Analysis
-
max time kernel
50s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:18
Static task
static1
Behavioral task
behavioral1
Sample
bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe
Resource
win10-20230220-en
General
-
Target
bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe
-
Size
695KB
-
MD5
748c744146cc89baf8ef8fd9191aa02a
-
SHA1
7b0cb3cf9c91119c8c838b5cb352e31dec75f0fd
-
SHA256
bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637
-
SHA512
cf6784b536a01d8c071e7e6608a6eaff5c9233c53e411f3a930f327cb20a6bad14aef78d1c901968a1a5290382e65a879ea98de2580983f10f372dbac8a7b468
-
SSDEEP
12288:UMrNy90287RN5FphxgVnGmbW8W1LRzhaZHBovTeSnz3M5vPS1zxCnJ0plmR2r/pv:pyx8v/pclWzkZqvTe8z3M5y1xYmppLb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2384.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3088-179-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/3088-180-0x0000000002840000-0x0000000002884000-memory.dmp family_redline behavioral1/memory/3088-181-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-182-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-184-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-186-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-188-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-190-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-192-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-194-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-196-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-203-0x0000000000950000-0x0000000000960000-memory.dmp family_redline behavioral1/memory/3088-204-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-200-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-206-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-208-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-210-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-212-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-214-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-216-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/3088-218-0x0000000002840000-0x000000000287F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2344 un108755.exe 2440 pro2384.exe 3088 qu3858.exe 4252 si498186.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2384.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un108755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un108755.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2440 pro2384.exe 2440 pro2384.exe 3088 qu3858.exe 3088 qu3858.exe 4252 si498186.exe 4252 si498186.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2440 pro2384.exe Token: SeDebugPrivilege 3088 qu3858.exe Token: SeDebugPrivilege 4252 si498186.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2344 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 66 PID 2064 wrote to memory of 2344 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 66 PID 2064 wrote to memory of 2344 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 66 PID 2344 wrote to memory of 2440 2344 un108755.exe 67 PID 2344 wrote to memory of 2440 2344 un108755.exe 67 PID 2344 wrote to memory of 2440 2344 un108755.exe 67 PID 2344 wrote to memory of 3088 2344 un108755.exe 68 PID 2344 wrote to memory of 3088 2344 un108755.exe 68 PID 2344 wrote to memory of 3088 2344 un108755.exe 68 PID 2064 wrote to memory of 4252 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 70 PID 2064 wrote to memory of 4252 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 70 PID 2064 wrote to memory of 4252 2064 bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe"C:\Users\Admin\AppData\Local\Temp\bf6cc72a1e7cbcdb27b467b8537d161fac6d7ea5ae55636d6a16943366b70637.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108755.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2384.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2384.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3858.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si498186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si498186.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53ccc9217282b3a6018255d9088a22bee
SHA115285860f944b095738ece3b9b488fa77eface3b
SHA256e7b3fbc87c8ef806c366fa1bda4060cbd4087d0a0539da376588ebfea3fd7b6c
SHA512b27fa8e877ea33c4a1c92e3ab8f4cf099ac6868d1678cfb3eae6190d82be68e9776da301f78f30efefc62ffa771a36f61c261ca9f21402b664bbdb6a50663cd3
-
Filesize
175KB
MD53ccc9217282b3a6018255d9088a22bee
SHA115285860f944b095738ece3b9b488fa77eface3b
SHA256e7b3fbc87c8ef806c366fa1bda4060cbd4087d0a0539da376588ebfea3fd7b6c
SHA512b27fa8e877ea33c4a1c92e3ab8f4cf099ac6868d1678cfb3eae6190d82be68e9776da301f78f30efefc62ffa771a36f61c261ca9f21402b664bbdb6a50663cd3
-
Filesize
553KB
MD5bf2f59094d1fc2944e3423b89b14af77
SHA10d4306f4d4134daec069b70e08ce7f8db47f49e7
SHA25649fa7ac91c1429d840941af8801611622d1d408d155a2ff7fb52e2e6420e4534
SHA5124afd09a8b93fc4933c1d9fdf2fa71d3f6f664b1e07310779c680964e696da392b49f8c36fa87676e272e484af63e7ffc342d3e7e13bf4cca1f6c62d7e60f6abd
-
Filesize
553KB
MD5bf2f59094d1fc2944e3423b89b14af77
SHA10d4306f4d4134daec069b70e08ce7f8db47f49e7
SHA25649fa7ac91c1429d840941af8801611622d1d408d155a2ff7fb52e2e6420e4534
SHA5124afd09a8b93fc4933c1d9fdf2fa71d3f6f664b1e07310779c680964e696da392b49f8c36fa87676e272e484af63e7ffc342d3e7e13bf4cca1f6c62d7e60f6abd
-
Filesize
308KB
MD5ad6c9c40a1e6502f20cd847372e1f7df
SHA169f254cb39455418ff28a798a1b2036c5e505bf4
SHA256da94b5c21ad1e5eeb08928ec4c8cdc1b115b749df58ccec31fdd1486e152f281
SHA512d6a4de98ec07eaaf1135466242cc48e0fa023c7b731891bd6dee13eedc3f486667f7925018e9e3fb2c40ef170668f406d6c84625f995563c08610152eb7dfef0
-
Filesize
308KB
MD5ad6c9c40a1e6502f20cd847372e1f7df
SHA169f254cb39455418ff28a798a1b2036c5e505bf4
SHA256da94b5c21ad1e5eeb08928ec4c8cdc1b115b749df58ccec31fdd1486e152f281
SHA512d6a4de98ec07eaaf1135466242cc48e0fa023c7b731891bd6dee13eedc3f486667f7925018e9e3fb2c40ef170668f406d6c84625f995563c08610152eb7dfef0
-
Filesize
366KB
MD5655c47980b697e2fee1de4065c5db986
SHA1e5245cc8ca3cd45a72b99afc3f426d0181406f08
SHA25652074323c3a94a890583dc036a2314124a88117d923a8735c7ff0bf3cc6d8cff
SHA51275f5ca14a95a59700d2dd0e63433eac905b4a501a7e4ca3bda0e6aab307a76081e50ac154669d6a69fc8b1a6d7b5fc27c6c6470b42205b5a1c7f024258bff057
-
Filesize
366KB
MD5655c47980b697e2fee1de4065c5db986
SHA1e5245cc8ca3cd45a72b99afc3f426d0181406f08
SHA25652074323c3a94a890583dc036a2314124a88117d923a8735c7ff0bf3cc6d8cff
SHA51275f5ca14a95a59700d2dd0e63433eac905b4a501a7e4ca3bda0e6aab307a76081e50ac154669d6a69fc8b1a6d7b5fc27c6c6470b42205b5a1c7f024258bff057