Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:01
Static task
static1
Behavioral task
behavioral1
Sample
498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe
Resource
win10-20230220-en
General
-
Target
498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe
-
Size
694KB
-
MD5
14168cfc16760c81af1316d379f70773
-
SHA1
0b5540b74ac7b89e39a8e42983545aee2fa307ae
-
SHA256
498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e
-
SHA512
1e32ff4555a3469f4242b1eb756a6ff65fd07c77c7bc6842e1a067a640c2c52446d7d308c73fc7f4149acb0a8637da933ee0787ca29fbba7266f2746faeafd8a
-
SSDEEP
12288:7Mr1y9053mGtvsFG0rAa3F7bBY7bsG+iEfvPStzoYCJERPrlk2m7nR:ayW3mGREdF7qv3+nydoV2Rjm7R
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2412.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3620-181-0x0000000004C40000-0x0000000004C86000-memory.dmp family_redline behavioral1/memory/3620-185-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/3620-187-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-188-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-190-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-192-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-194-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-196-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-198-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-200-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-202-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-206-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-204-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-208-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-210-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-212-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-214-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-216-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-218-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/3620-220-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un965028.exe 2396 pro2412.exe 3620 qu1737.exe 2584 si490091.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2412.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un965028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un965028.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2396 pro2412.exe 2396 pro2412.exe 3620 qu1737.exe 3620 qu1737.exe 2584 si490091.exe 2584 si490091.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 pro2412.exe Token: SeDebugPrivilege 3620 qu1737.exe Token: SeDebugPrivilege 2584 si490091.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 400 wrote to memory of 4268 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 66 PID 400 wrote to memory of 4268 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 66 PID 400 wrote to memory of 4268 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 66 PID 4268 wrote to memory of 2396 4268 un965028.exe 67 PID 4268 wrote to memory of 2396 4268 un965028.exe 67 PID 4268 wrote to memory of 2396 4268 un965028.exe 67 PID 4268 wrote to memory of 3620 4268 un965028.exe 68 PID 4268 wrote to memory of 3620 4268 un965028.exe 68 PID 4268 wrote to memory of 3620 4268 un965028.exe 68 PID 400 wrote to memory of 2584 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 70 PID 400 wrote to memory of 2584 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 70 PID 400 wrote to memory of 2584 400 498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe"C:\Users\Admin\AppData\Local\Temp\498495cd17341ed1e2e76d0d2376423351237895e05858748d162c67bdabee4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2412.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1737.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490091.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5afcc0fd394b1e52972d6191101c8fe18
SHA1db7e0b7afb98c24716b2c34e225caf490fc86825
SHA2560888de53ba34dd7bc01d8f867d023e2c0039459ceb499953137c029df153a8fb
SHA512de173549360a0b50376be6eacc41c733bdbcc732925856a4cebd7b0ca59d22add9a46b0a80badbecb03b6d7ac89acbb0870031f826184d84ec6d4b87f0b7334b
-
Filesize
175KB
MD5afcc0fd394b1e52972d6191101c8fe18
SHA1db7e0b7afb98c24716b2c34e225caf490fc86825
SHA2560888de53ba34dd7bc01d8f867d023e2c0039459ceb499953137c029df153a8fb
SHA512de173549360a0b50376be6eacc41c733bdbcc732925856a4cebd7b0ca59d22add9a46b0a80badbecb03b6d7ac89acbb0870031f826184d84ec6d4b87f0b7334b
-
Filesize
553KB
MD52ef1ef4bdb4e804a9140d28d48a3587e
SHA1d08667d143d22ce33482d49d75bd7faad3e5c03b
SHA2566f1a3c8002beeb3c299ded9cf4f29b6bc95757e85a42b35d2ec2923c2573390d
SHA5124f73f5d55bcbe677727fdd7af0d972d060346a04ad427c694b935548457ff96c6f98728ff0967348769e76702eb055d0b560dddf2e16bafe8b08314f70cf68de
-
Filesize
553KB
MD52ef1ef4bdb4e804a9140d28d48a3587e
SHA1d08667d143d22ce33482d49d75bd7faad3e5c03b
SHA2566f1a3c8002beeb3c299ded9cf4f29b6bc95757e85a42b35d2ec2923c2573390d
SHA5124f73f5d55bcbe677727fdd7af0d972d060346a04ad427c694b935548457ff96c6f98728ff0967348769e76702eb055d0b560dddf2e16bafe8b08314f70cf68de
-
Filesize
308KB
MD594db9d5e465dc08a4978b21a429d84d8
SHA12c710b76fb3392625303e8f7def255c209f3821e
SHA2561b1e1b66e41ecead038a164f2d8a72c9d19dcd9fd4fc27ae69c41e08c2bffc4f
SHA51220994ed132dd6545a1b441ddaf822febca38eb69a3796cc539b7720119a40e9b7e84dfd28473bc7538e35aea2f747841867a05916e38fc7d5d321e943cb6cbf8
-
Filesize
308KB
MD594db9d5e465dc08a4978b21a429d84d8
SHA12c710b76fb3392625303e8f7def255c209f3821e
SHA2561b1e1b66e41ecead038a164f2d8a72c9d19dcd9fd4fc27ae69c41e08c2bffc4f
SHA51220994ed132dd6545a1b441ddaf822febca38eb69a3796cc539b7720119a40e9b7e84dfd28473bc7538e35aea2f747841867a05916e38fc7d5d321e943cb6cbf8
-
Filesize
366KB
MD58f19af0596f062fb60b4befaf18665ec
SHA1eda99b91167ee59baba594efcb74f3ba4bdce918
SHA25635d920842dc0c7d898ff2a78e0620f082de41176983afd7d5d77cc448c463e40
SHA51262f5702b31733e426c20c5d5c79f87682cb72459b997ecba316be05c99148451ee7ce2bd4855191ab8f62dfb7e3f9784814f2612c17ee308a7d13b07d7408d04
-
Filesize
366KB
MD58f19af0596f062fb60b4befaf18665ec
SHA1eda99b91167ee59baba594efcb74f3ba4bdce918
SHA25635d920842dc0c7d898ff2a78e0620f082de41176983afd7d5d77cc448c463e40
SHA51262f5702b31733e426c20c5d5c79f87682cb72459b997ecba316be05c99148451ee7ce2bd4855191ab8f62dfb7e3f9784814f2612c17ee308a7d13b07d7408d04