Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe
Resource
win10v2004-20230221-en
General
-
Target
bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe
-
Size
694KB
-
MD5
884a2a3f3396153e77705c0bff02ea06
-
SHA1
8a0fc42306e84baae05ba22bbd1ef47087d7a112
-
SHA256
bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478
-
SHA512
712f3285b9b19465f8e33591a762095aaf150f86eac811bac26fdd1c10f9c4821728ddbc9f51062c7dfb63b59b30fc450def9b30ed0331eac856991dd129f253
-
SSDEEP
12288:WMrYy90Ccm8XaCqfQO0Hc7bNudQCOlV24CvPS3zkVDJml+sq:mysDTOsQNlCOlV2ByDkl0g
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7488.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7488.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1168-191-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-192-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-194-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-196-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-198-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-200-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-202-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-204-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-206-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-208-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-210-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-212-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-214-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-216-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-218-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-220-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-222-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/1168-224-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2356 un475741.exe 4852 pro7488.exe 1168 qu4666.exe 5048 si139931.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7488.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7488.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un475741.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un475741.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 pro7488.exe 4852 pro7488.exe 1168 qu4666.exe 1168 qu4666.exe 5048 si139931.exe 5048 si139931.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4852 pro7488.exe Token: SeDebugPrivilege 1168 qu4666.exe Token: SeDebugPrivilege 5048 si139931.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2356 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 84 PID 1464 wrote to memory of 2356 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 84 PID 1464 wrote to memory of 2356 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 84 PID 2356 wrote to memory of 4852 2356 un475741.exe 85 PID 2356 wrote to memory of 4852 2356 un475741.exe 85 PID 2356 wrote to memory of 4852 2356 un475741.exe 85 PID 2356 wrote to memory of 1168 2356 un475741.exe 90 PID 2356 wrote to memory of 1168 2356 un475741.exe 90 PID 2356 wrote to memory of 1168 2356 un475741.exe 90 PID 1464 wrote to memory of 5048 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 94 PID 1464 wrote to memory of 5048 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 94 PID 1464 wrote to memory of 5048 1464 bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe"C:\Users\Admin\AppData\Local\Temp\bc4c608d2a408c7f2846dca4b476bef5fa4f9b8fd98e7b6bbb4614e5cdd60478.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un475741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un475741.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7488.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4666.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139931.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139931.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b55e98358d364388ecf0c35c65dbe575
SHA18e3a89a9e6a7b0e7477b077b92575a656e618f1e
SHA256d1f348c52283b5efe0becee8a2f8c06e183939cdebc51624a667a477c1cdf89e
SHA512e96ac90b3e2bf19c3641e9db2ed4a01e02e909e5feb062269426d63b8c367e2d81530fabc2c410c4e2da91db0e548aa2af61eceebf4a81e1878f012a5c45bf24
-
Filesize
175KB
MD5b55e98358d364388ecf0c35c65dbe575
SHA18e3a89a9e6a7b0e7477b077b92575a656e618f1e
SHA256d1f348c52283b5efe0becee8a2f8c06e183939cdebc51624a667a477c1cdf89e
SHA512e96ac90b3e2bf19c3641e9db2ed4a01e02e909e5feb062269426d63b8c367e2d81530fabc2c410c4e2da91db0e548aa2af61eceebf4a81e1878f012a5c45bf24
-
Filesize
553KB
MD5c45d3369693fd5c73c0999d402de1880
SHA1333a9c62f72ccf040069ae03c7bd7228e5888f8c
SHA256e9a0843a61cd63614067bf824243e5ae6c82d6aad813d197e4b0cf67c67efa10
SHA512faca05594f2660f1a236454af0031935eceb7718d920cb9d9eb10466ef940af585d8b69f96d49f353ab7a3836aa5ed221341fce91600fba7c0b6094d00dd46f8
-
Filesize
553KB
MD5c45d3369693fd5c73c0999d402de1880
SHA1333a9c62f72ccf040069ae03c7bd7228e5888f8c
SHA256e9a0843a61cd63614067bf824243e5ae6c82d6aad813d197e4b0cf67c67efa10
SHA512faca05594f2660f1a236454af0031935eceb7718d920cb9d9eb10466ef940af585d8b69f96d49f353ab7a3836aa5ed221341fce91600fba7c0b6094d00dd46f8
-
Filesize
308KB
MD522af177d6ba368b0b3600c4a6843e280
SHA171918ead59cc437262539f5aceee4b3e4c78ad1e
SHA25647b108171c6baf73813bc0aabf033cbc7b5e802749d521c7bd5331f31c26158c
SHA5126fb115f68c099c8e2ee05916096cdca2c423ff350830d430931107d9276b2ad412bcfe339ce24a4346920e3329dfc03c23f2bb5cb6f4dbd94e2dbb16af9def52
-
Filesize
308KB
MD522af177d6ba368b0b3600c4a6843e280
SHA171918ead59cc437262539f5aceee4b3e4c78ad1e
SHA25647b108171c6baf73813bc0aabf033cbc7b5e802749d521c7bd5331f31c26158c
SHA5126fb115f68c099c8e2ee05916096cdca2c423ff350830d430931107d9276b2ad412bcfe339ce24a4346920e3329dfc03c23f2bb5cb6f4dbd94e2dbb16af9def52
-
Filesize
366KB
MD5862f828ea7da190e9ee1a0adbaad9f2c
SHA17f87c1ad161e71637b43a85ba12cf0150af1d20a
SHA25646c3554b2ac8b5622ab6b3e5ca919a4e5e78aeb0b4e94b2fe971bfb88399b71b
SHA512dca8e9a6a34425ade27809b3831555827204bc9010537bb2179e76f821873d546ea574a868994a5cf2740f57803401409848aeb9ae6509e1688263c111788345
-
Filesize
366KB
MD5862f828ea7da190e9ee1a0adbaad9f2c
SHA17f87c1ad161e71637b43a85ba12cf0150af1d20a
SHA25646c3554b2ac8b5622ab6b3e5ca919a4e5e78aeb0b4e94b2fe971bfb88399b71b
SHA512dca8e9a6a34425ade27809b3831555827204bc9010537bb2179e76f821873d546ea574a868994a5cf2740f57803401409848aeb9ae6509e1688263c111788345