Analysis
-
max time kernel
96s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe
Resource
win10v2004-20230220-en
General
-
Target
3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe
-
Size
696KB
-
MD5
27982d80d5501a3c29a46db3eaccbcf2
-
SHA1
33f7383aa14d73fd01bb248c0e211464b342b068
-
SHA256
3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8
-
SHA512
871c8ebcdd1d1d42edf8797dde02a18566ccc93acfaf9dd885b339a1027b0a0683fdf4d87093d6aacec197c7f9d570f02f085c4de6c67a934bf2a737bb62c30d
-
SSDEEP
12288:dMrXy90qUgC3Yt42SFBDAm811yfPnrMv7OdyfIskXz9fYJ3FKQJDRkab:qyCgz/SdfPnov7OdyQsC9wTlRke
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9053.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9053.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2264-191-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-192-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-194-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-196-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-198-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-200-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-202-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-204-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-206-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-208-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-210-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-212-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-214-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-216-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-218-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-225-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-228-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-227-0x0000000002390000-0x00000000023A0000-memory.dmp family_redline behavioral1/memory/2264-221-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2264-1107-0x0000000002390000-0x00000000023A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1136 un130099.exe 4832 pro9053.exe 2264 qu9719.exe 3964 si662761.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9053.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un130099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un130099.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4832 pro9053.exe 4832 pro9053.exe 2264 qu9719.exe 2264 qu9719.exe 3964 si662761.exe 3964 si662761.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4832 pro9053.exe Token: SeDebugPrivilege 2264 qu9719.exe Token: SeDebugPrivilege 3964 si662761.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1136 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 83 PID 4616 wrote to memory of 1136 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 83 PID 4616 wrote to memory of 1136 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 83 PID 1136 wrote to memory of 4832 1136 un130099.exe 84 PID 1136 wrote to memory of 4832 1136 un130099.exe 84 PID 1136 wrote to memory of 4832 1136 un130099.exe 84 PID 1136 wrote to memory of 2264 1136 un130099.exe 91 PID 1136 wrote to memory of 2264 1136 un130099.exe 91 PID 1136 wrote to memory of 2264 1136 un130099.exe 91 PID 4616 wrote to memory of 3964 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 94 PID 4616 wrote to memory of 3964 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 94 PID 4616 wrote to memory of 3964 4616 3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe"C:\Users\Admin\AppData\Local\Temp\3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efae794e870736bba06277f9496a62b2
SHA1f634df6e4cedfb9a21258117731a6e620488715e
SHA2569feb9f60e2db3bd30667853da404cc7d9af98fbc500fe894e3dde0691e7182ca
SHA512e57fea637e6b9a8aaa050e4270f6a4bb8d103e1e56b1c831978f124e0cd3534fd9b9ecc3304c60d0f57bc4fa4aedc47cbf21b83a4da69a186c4a6f1b0acdfcd9
-
Filesize
175KB
MD5efae794e870736bba06277f9496a62b2
SHA1f634df6e4cedfb9a21258117731a6e620488715e
SHA2569feb9f60e2db3bd30667853da404cc7d9af98fbc500fe894e3dde0691e7182ca
SHA512e57fea637e6b9a8aaa050e4270f6a4bb8d103e1e56b1c831978f124e0cd3534fd9b9ecc3304c60d0f57bc4fa4aedc47cbf21b83a4da69a186c4a6f1b0acdfcd9
-
Filesize
554KB
MD5ec1a8d64da48686a89bc24ae803a22b5
SHA13bd996d01430a2bb99938fab7cbdfa66a593c0e8
SHA25627cea968afc7a6f34d49457b96dc209b580413b27367ce00d7f8162ecafe88dc
SHA512c7b4cd32a4f8b891537225a30a431a89cc5cf1a9eabd6f774ea4416d19ecfad1d5a7a0024e8c9fe50c6c054faa41736b49d34d4b3ec476e0ac6a3ef0e2d48a6f
-
Filesize
554KB
MD5ec1a8d64da48686a89bc24ae803a22b5
SHA13bd996d01430a2bb99938fab7cbdfa66a593c0e8
SHA25627cea968afc7a6f34d49457b96dc209b580413b27367ce00d7f8162ecafe88dc
SHA512c7b4cd32a4f8b891537225a30a431a89cc5cf1a9eabd6f774ea4416d19ecfad1d5a7a0024e8c9fe50c6c054faa41736b49d34d4b3ec476e0ac6a3ef0e2d48a6f
-
Filesize
308KB
MD528e5f5a8d7002176b9db7c6bf662fedc
SHA15cfd5c70aba0f7dde473deed9cb626a6bc4de5cf
SHA2563d01740034a822c15b1483721dc547a84183a9842f2eb8f79065b07c2c23e31f
SHA512b4be25871bea862300f7cb0342f0dbb7135c4746004ca7c1a73fe12c443d603f62170ca2403a76aa6aa4a81245646995b8b323a45bec8c3b59f0b478f5643799
-
Filesize
308KB
MD528e5f5a8d7002176b9db7c6bf662fedc
SHA15cfd5c70aba0f7dde473deed9cb626a6bc4de5cf
SHA2563d01740034a822c15b1483721dc547a84183a9842f2eb8f79065b07c2c23e31f
SHA512b4be25871bea862300f7cb0342f0dbb7135c4746004ca7c1a73fe12c443d603f62170ca2403a76aa6aa4a81245646995b8b323a45bec8c3b59f0b478f5643799
-
Filesize
366KB
MD55de9e0da648341b01430347c02fdb620
SHA1dfff58a31b14b831ab4201117988c687264814c6
SHA256fc150610e154d77e6894d5a58ad70ce9a0cb3eb30af459947671a025fe78623f
SHA512edc7cda358c0feb20e4dc147efe2bec1fde936c125697e75c6e7606715b13914d1e3e280f175c17129b331f11fc18bc714bb95ec2e314b5bbb2372d822303fc3
-
Filesize
366KB
MD55de9e0da648341b01430347c02fdb620
SHA1dfff58a31b14b831ab4201117988c687264814c6
SHA256fc150610e154d77e6894d5a58ad70ce9a0cb3eb30af459947671a025fe78623f
SHA512edc7cda358c0feb20e4dc147efe2bec1fde936c125697e75c6e7606715b13914d1e3e280f175c17129b331f11fc18bc714bb95ec2e314b5bbb2372d822303fc3