Analysis
-
max time kernel
109s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:58
Static task
static1
Behavioral task
behavioral1
Sample
8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe
Resource
win10v2004-20230220-en
General
-
Target
8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe
-
Size
696KB
-
MD5
bd345559cd0f9dc2dbc320b06c118d1e
-
SHA1
84e39164c935a80207163ffe1c29f17fb4d41c74
-
SHA256
8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d
-
SHA512
ad8a857e220855006349a90548566b33b991f6238d68087932ad9d81d12c1530c21e1e5beca650db36f84e51a6538047d744959252b6f27732e21b892859c8e3
-
SSDEEP
12288:dMrXy90GxseOhF4qbIq+JU0KOnOLUTf14trff6vxZ+xYzdAsJulhDIDlQ92:uyeCqsjJtdTfWtLf6vxkGddkn2C2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8427.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4028-191-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-192-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-194-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-196-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-198-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-200-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-202-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-204-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-206-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-208-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-210-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-212-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-214-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-216-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-222-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-220-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-224-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-218-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/4028-357-0x0000000002490000-0x00000000024A0000-memory.dmp family_redline behavioral1/memory/4028-361-0x0000000002490000-0x00000000024A0000-memory.dmp family_redline behavioral1/memory/4028-1112-0x0000000002490000-0x00000000024A0000-memory.dmp family_redline behavioral1/memory/4028-1113-0x0000000002490000-0x00000000024A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2200 un277469.exe 2296 pro8427.exe 4028 qu3459.exe 4356 si656302.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8427.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un277469.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un277469.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2296 pro8427.exe 2296 pro8427.exe 4028 qu3459.exe 4028 qu3459.exe 4356 si656302.exe 4356 si656302.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2296 pro8427.exe Token: SeDebugPrivilege 4028 qu3459.exe Token: SeDebugPrivilege 4356 si656302.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2200 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 84 PID 1636 wrote to memory of 2200 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 84 PID 1636 wrote to memory of 2200 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 84 PID 2200 wrote to memory of 2296 2200 un277469.exe 85 PID 2200 wrote to memory of 2296 2200 un277469.exe 85 PID 2200 wrote to memory of 2296 2200 un277469.exe 85 PID 2200 wrote to memory of 4028 2200 un277469.exe 89 PID 2200 wrote to memory of 4028 2200 un277469.exe 89 PID 2200 wrote to memory of 4028 2200 un277469.exe 89 PID 1636 wrote to memory of 4356 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 91 PID 1636 wrote to memory of 4356 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 91 PID 1636 wrote to memory of 4356 1636 8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe"C:\Users\Admin\AppData\Local\Temp\8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5204c3e33bd0efeba55614cc7b7a1ca87
SHA1b5528e2b50988f00a12c1da8592e8d584ad9a099
SHA256730dcdd20f440630056d9a5b8bd58f47154e6543563cf3057cf5c227f3c6d619
SHA5125cfed4dd6e1ebdcffdce124b0611f3f9e96ffaff4cb214e3c8075b64a513ab8402abb66c0fcc2dc76d358ce0c2a6dfd61e04b3095713cf6f1091107cd7bcec90
-
Filesize
175KB
MD5204c3e33bd0efeba55614cc7b7a1ca87
SHA1b5528e2b50988f00a12c1da8592e8d584ad9a099
SHA256730dcdd20f440630056d9a5b8bd58f47154e6543563cf3057cf5c227f3c6d619
SHA5125cfed4dd6e1ebdcffdce124b0611f3f9e96ffaff4cb214e3c8075b64a513ab8402abb66c0fcc2dc76d358ce0c2a6dfd61e04b3095713cf6f1091107cd7bcec90
-
Filesize
553KB
MD51e4a72d9a40832f5d0de2aa6787732ca
SHA15da0889ff6425f7661f7a2233915c5bd121f4381
SHA25694ffe3718dae8bbbcb77357150708cb96e40b1e9364f57f37ec301221ecb8b61
SHA512d7b89ed6903f430e384c50e4e8a2ab6cd968bf75e99ef2b6e5a8ffc8515b308a79fdc054e48c3c79b1ea7e3ea0c4788050f888cde483ea5afeb01960d952209a
-
Filesize
553KB
MD51e4a72d9a40832f5d0de2aa6787732ca
SHA15da0889ff6425f7661f7a2233915c5bd121f4381
SHA25694ffe3718dae8bbbcb77357150708cb96e40b1e9364f57f37ec301221ecb8b61
SHA512d7b89ed6903f430e384c50e4e8a2ab6cd968bf75e99ef2b6e5a8ffc8515b308a79fdc054e48c3c79b1ea7e3ea0c4788050f888cde483ea5afeb01960d952209a
-
Filesize
308KB
MD50b1c3f38a06bb077dd3f70ba79bbc231
SHA19f9970bdd29d78eeea1c4d3df7cce754f54e664d
SHA2562d85766e48e45fb69908449cd8afb94f040727be89bcb7952582561d69e090be
SHA512fb10e0ba92c0b29a277d513fb816806c7d78770650ab7a91a086ffd90b06d22625ecfe40dbc0fabf34b4365bc594056e0b6d35a9102485e4df52ab0f4d7a9ad9
-
Filesize
308KB
MD50b1c3f38a06bb077dd3f70ba79bbc231
SHA19f9970bdd29d78eeea1c4d3df7cce754f54e664d
SHA2562d85766e48e45fb69908449cd8afb94f040727be89bcb7952582561d69e090be
SHA512fb10e0ba92c0b29a277d513fb816806c7d78770650ab7a91a086ffd90b06d22625ecfe40dbc0fabf34b4365bc594056e0b6d35a9102485e4df52ab0f4d7a9ad9
-
Filesize
366KB
MD5e9e68b7dbca2507f7f4854dd4ed910bb
SHA127415e8df641f7b69f78cc18c28eff240ed7fbc4
SHA25645a1b374591da5d696f6791365898a60a84d25d1ec5735a4394ff841ddba411d
SHA5124a8104634a725da07ae21cac012db1f9fff3411cca1416515ff45b88e3d672c66ba7143ad4066a9090357e59e6589bfb31b86fa04f2278ac4f31fb41ec666069
-
Filesize
366KB
MD5e9e68b7dbca2507f7f4854dd4ed910bb
SHA127415e8df641f7b69f78cc18c28eff240ed7fbc4
SHA25645a1b374591da5d696f6791365898a60a84d25d1ec5735a4394ff841ddba411d
SHA5124a8104634a725da07ae21cac012db1f9fff3411cca1416515ff45b88e3d672c66ba7143ad4066a9090357e59e6589bfb31b86fa04f2278ac4f31fb41ec666069