Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe
Resource
win10v2004-20230220-en
General
-
Target
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe
-
Size
695KB
-
MD5
96dec57731dcc86ab9cc353074df62f1
-
SHA1
18773b26c02156677849d9b1e436da18dd4fc421
-
SHA256
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d
-
SHA512
207d7ef1602422531a5b1a0ff8e3373cd4843fa6102eb0204f3f563ed38bb63bb6ddbed91fff3219a028cb67a729eb8773bc5a4f7043b908dbf53b16dadd21ea
-
SSDEEP
12288:AMrIy90vwSSkDUKGJBZ5/8LCwe/J+lBUzrW8J2w2uY:YyGwD13Z5/aCwegf8rZgX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7208.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7208.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/100-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/100-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4440 un033793.exe 1896 pro7208.exe 100 qu7210.exe 2816 si513844.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7208.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un033793.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un033793.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1896 pro7208.exe 1896 pro7208.exe 100 qu7210.exe 100 qu7210.exe 2816 si513844.exe 2816 si513844.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1896 pro7208.exe Token: SeDebugPrivilege 100 qu7210.exe Token: SeDebugPrivilege 2816 si513844.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4440 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 81 PID 4340 wrote to memory of 4440 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 81 PID 4340 wrote to memory of 4440 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 81 PID 4440 wrote to memory of 1896 4440 un033793.exe 82 PID 4440 wrote to memory of 1896 4440 un033793.exe 82 PID 4440 wrote to memory of 1896 4440 un033793.exe 82 PID 4440 wrote to memory of 100 4440 un033793.exe 85 PID 4440 wrote to memory of 100 4440 un033793.exe 85 PID 4440 wrote to memory of 100 4440 un033793.exe 85 PID 4340 wrote to memory of 2816 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 86 PID 4340 wrote to memory of 2816 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 86 PID 4340 wrote to memory of 2816 4340 7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe"C:\Users\Admin\AppData\Local\Temp\7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5551552fd5d8bcbe26db102a1861a3de3
SHA1f6f501fa803d580e0a38cb5df19313403dbdb8e1
SHA256ef770ee0b6483bb0b17b343edd93c1a9f10278c4b6dd09d674d1921a8102a230
SHA51268296301ad410f46b1677f0bc896dd3b8ba44999150d7c8e33cb9b4a10a36a01f0caced78a0b6163f4a91341152b6c52d8221432c0dfc4c5e97b813113c29a69
-
Filesize
175KB
MD5551552fd5d8bcbe26db102a1861a3de3
SHA1f6f501fa803d580e0a38cb5df19313403dbdb8e1
SHA256ef770ee0b6483bb0b17b343edd93c1a9f10278c4b6dd09d674d1921a8102a230
SHA51268296301ad410f46b1677f0bc896dd3b8ba44999150d7c8e33cb9b4a10a36a01f0caced78a0b6163f4a91341152b6c52d8221432c0dfc4c5e97b813113c29a69
-
Filesize
553KB
MD53a7ac254fe6db34e92b9bac00edd295a
SHA131bfe758bf980ab8ebfa63d065ee5e93c2c1109c
SHA256253de328577a9c9cfea24012bd29afbda0dc5fe6a29b2e445a0ccfb7208138e3
SHA5127c3e0432114a780269c2e939fbfc78ce7e76fd7c322e8ec80ba5705d64c55a6faf35d503619d7c3bd9d6e0cf74cc745737a0f3749f1cbc54cf9a38a355b2e185
-
Filesize
553KB
MD53a7ac254fe6db34e92b9bac00edd295a
SHA131bfe758bf980ab8ebfa63d065ee5e93c2c1109c
SHA256253de328577a9c9cfea24012bd29afbda0dc5fe6a29b2e445a0ccfb7208138e3
SHA5127c3e0432114a780269c2e939fbfc78ce7e76fd7c322e8ec80ba5705d64c55a6faf35d503619d7c3bd9d6e0cf74cc745737a0f3749f1cbc54cf9a38a355b2e185
-
Filesize
308KB
MD55234b9e5ce3d72f3a1ae11757ab5ed5a
SHA16f47b9cd4ce795f972d5b6f187d696778724aff7
SHA256c25976457fa9f50dac750df61cae11a8c70c14ba7c17f8814b8f718c2d186611
SHA512866b3f0d3b7aff360a1437a79633563b4dac32fd63bbd79e5a6053f79278aa4370f963aec8bb9ef770e08abd75df56c0c11920dc3bcd10cc9091a62f6ceaa206
-
Filesize
308KB
MD55234b9e5ce3d72f3a1ae11757ab5ed5a
SHA16f47b9cd4ce795f972d5b6f187d696778724aff7
SHA256c25976457fa9f50dac750df61cae11a8c70c14ba7c17f8814b8f718c2d186611
SHA512866b3f0d3b7aff360a1437a79633563b4dac32fd63bbd79e5a6053f79278aa4370f963aec8bb9ef770e08abd75df56c0c11920dc3bcd10cc9091a62f6ceaa206
-
Filesize
366KB
MD59b48f5d4cfa401924a26cd5ed37f2972
SHA1b1a6fd39d2edd27700e5c5eeaae51a1544160cf0
SHA2566ff05f657d83993082745bdd4b02ac3fce6c91810ef17a8bb8941e367098a1aa
SHA51295c452c5c298c0dc97d7fb7196c2c6ad176d19410ede5bea548d42b1babad603ddc67b84dc41b0c04f0c2e996dd3b5a32f668a3bff464b4412f2aeb6dc94e9e1
-
Filesize
366KB
MD59b48f5d4cfa401924a26cd5ed37f2972
SHA1b1a6fd39d2edd27700e5c5eeaae51a1544160cf0
SHA2566ff05f657d83993082745bdd4b02ac3fce6c91810ef17a8bb8941e367098a1aa
SHA51295c452c5c298c0dc97d7fb7196c2c6ad176d19410ede5bea548d42b1babad603ddc67b84dc41b0c04f0c2e996dd3b5a32f668a3bff464b4412f2aeb6dc94e9e1