Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe
Resource
win10-20230220-en
General
-
Target
555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe
-
Size
695KB
-
MD5
3d5612e4356e411b1e90db0a6652b59f
-
SHA1
4db7a71d3559e9bea144beacbf30ce4ce87bface
-
SHA256
555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53
-
SHA512
e9c4206a460dccd8c09b48073ab4f66521aba83bc956644cac63230704155ffbe479d415b6a532cc298d0df4fdfabeb1150deeb443c0b59e5c72199cc08355ef
-
SSDEEP
12288:0Mriy90u2tV7CQ4AFVtEhLjkC8ezQvPSuHLtaJKnKlaoxSNEg1:2y8d58QyoLoAoxSNEg1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8267.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8267.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8267.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8267.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8267.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4876-176-0x0000000002730000-0x0000000002776000-memory.dmp family_redline behavioral1/memory/4876-179-0x0000000004CE0000-0x0000000004D24000-memory.dmp family_redline behavioral1/memory/4876-181-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-182-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-184-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-186-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-188-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/4876-1098-0x0000000004E80000-0x0000000004E90000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2512 un762686.exe 4960 pro8267.exe 4876 qu2347.exe 4984 si562368.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8267.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8267.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un762686.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un762686.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4960 pro8267.exe 4960 pro8267.exe 4876 qu2347.exe 4876 qu2347.exe 4984 si562368.exe 4984 si562368.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4960 pro8267.exe Token: SeDebugPrivilege 4876 qu2347.exe Token: SeDebugPrivilege 4984 si562368.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2512 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 66 PID 4140 wrote to memory of 2512 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 66 PID 4140 wrote to memory of 2512 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 66 PID 2512 wrote to memory of 4960 2512 un762686.exe 67 PID 2512 wrote to memory of 4960 2512 un762686.exe 67 PID 2512 wrote to memory of 4960 2512 un762686.exe 67 PID 2512 wrote to memory of 4876 2512 un762686.exe 68 PID 2512 wrote to memory of 4876 2512 un762686.exe 68 PID 2512 wrote to memory of 4876 2512 un762686.exe 68 PID 4140 wrote to memory of 4984 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 70 PID 4140 wrote to memory of 4984 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 70 PID 4140 wrote to memory of 4984 4140 555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe"C:\Users\Admin\AppData\Local\Temp\555a2280e828351a8bc6658eb596cba82fca7b384a4399cc0db438eea3926a53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762686.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762686.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8267.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8267.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2347.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si562368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si562368.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD507f2cfe0e3192c6bceed602bf9d5d784
SHA18f3a9a18cc43c10af73844903299270fe601fb2c
SHA2562785d7c27252e0bf0f2e4fa213de89b42389500420fcd370d3418bfa2da8aa64
SHA512e29fc14a668f76f406b1c4ad3d1f1f3064d9917a9590d1130297d590299b82f931d8a6c34c127fa70350ac21713f5e53da1fb3a9ce3703b97c10eff19685ab3a
-
Filesize
175KB
MD507f2cfe0e3192c6bceed602bf9d5d784
SHA18f3a9a18cc43c10af73844903299270fe601fb2c
SHA2562785d7c27252e0bf0f2e4fa213de89b42389500420fcd370d3418bfa2da8aa64
SHA512e29fc14a668f76f406b1c4ad3d1f1f3064d9917a9590d1130297d590299b82f931d8a6c34c127fa70350ac21713f5e53da1fb3a9ce3703b97c10eff19685ab3a
-
Filesize
553KB
MD5512308f38ba9c04277b9eee65ae8e67c
SHA12535fe1e27e6fa4b280352dd120f387c18ed8c38
SHA256c9cabb41c60f04cef6ded5df2373ecbfca70fc7eea043ddcbdf85f91f11153d7
SHA512b4571ed4002dc8683e87e961b3494590351c115004e6bc37e2296d06d8bdcbe9fde24ec6f7de66fa91774b1b1747cf4838d2ab34e7cff9ba52d3bc690ed1f1ab
-
Filesize
553KB
MD5512308f38ba9c04277b9eee65ae8e67c
SHA12535fe1e27e6fa4b280352dd120f387c18ed8c38
SHA256c9cabb41c60f04cef6ded5df2373ecbfca70fc7eea043ddcbdf85f91f11153d7
SHA512b4571ed4002dc8683e87e961b3494590351c115004e6bc37e2296d06d8bdcbe9fde24ec6f7de66fa91774b1b1747cf4838d2ab34e7cff9ba52d3bc690ed1f1ab
-
Filesize
308KB
MD56e544227063993ce59f2b53b4e0d94c6
SHA15bf7712d4bba6aa7dd080b2f7c33a4bba9cd8e45
SHA25698af2a436a9fe69d97f3d1e789a8d1fee267e71159529f11250ac41ce2ec965c
SHA5126e8c28a6e402f5e8dc50fab4f4c73e2d1bb7719ffe0a6595782588b3f82f69643442a604a788dd7cd0668f339065ce82f14268cdb9ed4883eb41d434ed024591
-
Filesize
308KB
MD56e544227063993ce59f2b53b4e0d94c6
SHA15bf7712d4bba6aa7dd080b2f7c33a4bba9cd8e45
SHA25698af2a436a9fe69d97f3d1e789a8d1fee267e71159529f11250ac41ce2ec965c
SHA5126e8c28a6e402f5e8dc50fab4f4c73e2d1bb7719ffe0a6595782588b3f82f69643442a604a788dd7cd0668f339065ce82f14268cdb9ed4883eb41d434ed024591
-
Filesize
366KB
MD526de1266a6550451489d4366deecd0cc
SHA1b07c4199cc6bd74593d1e6537660ad94d91ed254
SHA256001a4bd1bdc6d4a1d502f09b53a25d4e79c930c6e9be99f121c77e19e2f0bd36
SHA51225d6df06fa864c0a43bf4926b8acd377130874b3f1a684033c41197f9f661b1198d4c1d47b6ddcb95d41e320d52878379b980ba46b4825ef29e20c1334d4ef4d
-
Filesize
366KB
MD526de1266a6550451489d4366deecd0cc
SHA1b07c4199cc6bd74593d1e6537660ad94d91ed254
SHA256001a4bd1bdc6d4a1d502f09b53a25d4e79c930c6e9be99f121c77e19e2f0bd36
SHA51225d6df06fa864c0a43bf4926b8acd377130874b3f1a684033c41197f9f661b1198d4c1d47b6ddcb95d41e320d52878379b980ba46b4825ef29e20c1334d4ef4d