Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:14
Static task
static1
Behavioral task
behavioral1
Sample
30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe
Resource
win10-20230220-en
General
-
Target
30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe
-
Size
696KB
-
MD5
94a6d42b3bb02191d72f19c586b1b372
-
SHA1
939f85959f1f7bcfd1e90dcb28f781efd617a127
-
SHA256
30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61
-
SHA512
cd70b1eb6b4cd1622da5a005a292b2448de3349c24b657eb5f1a17af162d2e48124318d8289738244ea83d1d277792eee564fada71c24e02c93852df5af3f8e9
-
SSDEEP
12288:CMrSy90YvCqIrdppLwDkHDtwATG0oTjVANyV82dERfjzxPwJEcKA6ktlvFQwAhEz:oy5xsdpp8DSxlBiVAoVbuRfPxo7tldfz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1567.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4736-177-0x0000000002330000-0x0000000002376000-memory.dmp family_redline behavioral1/memory/4736-178-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/4736-179-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-180-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-182-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-184-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-186-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-188-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-190-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-192-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-194-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-196-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-198-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-200-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-202-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-204-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-206-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-208-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-210-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-212-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4736-216-0x0000000002510000-0x0000000002520000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3652 un984916.exe 4608 pro1567.exe 4736 qu9336.exe 3016 si169670.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1567.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un984916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un984916.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 pro1567.exe 4608 pro1567.exe 4736 qu9336.exe 4736 qu9336.exe 3016 si169670.exe 3016 si169670.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4608 pro1567.exe Token: SeDebugPrivilege 4736 qu9336.exe Token: SeDebugPrivilege 3016 si169670.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 420 wrote to memory of 3652 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 66 PID 420 wrote to memory of 3652 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 66 PID 420 wrote to memory of 3652 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 66 PID 3652 wrote to memory of 4608 3652 un984916.exe 67 PID 3652 wrote to memory of 4608 3652 un984916.exe 67 PID 3652 wrote to memory of 4608 3652 un984916.exe 67 PID 3652 wrote to memory of 4736 3652 un984916.exe 68 PID 3652 wrote to memory of 4736 3652 un984916.exe 68 PID 3652 wrote to memory of 4736 3652 un984916.exe 68 PID 420 wrote to memory of 3016 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 70 PID 420 wrote to memory of 3016 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 70 PID 420 wrote to memory of 3016 420 30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe"C:\Users\Admin\AppData\Local\Temp\30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f0b1723f91bab8a95007aa6a3690e1dd
SHA172a9025f84df9dc5fe5e258d36e48640ba489db3
SHA256bf43c785204c43f892f0fd2c9646bcbaa2f91037e0cbc7da6dbc372cf11ea810
SHA512e16f4d7821a325e38c3e7dec212614830ddf82cdf3b63a1486d1cc0af777149fa9e466b6bd1baa4c743b1f82218340afb5ff86b50873ce8964ebb17cf6f89ad4
-
Filesize
175KB
MD5f0b1723f91bab8a95007aa6a3690e1dd
SHA172a9025f84df9dc5fe5e258d36e48640ba489db3
SHA256bf43c785204c43f892f0fd2c9646bcbaa2f91037e0cbc7da6dbc372cf11ea810
SHA512e16f4d7821a325e38c3e7dec212614830ddf82cdf3b63a1486d1cc0af777149fa9e466b6bd1baa4c743b1f82218340afb5ff86b50873ce8964ebb17cf6f89ad4
-
Filesize
553KB
MD545215a13d0ffc4d6ac5c79ffeb084a33
SHA1c6c275e7c055e8084815cf9835775354c3a9345e
SHA2567ec5aec69af94b8912bfed74ab742923741e68dfce72421e0c3f416a0371cfc1
SHA512965a6cc6043a6e4a36714eb962ff9306ae411f00f14d288721794fc75767712cffaf14509176f705aa61f4fe76f201f11d7b0cc75ac407430c3e29eb10e52d44
-
Filesize
553KB
MD545215a13d0ffc4d6ac5c79ffeb084a33
SHA1c6c275e7c055e8084815cf9835775354c3a9345e
SHA2567ec5aec69af94b8912bfed74ab742923741e68dfce72421e0c3f416a0371cfc1
SHA512965a6cc6043a6e4a36714eb962ff9306ae411f00f14d288721794fc75767712cffaf14509176f705aa61f4fe76f201f11d7b0cc75ac407430c3e29eb10e52d44
-
Filesize
308KB
MD52aba70b792aca5a4e6f5f14a5bd54c85
SHA1a250b8a343b58236cf7cbdd640b0ea6d5e4791e9
SHA256033e6d84b2da7a59b523a3fb88011656b9cdc65688a0e4e4e47afb3153fc4718
SHA5126a727ec8996ad3aa2fd5c7a0c71245b0f5111d6cfc1d2f573a66406db7098db4df6bb5d0f936d6532d1b5d59a452b9fd8ad2f9aafa138a0b1be1f5942908c2c8
-
Filesize
308KB
MD52aba70b792aca5a4e6f5f14a5bd54c85
SHA1a250b8a343b58236cf7cbdd640b0ea6d5e4791e9
SHA256033e6d84b2da7a59b523a3fb88011656b9cdc65688a0e4e4e47afb3153fc4718
SHA5126a727ec8996ad3aa2fd5c7a0c71245b0f5111d6cfc1d2f573a66406db7098db4df6bb5d0f936d6532d1b5d59a452b9fd8ad2f9aafa138a0b1be1f5942908c2c8
-
Filesize
366KB
MD587695336e806ddd0b76a3a2e68a26eda
SHA10117a48402990ab0ec77267ae57b23dd528ad64c
SHA2569e5375dca7cf5b52c060a9a8627c0f0fbdf6b49949a4198e2814744f4b54db17
SHA51225c505fa862b283943d1c6926295e19363ad120235d53f884d3430fc691d2b674c28cf6c6edf68a371a8165d2fd832949eaa08357017e27e580f2555b95fc46e
-
Filesize
366KB
MD587695336e806ddd0b76a3a2e68a26eda
SHA10117a48402990ab0ec77267ae57b23dd528ad64c
SHA2569e5375dca7cf5b52c060a9a8627c0f0fbdf6b49949a4198e2814744f4b54db17
SHA51225c505fa862b283943d1c6926295e19363ad120235d53f884d3430fc691d2b674c28cf6c6edf68a371a8165d2fd832949eaa08357017e27e580f2555b95fc46e