Analysis
-
max time kernel
50s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:19
Static task
static1
Behavioral task
behavioral1
Sample
a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe
Resource
win10-20230220-en
General
-
Target
a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe
-
Size
695KB
-
MD5
17f173abc112f347be4acf072c9fe6ef
-
SHA1
774bf1d52858124c6e5e00c260d22515294ed80e
-
SHA256
a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9
-
SHA512
92ab5c9c99a58cb363afd5ffac36c874cbd359657eb2fea5c70973b6737411160bf48d7b38f40ffb3a7c9598f2842ad4a74b10a3a0bff7c4de53690b93fba44d
-
SSDEEP
12288:zMrIy90nk8zGiJ+HsBIRVW4wcBBlX2LQjR5uH+NjzJCKzuSWJeGJOtTC:zy1SGsMW410LQzueFvuZ8wUO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8775.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1820-176-0x0000000002320000-0x0000000002366000-memory.dmp family_redline behavioral1/memory/1820-177-0x0000000002510000-0x0000000002554000-memory.dmp family_redline behavioral1/memory/1820-178-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1820-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3524 un690332.exe 4280 pro8775.exe 1820 qu4696.exe 4608 si770363.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8775.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un690332.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un690332.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4280 pro8775.exe 4280 pro8775.exe 1820 qu4696.exe 1820 qu4696.exe 4608 si770363.exe 4608 si770363.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4280 pro8775.exe Token: SeDebugPrivilege 1820 qu4696.exe Token: SeDebugPrivilege 4608 si770363.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3524 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 66 PID 3648 wrote to memory of 3524 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 66 PID 3648 wrote to memory of 3524 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 66 PID 3524 wrote to memory of 4280 3524 un690332.exe 67 PID 3524 wrote to memory of 4280 3524 un690332.exe 67 PID 3524 wrote to memory of 4280 3524 un690332.exe 67 PID 3524 wrote to memory of 1820 3524 un690332.exe 68 PID 3524 wrote to memory of 1820 3524 un690332.exe 68 PID 3524 wrote to memory of 1820 3524 un690332.exe 68 PID 3648 wrote to memory of 4608 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 70 PID 3648 wrote to memory of 4608 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 70 PID 3648 wrote to memory of 4608 3648 a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe"C:\Users\Admin\AppData\Local\Temp\a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52121ed4ba79952eac13aa0fe75e37b8e
SHA19b2e17056f7ade0d85a2dc767351c428ddda13d7
SHA25638f4e32b4eadfd256dbf72b736df7b86aacc770f80942321594afbd61d125d72
SHA512de72bfb03e888b7e065c51ebf1b8e1cd952294ac8e71f52a8895805d0e9998fdff7ce719d9b12c5affbdbad52f515f9c9f414832d893336e28807d473dc0e18b
-
Filesize
175KB
MD52121ed4ba79952eac13aa0fe75e37b8e
SHA19b2e17056f7ade0d85a2dc767351c428ddda13d7
SHA25638f4e32b4eadfd256dbf72b736df7b86aacc770f80942321594afbd61d125d72
SHA512de72bfb03e888b7e065c51ebf1b8e1cd952294ac8e71f52a8895805d0e9998fdff7ce719d9b12c5affbdbad52f515f9c9f414832d893336e28807d473dc0e18b
-
Filesize
553KB
MD57a4bba636bdd0b4c5d7242ff6f160719
SHA16fff9a74d577d430914f4001de5391866c173bb0
SHA25613d5b1d51fc3423233f7b1d52e119069f0f3f093feb7e6f3dc39bd8960f5712d
SHA5120ff6aeeb27b38fc78cd79c6dd4ded487aa78f267c03fa08e4c0de1768e683f337c3f7080f450dcd6c237a8e553e5c85a93f60e0e794bc8d232663db95092ce2b
-
Filesize
553KB
MD57a4bba636bdd0b4c5d7242ff6f160719
SHA16fff9a74d577d430914f4001de5391866c173bb0
SHA25613d5b1d51fc3423233f7b1d52e119069f0f3f093feb7e6f3dc39bd8960f5712d
SHA5120ff6aeeb27b38fc78cd79c6dd4ded487aa78f267c03fa08e4c0de1768e683f337c3f7080f450dcd6c237a8e553e5c85a93f60e0e794bc8d232663db95092ce2b
-
Filesize
308KB
MD519d2b326aa4ce88497c7856a5eee76f4
SHA11d1b28cdf953c9861f1c0ee3ff0ec490838d9dc5
SHA256c8c69897a3b2d75a2096d8d78f3dedaeba9acf713da27447cb8bf53d44c7aeae
SHA512e479c4afa100a54ae6f7a1bbdea095b1d0ed9d5f3680594690e145ee64755d854c8a3ce1515d5bb6ec0a0ab1a2f832b20407a7985c4aa91d67431c8474361c78
-
Filesize
308KB
MD519d2b326aa4ce88497c7856a5eee76f4
SHA11d1b28cdf953c9861f1c0ee3ff0ec490838d9dc5
SHA256c8c69897a3b2d75a2096d8d78f3dedaeba9acf713da27447cb8bf53d44c7aeae
SHA512e479c4afa100a54ae6f7a1bbdea095b1d0ed9d5f3680594690e145ee64755d854c8a3ce1515d5bb6ec0a0ab1a2f832b20407a7985c4aa91d67431c8474361c78
-
Filesize
366KB
MD57e879c9601b45315139a7342b6ab8ad8
SHA1fcf76ebdd4fe59de566f6fe4206419fcd29bdd8c
SHA256e30984d711b9ca785bae36d8179c20583fd640b1da4b9c23edc62b15cf0eab94
SHA51212851e1c9ac1eed058e6c069dd5e3010f87ea595d991dc75e11857ce71311149f4db6f8a657422941a7430cde5145e58d39dce4a6db1498e997d55a1225387cd
-
Filesize
366KB
MD57e879c9601b45315139a7342b6ab8ad8
SHA1fcf76ebdd4fe59de566f6fe4206419fcd29bdd8c
SHA256e30984d711b9ca785bae36d8179c20583fd640b1da4b9c23edc62b15cf0eab94
SHA51212851e1c9ac1eed058e6c069dd5e3010f87ea595d991dc75e11857ce71311149f4db6f8a657422941a7430cde5145e58d39dce4a6db1498e997d55a1225387cd