Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe
Resource
win10v2004-20230220-en
General
-
Target
e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe
-
Size
696KB
-
MD5
e0342ece768924c690e80173c66b04c2
-
SHA1
83d0e964ecd31e571461f6acec8daa6e543add03
-
SHA256
e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53
-
SHA512
b6ce82898ad4ce423a61c2aa5c6859742805e24f206d1b41b639bc4ce565d27acd57e3b2991a3c479a8635caf13462697a826b12a88925413708e0caed9a90e4
-
SSDEEP
12288:TMr3y9029wlReYh9lkRkfDK0HI4h4trtQ8wEg7fzLSzJcwaVmk7KlI:4yFsnK0Hr+tpCLESVmk7gI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1512.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4552-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-205-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-209-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-217-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-219-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-221-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-223-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-225-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4552-227-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3488 un627139.exe 1436 pro1512.exe 4552 qu6549.exe 3992 si195595.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1512.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un627139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un627139.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3440 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1436 pro1512.exe 1436 pro1512.exe 4552 qu6549.exe 4552 qu6549.exe 3992 si195595.exe 3992 si195595.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1436 pro1512.exe Token: SeDebugPrivilege 4552 qu6549.exe Token: SeDebugPrivilege 3992 si195595.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3488 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 84 PID 3820 wrote to memory of 3488 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 84 PID 3820 wrote to memory of 3488 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 84 PID 3488 wrote to memory of 1436 3488 un627139.exe 85 PID 3488 wrote to memory of 1436 3488 un627139.exe 85 PID 3488 wrote to memory of 1436 3488 un627139.exe 85 PID 3488 wrote to memory of 4552 3488 un627139.exe 91 PID 3488 wrote to memory of 4552 3488 un627139.exe 91 PID 3488 wrote to memory of 4552 3488 un627139.exe 91 PID 3820 wrote to memory of 3992 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 92 PID 3820 wrote to memory of 3992 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 92 PID 3820 wrote to memory of 3992 3820 e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe"C:\Users\Admin\AppData\Local\Temp\e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b676210353f24721d13ce69d63eb83ed
SHA15302734fe0bc5e007ddd33a9884a3158ccf1e57c
SHA256bfca093252316b8cc4cf02d30ba8fac27d8c07600ab05911c4d1459bd540b388
SHA5122632f83496092d8ef749d3fc99e3ef3b28516d974dbc5cab532888b12ee59c68b31426043a66d9dba12d82a9d7697eed0ada1debb02529d32de02a29775a4eee
-
Filesize
175KB
MD5b676210353f24721d13ce69d63eb83ed
SHA15302734fe0bc5e007ddd33a9884a3158ccf1e57c
SHA256bfca093252316b8cc4cf02d30ba8fac27d8c07600ab05911c4d1459bd540b388
SHA5122632f83496092d8ef749d3fc99e3ef3b28516d974dbc5cab532888b12ee59c68b31426043a66d9dba12d82a9d7697eed0ada1debb02529d32de02a29775a4eee
-
Filesize
553KB
MD5feb9e1165d3716bf2b8573a49ea7a270
SHA199955e8ce60a942a31c6a98366a6366a6f9e1d01
SHA256779d78a1ae8e0561ad29e8632066f8c4e135c0342484e569a03d1f5c49c7c741
SHA512e52427ccb14a67634d72afc295e33d1285930fa4914029e8fec8e815835cf78cc56be558b4a043f0df3e60aae31c4c83d3add9e1f8a9b108eefd06a7368ea356
-
Filesize
553KB
MD5feb9e1165d3716bf2b8573a49ea7a270
SHA199955e8ce60a942a31c6a98366a6366a6f9e1d01
SHA256779d78a1ae8e0561ad29e8632066f8c4e135c0342484e569a03d1f5c49c7c741
SHA512e52427ccb14a67634d72afc295e33d1285930fa4914029e8fec8e815835cf78cc56be558b4a043f0df3e60aae31c4c83d3add9e1f8a9b108eefd06a7368ea356
-
Filesize
308KB
MD5ea7f6a91d917436193a0abdb51b47919
SHA19e67ea1a91ae03aadce334ab8eb75bfc99a012f9
SHA256877605010f4e817dd30b88e2da7329badc2f02a731f712d260955d4f61bbf753
SHA51234cd059c0a9b13a062ad43afd6895c5af12bd860afcbdf6fed1f5d8efa890d2dca3e419ad7127e17e4c168152f23c41d9d790397dcfa634d22ca332ea4d7b1cd
-
Filesize
308KB
MD5ea7f6a91d917436193a0abdb51b47919
SHA19e67ea1a91ae03aadce334ab8eb75bfc99a012f9
SHA256877605010f4e817dd30b88e2da7329badc2f02a731f712d260955d4f61bbf753
SHA51234cd059c0a9b13a062ad43afd6895c5af12bd860afcbdf6fed1f5d8efa890d2dca3e419ad7127e17e4c168152f23c41d9d790397dcfa634d22ca332ea4d7b1cd
-
Filesize
366KB
MD5bf10fcbcf2c78660f39ea2b02a5dbc0f
SHA1052ab74ad4e5fb2322b5e8109198f89415a4427f
SHA256f1b64bc5ab63e3e3ee2fd6291fa48afc6ec03286bc4e9cebf9eee70f340198b0
SHA512ec0b9c148feca41ed9b26e9e03a946953ce1c336e6c0ede08b651b4eacfc549a1e6df118538953f70ad48f9af1a6e05ee7dee9a47358c7e0809545878dfdc42f
-
Filesize
366KB
MD5bf10fcbcf2c78660f39ea2b02a5dbc0f
SHA1052ab74ad4e5fb2322b5e8109198f89415a4427f
SHA256f1b64bc5ab63e3e3ee2fd6291fa48afc6ec03286bc4e9cebf9eee70f340198b0
SHA512ec0b9c148feca41ed9b26e9e03a946953ce1c336e6c0ede08b651b4eacfc549a1e6df118538953f70ad48f9af1a6e05ee7dee9a47358c7e0809545878dfdc42f