Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe
Resource
win10-20230220-en
General
-
Target
33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe
-
Size
695KB
-
MD5
96d93c3d5570eefa3e0ea9a102e8e952
-
SHA1
3dd618b69af23965d37de77daecd8638c87a58c1
-
SHA256
33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284
-
SHA512
9f8055d33327e58df55559fcc85c86d9ac0043ed9aefe7e7ad425f71c57598f0cd30dd7aa7eedb758f507e12001d2a3a823cb277725c54e0c165117a50f34744
-
SSDEEP
12288:xMrBy90RB0L6Qt6DlCpfp1JArcGuPlhc+QGMyO/rfIzBRxJVQDokPC:ky4yL6TDl4p1WrcGelhlOzIBD7/kq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3393.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3500-180-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/3500-181-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/3500-182-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-183-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-185-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-187-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-189-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-191-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-193-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-195-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-197-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-200-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-205-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-207-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-209-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-211-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-213-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-215-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-217-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3500-219-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4272 un768433.exe 4616 pro3393.exe 3500 qu7491.exe 4488 si525803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3393.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un768433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un768433.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4616 pro3393.exe 4616 pro3393.exe 3500 qu7491.exe 3500 qu7491.exe 4488 si525803.exe 4488 si525803.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4616 pro3393.exe Token: SeDebugPrivilege 3500 qu7491.exe Token: SeDebugPrivilege 4488 si525803.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4272 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 66 PID 4212 wrote to memory of 4272 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 66 PID 4212 wrote to memory of 4272 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 66 PID 4272 wrote to memory of 4616 4272 un768433.exe 67 PID 4272 wrote to memory of 4616 4272 un768433.exe 67 PID 4272 wrote to memory of 4616 4272 un768433.exe 67 PID 4272 wrote to memory of 3500 4272 un768433.exe 68 PID 4272 wrote to memory of 3500 4272 un768433.exe 68 PID 4272 wrote to memory of 3500 4272 un768433.exe 68 PID 4212 wrote to memory of 4488 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 70 PID 4212 wrote to memory of 4488 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 70 PID 4212 wrote to memory of 4488 4212 33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe"C:\Users\Admin\AppData\Local\Temp\33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50094e46f29b21ae008e7c6da1d1ecc6f
SHA139895f9b1369c067653a133d7fe05dff94607c97
SHA256d18b03ab30c7630d46dcdc6abe7edd277a2b89518cf63acaeb36d3aeac4d9bc7
SHA51290d438b8e424de78bdaaf79b726b7799b498239db001c6f088c67c67f8dc1d00334676b8f36e7b44b4a5b6ef4f2c49021562cf3859236007d9ccb960be347881
-
Filesize
175KB
MD50094e46f29b21ae008e7c6da1d1ecc6f
SHA139895f9b1369c067653a133d7fe05dff94607c97
SHA256d18b03ab30c7630d46dcdc6abe7edd277a2b89518cf63acaeb36d3aeac4d9bc7
SHA51290d438b8e424de78bdaaf79b726b7799b498239db001c6f088c67c67f8dc1d00334676b8f36e7b44b4a5b6ef4f2c49021562cf3859236007d9ccb960be347881
-
Filesize
553KB
MD50dbd56ee77f76e22a3a4ab10c576db34
SHA16955ab9d7a41118989fde5d9ba903b8539a5248f
SHA256e87983538ce19ba2d7991ac4c34f28f1a648386c06baddbe05404962e3d07796
SHA51213dfc01b307e5613856fe99243deff7028e46ff03ebfb573cf3ba388eb9a4d8731ac5b02af5d1804953a1542e253bc8bc9838c92a6995e5f24fc54d8be0a46ec
-
Filesize
553KB
MD50dbd56ee77f76e22a3a4ab10c576db34
SHA16955ab9d7a41118989fde5d9ba903b8539a5248f
SHA256e87983538ce19ba2d7991ac4c34f28f1a648386c06baddbe05404962e3d07796
SHA51213dfc01b307e5613856fe99243deff7028e46ff03ebfb573cf3ba388eb9a4d8731ac5b02af5d1804953a1542e253bc8bc9838c92a6995e5f24fc54d8be0a46ec
-
Filesize
308KB
MD5d9c07efeda60ab7911698fe0adc32fdc
SHA11ad174b0e47a12c18306aa07f9702998ed6ff47d
SHA256d9bfe450b4f999547d56f73a577415658f7e74f9ffbce6dec4e5b154708f447b
SHA512a769ff311df2f03c68714f5db27af8ac82898efb1c7aa88a0c74b1bc73491fd75c7b0426298e94d5fb87f85cde6c58dcbcacdbdb41d245d6f24f4e192757385d
-
Filesize
308KB
MD5d9c07efeda60ab7911698fe0adc32fdc
SHA11ad174b0e47a12c18306aa07f9702998ed6ff47d
SHA256d9bfe450b4f999547d56f73a577415658f7e74f9ffbce6dec4e5b154708f447b
SHA512a769ff311df2f03c68714f5db27af8ac82898efb1c7aa88a0c74b1bc73491fd75c7b0426298e94d5fb87f85cde6c58dcbcacdbdb41d245d6f24f4e192757385d
-
Filesize
366KB
MD5aa6de8dfea5c56c4fc4fc03b5fe8c2ea
SHA12dcb98f63da2f59bc410a101b93108fdd55d7bb7
SHA256a74b74a0f43106a663a2aaf701ff31eb4ffc1081725edb6d1d742ee822b59e15
SHA5128e202983bf843eb057c1a201d6cdd9489ea12024fdd93b79ba06ce251e2b9975898219471926b46e0ce9d51ca8b43b00c9471e03cea770d54fccb62e61c33c73
-
Filesize
366KB
MD5aa6de8dfea5c56c4fc4fc03b5fe8c2ea
SHA12dcb98f63da2f59bc410a101b93108fdd55d7bb7
SHA256a74b74a0f43106a663a2aaf701ff31eb4ffc1081725edb6d1d742ee822b59e15
SHA5128e202983bf843eb057c1a201d6cdd9489ea12024fdd93b79ba06ce251e2b9975898219471926b46e0ce9d51ca8b43b00c9471e03cea770d54fccb62e61c33c73