID 1736 wrote to memory of 1156 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 93 PID 1736 wrote to memory of 1156 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 93 PID 1736 wrote to memory of 1156 1736 c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe"C:\Users\Admin\AppData\Local\Temp\c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57ffa6afc7539cad25da7a570dd7509d0
SHA1ccac7824ff22f8b8e67b2bcc3d352d5b27c7c575
SHA256da852896f39b785ccb56f525dd80bbf5ef5c4c3cfb64fb69941a3b6e889c825f
SHA512b068535bc6e378dbf5293a0ca781afbb1bb65560b6133ba18fe70d694447d47247427ce2c9db5f6aae8e1d0142702777d254c0b123c90b1bf2046ff7adc14cf6
-
Filesize
175KB
MD57ffa6afc7539cad25da7a570dd7509d0
SHA1ccac7824ff22f8b8e67b2bcc3d352d5b27c7c575
SHA256da852896f39b785ccb56f525dd80bbf5ef5c4c3cfb64fb69941a3b6e889c825f
SHA512b068535bc6e378dbf5293a0ca781afbb1bb65560b6133ba18fe70d694447d47247427ce2c9db5f6aae8e1d0142702777d254c0b123c90b1bf2046ff7adc14cf6
-
Filesize
553KB
MD50d78191ef74ad4ca22195a468b2f90bd
SHA1eb36b68adb4c507ded742ab88cc420a9a1092d15
SHA2565a8a96798b18f52b34ce341a1c6bf88bdc043dbec75ad0ef68003d29215a16fa
SHA512abb11c8d0150b80c1a6fe10876308d4b20fdfc42e93f451ea19f7d9d38a62e6b02410a884e12b90a373c4efd889d1019a49ab67bc7d5e39e8b4e15017c924666
-
Filesize
553KB
MD50d78191ef74ad4ca22195a468b2f90bd
SHA1eb36b68adb4c507ded742ab88cc420a9a1092d15
SHA2565a8a96798b18f52b34ce341a1c6bf88bdc043dbec75ad0ef68003d29215a16fa
SHA512abb11c8d0150b80c1a6fe10876308d4b20fdfc42e93f451ea19f7d9d38a62e6b02410a884e12b90a373c4efd889d1019a49ab67bc7d5e39e8b4e15017c924666
-
Filesize
308KB
MD522adcb19564c68d6fff698c5c091eaeb
SHA1c9e64c1c0910d4d7fcd9ca4af8952e7c08ef68de
SHA25668b7e48c970e15f260abb9a752716506951bdb9ec9777936c44809792f8a3dae
SHA512fe4ec37fc6d12a355decea36e39fa797cc212404a79be5adc18a238f37ccf77f5091b7da1081a868355db909edf31a668e7eced91cd30e8ef1c291c658460cd9
-
Filesize
308KB
MD522adcb19564c68d6fff698c5c091eaeb
SHA1c9e64c1c0910d4d7fcd9ca4af8952e7c08ef68de
SHA25668b7e48c970e15f260abb9a752716506951bdb9ec9777936c44809792f8a3dae
SHA512fe4ec37fc6d12a355decea36e39fa797cc212404a79be5adc18a238f37ccf77f5091b7da1081a868355db909edf31a668e7eced91cd30e8ef1c291c658460cd9
-
Filesize
366KB
MD527ed9ada83ccd9e4267f3bf94dd5fb38
SHA1430a74371ad35ba40e64e40f1fd083d07e0e4564
SHA256dcceded6be4c4aa440b0bfd8c6664c82c8a1a11fb4aaa620377ec036bfc22b3a
SHA512179df73880ea1aa1760cfc181ad18a2ec5b39a3dd86c6c34cbaee15b7bffc0dddd2e3659623e3d91e0a5dd33bf601edef25f339dfa209bb6d6d20f96d2fa5418
-
Filesize
366KB
MD527ed9ada83ccd9e4267f3bf94dd5fb38
SHA1430a74371ad35ba40e64e40f1fd083d07e0e4564
SHA256dcceded6be4c4aa440b0bfd8c6664c82c8a1a11fb4aaa620377ec036bfc22b3a
SHA512179df73880ea1aa1760cfc181ad18a2ec5b39a3dd86c6c34cbaee15b7bffc0dddd2e3659623e3d91e0a5dd33bf601edef25f339dfa209bb6d6d20f96d2fa5418