Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:15
Static task
static1
Behavioral task
behavioral1
Sample
22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe
Resource
win10v2004-20230220-en
General
-
Target
22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe
-
Size
695KB
-
MD5
c6d1c4a70e4ace7f787120ad822980f0
-
SHA1
1ff52e16e3fde81e8d1936fc97817349803ae91d
-
SHA256
22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8
-
SHA512
9587bd0b454a41a13115f6318311cbfdc79804fd1d8ab0f94f9936f214a4a55c28e75f3809b520f24d93fe728f34eafb697dcd9af5eb356753bbddead961aff3
-
SSDEEP
12288:4Mrjy90HJWmcsMZyDt40X4lumlx6ReUqRTBLZ0q22zwz1JRPKKsUJA:byuJCsMcxKlHlUReRRv2ywxrvS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9545.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9545.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3360-191-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-193-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-196-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-199-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-201-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-203-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-205-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-207-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-209-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-211-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-213-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-215-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-217-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-219-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-221-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-223-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-225-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3360-227-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3664 un368579.exe 1776 pro9545.exe 3360 qu8561.exe 444 si282371.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9545.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un368579.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un368579.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1776 pro9545.exe 1776 pro9545.exe 3360 qu8561.exe 3360 qu8561.exe 444 si282371.exe 444 si282371.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1776 pro9545.exe Token: SeDebugPrivilege 3360 qu8561.exe Token: SeDebugPrivilege 444 si282371.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3664 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 83 PID 4940 wrote to memory of 3664 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 83 PID 4940 wrote to memory of 3664 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 83 PID 3664 wrote to memory of 1776 3664 un368579.exe 84 PID 3664 wrote to memory of 1776 3664 un368579.exe 84 PID 3664 wrote to memory of 1776 3664 un368579.exe 84 PID 3664 wrote to memory of 3360 3664 un368579.exe 88 PID 3664 wrote to memory of 3360 3664 un368579.exe 88 PID 3664 wrote to memory of 3360 3664 un368579.exe 88 PID 4940 wrote to memory of 444 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 90 PID 4940 wrote to memory of 444 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 90 PID 4940 wrote to memory of 444 4940 22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe"C:\Users\Admin\AppData\Local\Temp\22067bf8197fca637c07a49844d60862fefcd32411e9ca0d47073846af816ef8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un368579.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un368579.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9545.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8561.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282371.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53ef0f702ba2cb752fb17aab9e618eaf5
SHA1a7525be62e1c7fe5096d5b89002c7fb0cc31ac72
SHA2567d9ebc500e472a5e983a8a4fea21a32b9e1e7925fd2d36e36e86917ca7285b49
SHA512184b390722e23da954bd091d7140ed57487d4e4cd01468acd63540e8b1420c2068977016f84e7e974ac8539afd78ea526c5b0d71462b69e52d37cdb8b7ca96ec
-
Filesize
175KB
MD53ef0f702ba2cb752fb17aab9e618eaf5
SHA1a7525be62e1c7fe5096d5b89002c7fb0cc31ac72
SHA2567d9ebc500e472a5e983a8a4fea21a32b9e1e7925fd2d36e36e86917ca7285b49
SHA512184b390722e23da954bd091d7140ed57487d4e4cd01468acd63540e8b1420c2068977016f84e7e974ac8539afd78ea526c5b0d71462b69e52d37cdb8b7ca96ec
-
Filesize
553KB
MD5e20f277217d2ed847ca7844d0cd4a196
SHA154215f813cef7634000169acc3a06bd1a2729557
SHA256e53f27aeae1e579f1ca4ce6b9de549d32412daec2ae2ccda9e0d9985d75b57f1
SHA51267600c34aa640d9707c5f53c0afbab4c816cceff18a36fcc49c01fac79b7bdf9513b341abbf2f7298a630e69d25e6dbbb021d95ea650b2d2c2ba1e622327b6b0
-
Filesize
553KB
MD5e20f277217d2ed847ca7844d0cd4a196
SHA154215f813cef7634000169acc3a06bd1a2729557
SHA256e53f27aeae1e579f1ca4ce6b9de549d32412daec2ae2ccda9e0d9985d75b57f1
SHA51267600c34aa640d9707c5f53c0afbab4c816cceff18a36fcc49c01fac79b7bdf9513b341abbf2f7298a630e69d25e6dbbb021d95ea650b2d2c2ba1e622327b6b0
-
Filesize
308KB
MD59a4fb595ad9af2ce7e5d526c2edf241a
SHA11ce42e5728ad758b088ff32c25f08da16799da59
SHA2567a26f5f13e32814f084316c7bc65fd08729a35814489dd87c878ab0587441cc2
SHA512c013f04b4347a9e97261bb166f81ede548329f9ec229c80bbedf6551af7d9b7b68ddf71d5d999b26bb13bc4538b2aeecf1694fb3ffe63f82c31cc3e6f10d4f25
-
Filesize
308KB
MD59a4fb595ad9af2ce7e5d526c2edf241a
SHA11ce42e5728ad758b088ff32c25f08da16799da59
SHA2567a26f5f13e32814f084316c7bc65fd08729a35814489dd87c878ab0587441cc2
SHA512c013f04b4347a9e97261bb166f81ede548329f9ec229c80bbedf6551af7d9b7b68ddf71d5d999b26bb13bc4538b2aeecf1694fb3ffe63f82c31cc3e6f10d4f25
-
Filesize
366KB
MD55412ed05ceb793adcbb1e30118c6c7cb
SHA16a2aa7d91ea9af475499162c8f4eb3da63d6f1c6
SHA25627d88f0e6764507d6c84264fce864fb3b8c2dc7929755abd90c20108574b9bb0
SHA512102dc98fe1b90d5c850f50d0ade2decc61e9e6d633a99fee99c7425f79e9c2bd1a4c63c7c9d3ddaac8a5f544aa384a3635b610586a02b854b86c7028d81a978b
-
Filesize
366KB
MD55412ed05ceb793adcbb1e30118c6c7cb
SHA16a2aa7d91ea9af475499162c8f4eb3da63d6f1c6
SHA25627d88f0e6764507d6c84264fce864fb3b8c2dc7929755abd90c20108574b9bb0
SHA512102dc98fe1b90d5c850f50d0ade2decc61e9e6d633a99fee99c7425f79e9c2bd1a4c63c7c9d3ddaac8a5f544aa384a3635b610586a02b854b86c7028d81a978b