Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe
Resource
win10v2004-20230221-en
General
-
Target
17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe
-
Size
695KB
-
MD5
05aa1bc627c2d88a474e913546a09941
-
SHA1
165d4f6f585c5f704cf8b52267be8163c8e723ef
-
SHA256
17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230
-
SHA512
ee39ab2d16b0c1a0e7c6fd5f9ed1c00949f977bc5ede45b30107959454bf247cb79746d9552f95365dec0e2b6b351ded354a4d53dac4cf925cdcf5bddf1f6ae4
-
SSDEEP
12288:JMr/y90zAUgHzDimlbJsfJ1P+IVoFMAEhjL4vPSZz1q8JLcOJI:iycAUSOmtq7qoJL4yp1Hdi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5239.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5239.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1944-195-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-196-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-198-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-200-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-202-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-204-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-206-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-208-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-210-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-212-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-214-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-216-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-218-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-220-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-222-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-224-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-226-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1944-228-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 644 un195181.exe 3464 pro5239.exe 1944 qu3645.exe 3624 si704389.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5239.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un195181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un195181.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3464 pro5239.exe 3464 pro5239.exe 1944 qu3645.exe 1944 qu3645.exe 3624 si704389.exe 3624 si704389.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3464 pro5239.exe Token: SeDebugPrivilege 1944 qu3645.exe Token: SeDebugPrivilege 3624 si704389.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 644 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 76 PID 2136 wrote to memory of 644 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 76 PID 2136 wrote to memory of 644 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 76 PID 644 wrote to memory of 3464 644 un195181.exe 77 PID 644 wrote to memory of 3464 644 un195181.exe 77 PID 644 wrote to memory of 3464 644 un195181.exe 77 PID 644 wrote to memory of 1944 644 un195181.exe 83 PID 644 wrote to memory of 1944 644 un195181.exe 83 PID 644 wrote to memory of 1944 644 un195181.exe 83 PID 2136 wrote to memory of 3624 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 84 PID 2136 wrote to memory of 3624 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 84 PID 2136 wrote to memory of 3624 2136 17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe"C:\Users\Admin\AppData\Local\Temp\17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a3a601e5953ed87da549e3dd73b03afe
SHA1482b88e735321f18bcf5d869e8f110c8952364b3
SHA25617c3fd33589ce984bbd46b42665b87dbcfff28e6065ffbf8e4c3b2e63a45fe3a
SHA51210175dc666d72fce914836bc8f28260335a15d66d77dde6bbe3b616189a301c92da8a32a0ada713bab84c63d2d173440ee56da0fc5fec9f8940aad74ddb69558
-
Filesize
175KB
MD5a3a601e5953ed87da549e3dd73b03afe
SHA1482b88e735321f18bcf5d869e8f110c8952364b3
SHA25617c3fd33589ce984bbd46b42665b87dbcfff28e6065ffbf8e4c3b2e63a45fe3a
SHA51210175dc666d72fce914836bc8f28260335a15d66d77dde6bbe3b616189a301c92da8a32a0ada713bab84c63d2d173440ee56da0fc5fec9f8940aad74ddb69558
-
Filesize
553KB
MD5eb3c8c35c5ff5b3efa5acba5d1c04a1e
SHA17e16e98c08bf84a1a990175a61fd5e871b87186a
SHA2566e68a0c9e807bea17da2bd9d2fe8b172e68bbec57fddbcf5afdefe143ce7e2ab
SHA512c11f010affcaefbb0b7785f761a0b26c63393a502b6de4d8b19586e382dcab4a59a78d07e127f8cc22d8ca4cb474754d9938cb5f884ca0cd519f0035821ede98
-
Filesize
553KB
MD5eb3c8c35c5ff5b3efa5acba5d1c04a1e
SHA17e16e98c08bf84a1a990175a61fd5e871b87186a
SHA2566e68a0c9e807bea17da2bd9d2fe8b172e68bbec57fddbcf5afdefe143ce7e2ab
SHA512c11f010affcaefbb0b7785f761a0b26c63393a502b6de4d8b19586e382dcab4a59a78d07e127f8cc22d8ca4cb474754d9938cb5f884ca0cd519f0035821ede98
-
Filesize
308KB
MD5f7a497099093f8297b74ba311ef02069
SHA1bf956c7de0ad4ca81c7d99a591590fa85142fc9e
SHA256038718067e18fc2f1cdd8671c66c9c02bc3b5d4091c431ed84733443865ff168
SHA5127a3323e2f329e45f01ffe649888c7bcca6f4eecfd3f72c15228f702cb54279b6dd793a4f59c516091187a148bd61abe5823c6e041dff5e04a047cac00e90a9d8
-
Filesize
308KB
MD5f7a497099093f8297b74ba311ef02069
SHA1bf956c7de0ad4ca81c7d99a591590fa85142fc9e
SHA256038718067e18fc2f1cdd8671c66c9c02bc3b5d4091c431ed84733443865ff168
SHA5127a3323e2f329e45f01ffe649888c7bcca6f4eecfd3f72c15228f702cb54279b6dd793a4f59c516091187a148bd61abe5823c6e041dff5e04a047cac00e90a9d8
-
Filesize
366KB
MD501f697c6515dcd5b6e3f61d889f45074
SHA1aed1657fefa61db86ab1bf3de53d204792e711e2
SHA256ee1591d87fbbe8bb9a664763aebc7a271c88cf8676c58ffdc3dace54c57e21b0
SHA5123c7375258a98e19668501e4126013575258c4ad5eedcf0dd45d48e17582161d7760d2d631906dbfc081f1da0c7ffc631bdc630f9848140ad0238a6de7a4e5c3a
-
Filesize
366KB
MD501f697c6515dcd5b6e3f61d889f45074
SHA1aed1657fefa61db86ab1bf3de53d204792e711e2
SHA256ee1591d87fbbe8bb9a664763aebc7a271c88cf8676c58ffdc3dace54c57e21b0
SHA5123c7375258a98e19668501e4126013575258c4ad5eedcf0dd45d48e17582161d7760d2d631906dbfc081f1da0c7ffc631bdc630f9848140ad0238a6de7a4e5c3a