Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe
Resource
win10-20230220-en
General
-
Target
d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe
-
Size
694KB
-
MD5
831f304cde2bb9169ab587a517bde631
-
SHA1
e639927ab07f57281a79f834cff8cb71dff0061a
-
SHA256
d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03
-
SHA512
9e025a562703baff4746745c8ded85974cb88936758d53b1ae38db13c4dafa7bacf29e0e699c4a8d787e1f10d248a50eeda1ae822198f3431c2803a720f76444
-
SSDEEP
12288:/Mr2y90iAOzm0qkhzz12ipFDtfERjpSPZY8WejWJhvPSfzi48J+Ap2l:Fybbzm5klIUFxUjwx1Wny7i1Ec2l
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4748-181-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/4748-182-0x0000000002840000-0x0000000002884000-memory.dmp family_redline behavioral1/memory/4748-183-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-184-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-186-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-188-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-190-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-192-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-194-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-196-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-198-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-200-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-204-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-202-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-206-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-208-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-210-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-212-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-214-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-217-0x0000000002840000-0x000000000287F000-memory.dmp family_redline behavioral1/memory/4748-1100-0x0000000004F00000-0x0000000004F10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4228 un920876.exe 3652 pro0238.exe 4748 qu8623.exe 1308 si272380.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0238.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un920876.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un920876.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3652 pro0238.exe 3652 pro0238.exe 4748 qu8623.exe 4748 qu8623.exe 1308 si272380.exe 1308 si272380.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3652 pro0238.exe Token: SeDebugPrivilege 4748 qu8623.exe Token: SeDebugPrivilege 1308 si272380.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3752 wrote to memory of 4228 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 66 PID 3752 wrote to memory of 4228 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 66 PID 3752 wrote to memory of 4228 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 66 PID 4228 wrote to memory of 3652 4228 un920876.exe 67 PID 4228 wrote to memory of 3652 4228 un920876.exe 67 PID 4228 wrote to memory of 3652 4228 un920876.exe 67 PID 4228 wrote to memory of 4748 4228 un920876.exe 68 PID 4228 wrote to memory of 4748 4228 un920876.exe 68 PID 4228 wrote to memory of 4748 4228 un920876.exe 68 PID 3752 wrote to memory of 1308 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 70 PID 3752 wrote to memory of 1308 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 70 PID 3752 wrote to memory of 1308 3752 d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe"C:\Users\Admin\AppData\Local\Temp\d52572f05b941a3350541450089dcfd6b704eec482ad5600e20f310f034fba03.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un920876.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un920876.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0238.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8623.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272380.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d5bfb1b3a561c04fdf5abc7e3b3c1b80
SHA1603e3bac0d6c72f95090342c3401353a0dde0db3
SHA256d197006e8b1908c392c1d4d5a11274f7802f23cfb16a8e9318cef3dba67a9cb4
SHA512bd43c44930be805e54e005bc5d4fae0330313dab96b2f4666f10c2e55a9756252e4c6276b3f78ee35ef45a6144bdebdb32ab79621db43ba6510c1abe3eeb7fb2
-
Filesize
175KB
MD5d5bfb1b3a561c04fdf5abc7e3b3c1b80
SHA1603e3bac0d6c72f95090342c3401353a0dde0db3
SHA256d197006e8b1908c392c1d4d5a11274f7802f23cfb16a8e9318cef3dba67a9cb4
SHA512bd43c44930be805e54e005bc5d4fae0330313dab96b2f4666f10c2e55a9756252e4c6276b3f78ee35ef45a6144bdebdb32ab79621db43ba6510c1abe3eeb7fb2
-
Filesize
552KB
MD56a984f4420c825dec156ea3ff136fdc8
SHA15d3492038ad63cd46ebd89a361a61554903621bd
SHA256055d8de63602eac47a7e80259767976c13661ccec11ff793b7d743d867ebc097
SHA512d792a417ad5dd765f3df935d931c69e63382c90a11e9299985b504f9240cbb8b45b3188d0c26a4c167785754d7a169f5ecd50949466d470f2352c99aebb547fc
-
Filesize
552KB
MD56a984f4420c825dec156ea3ff136fdc8
SHA15d3492038ad63cd46ebd89a361a61554903621bd
SHA256055d8de63602eac47a7e80259767976c13661ccec11ff793b7d743d867ebc097
SHA512d792a417ad5dd765f3df935d931c69e63382c90a11e9299985b504f9240cbb8b45b3188d0c26a4c167785754d7a169f5ecd50949466d470f2352c99aebb547fc
-
Filesize
308KB
MD5e4739b50092098f64b64eba5e8a404ce
SHA18dbdf66c01a1b74b1e8f2ad0231cbad63d2b5956
SHA2565eef785974c874b2e4172fc4e9f5529f6722270b099ff6f9b16cf5df6f46d7bd
SHA512b2a5e4dff0bfed7135f9257e7ea687fde3ced9359b66e78f072b7a154a61fbe7d8d5009af12a215d4c67dfa1a7647d2e02ab7fd1ec9af7d274debb4bd10e3b3c
-
Filesize
308KB
MD5e4739b50092098f64b64eba5e8a404ce
SHA18dbdf66c01a1b74b1e8f2ad0231cbad63d2b5956
SHA2565eef785974c874b2e4172fc4e9f5529f6722270b099ff6f9b16cf5df6f46d7bd
SHA512b2a5e4dff0bfed7135f9257e7ea687fde3ced9359b66e78f072b7a154a61fbe7d8d5009af12a215d4c67dfa1a7647d2e02ab7fd1ec9af7d274debb4bd10e3b3c
-
Filesize
366KB
MD54c217f8e2e569341e496b85c73282679
SHA1438504c57ee7d52150cf567b6e8d73761aa41305
SHA256c21a4a1a11e897469ad1a24f148b1c243ac6f9d79ca0d673b3985e424d51b19e
SHA512dd9e3b34116f67f3187462619b2347d4eff7684e599483e991857dc331a46dbd2f09ac1418d6fe3da08e465fe775480d7e560acfdb562e4c5fe1a537a14fb9d2
-
Filesize
366KB
MD54c217f8e2e569341e496b85c73282679
SHA1438504c57ee7d52150cf567b6e8d73761aa41305
SHA256c21a4a1a11e897469ad1a24f148b1c243ac6f9d79ca0d673b3985e424d51b19e
SHA512dd9e3b34116f67f3187462619b2347d4eff7684e599483e991857dc331a46dbd2f09ac1418d6fe3da08e465fe775480d7e560acfdb562e4c5fe1a537a14fb9d2