Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe
Resource
win10v2004-20230220-en
General
-
Target
00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe
-
Size
696KB
-
MD5
f95d30d0acd281b956855a5788610c34
-
SHA1
f97ed256b1a23d6c876c1ff04dda7fd80c652c6c
-
SHA256
00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca
-
SHA512
51ce06774583888140ea5cd233774eb1adb9f3de3bb11ad680195c6b7c115ff24268ff406ed025a2924aebcd276aacf145f419ad367c88be9dd756926cf7b861
-
SSDEEP
12288:zMr7y90waZhKGgle/A1lEEBWjJybrUYzJYCTuPl/KL3+GfAuz1omJxq9Z0tm6E:UyhKgWm3Kyl9Tel/2uGZ1Tub0w6E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8670.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4956-191-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-192-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-194-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-196-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-198-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-202-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-200-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-204-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-206-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-208-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-210-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-212-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-214-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-216-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-218-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-225-0x0000000002460000-0x0000000002470000-memory.dmp family_redline behavioral1/memory/4956-226-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-222-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-228-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/4956-1110-0x0000000002460000-0x0000000002470000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1252 un184789.exe 1464 pro8670.exe 4956 qu8904.exe 1364 si966189.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8670.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un184789.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un184789.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2452 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1464 pro8670.exe 1464 pro8670.exe 4956 qu8904.exe 4956 qu8904.exe 1364 si966189.exe 1364 si966189.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1464 pro8670.exe Token: SeDebugPrivilege 4956 qu8904.exe Token: SeDebugPrivilege 1364 si966189.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4896 wrote to memory of 1252 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 85 PID 4896 wrote to memory of 1252 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 85 PID 4896 wrote to memory of 1252 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 85 PID 1252 wrote to memory of 1464 1252 un184789.exe 86 PID 1252 wrote to memory of 1464 1252 un184789.exe 86 PID 1252 wrote to memory of 1464 1252 un184789.exe 86 PID 1252 wrote to memory of 4956 1252 un184789.exe 92 PID 1252 wrote to memory of 4956 1252 un184789.exe 92 PID 1252 wrote to memory of 4956 1252 un184789.exe 92 PID 4896 wrote to memory of 1364 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 93 PID 4896 wrote to memory of 1364 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 93 PID 4896 wrote to memory of 1364 4896 00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe"C:\Users\Admin\AppData\Local\Temp\00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cf0cbd4eea20969a0140ef6bb39dd87b
SHA1706c428fc2cea94f6e570b14dbe4c378981e523e
SHA256deb31766536038dbc32ebd1dcc9ed8ae9f8c00218c2eea897af5a9ee3207977b
SHA5122ad4ecf1ff07dc5f090e9a40d91fc1f759bb5e098b567e75704e1adfcfcd7ddab95f019834a00f1dec0fc47773bd56a2e84332a71f553366ee6aa5b74b5359e7
-
Filesize
175KB
MD5cf0cbd4eea20969a0140ef6bb39dd87b
SHA1706c428fc2cea94f6e570b14dbe4c378981e523e
SHA256deb31766536038dbc32ebd1dcc9ed8ae9f8c00218c2eea897af5a9ee3207977b
SHA5122ad4ecf1ff07dc5f090e9a40d91fc1f759bb5e098b567e75704e1adfcfcd7ddab95f019834a00f1dec0fc47773bd56a2e84332a71f553366ee6aa5b74b5359e7
-
Filesize
553KB
MD58695e55a2bc279ba96f9bead7826040a
SHA169ab81ab2cd8dd81b469446d5c817f42d9150331
SHA256010c48feb7e40f2a9547015605f54b232c2d1805ce71d019bb9551a7c363c069
SHA512601ea6c1237cc547a4ac6c41c12ad6992d08aa83f9c29f372e157b5a8e44d5f7e870e046e01eb0c4a16f9cec711ebc8b717d63ced15eb4cb1633104095c233eb
-
Filesize
553KB
MD58695e55a2bc279ba96f9bead7826040a
SHA169ab81ab2cd8dd81b469446d5c817f42d9150331
SHA256010c48feb7e40f2a9547015605f54b232c2d1805ce71d019bb9551a7c363c069
SHA512601ea6c1237cc547a4ac6c41c12ad6992d08aa83f9c29f372e157b5a8e44d5f7e870e046e01eb0c4a16f9cec711ebc8b717d63ced15eb4cb1633104095c233eb
-
Filesize
308KB
MD5c90c705301766c663364c86059d3a51c
SHA17832622d320f6751b17661d859036fbca753c57c
SHA256ac11255c411555f89a12bc10af5dde0aed22663cd6477da244f80f7cb284e066
SHA5128a3bc009edbfe85145011290a177ea1c228048162b61e01d3038604fc9d25ae1259426ed12ba4203908fb4329b77703a62593ea425264d66e84be2abec96006d
-
Filesize
308KB
MD5c90c705301766c663364c86059d3a51c
SHA17832622d320f6751b17661d859036fbca753c57c
SHA256ac11255c411555f89a12bc10af5dde0aed22663cd6477da244f80f7cb284e066
SHA5128a3bc009edbfe85145011290a177ea1c228048162b61e01d3038604fc9d25ae1259426ed12ba4203908fb4329b77703a62593ea425264d66e84be2abec96006d
-
Filesize
366KB
MD50634d20c6b41b1e60479729f91609956
SHA1776a29e9b18586a0b7fc21971d3249b74c67b61a
SHA256466cf1e52c4480d4d9b804c99367cdffae8c1dc9cb6526f72418c7837f4f62b1
SHA512f43f03608ba548cf3c3a83c12ab5f7f3b61c76d4ef9f1ca32dfd556ecc755d3f0e7618e7564f98bafe5d659c3197b7fe8fb210a23748c04387edd98b684d79a9
-
Filesize
366KB
MD50634d20c6b41b1e60479729f91609956
SHA1776a29e9b18586a0b7fc21971d3249b74c67b61a
SHA256466cf1e52c4480d4d9b804c99367cdffae8c1dc9cb6526f72418c7837f4f62b1
SHA512f43f03608ba548cf3c3a83c12ab5f7f3b61c76d4ef9f1ca32dfd556ecc755d3f0e7618e7564f98bafe5d659c3197b7fe8fb210a23748c04387edd98b684d79a9