Analysis
-
max time kernel
58s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:44
Static task
static1
Behavioral task
behavioral1
Sample
d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe
Resource
win10-20230220-en
General
-
Target
d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe
-
Size
695KB
-
MD5
41cbd1f83fcce2d98c53150d362180b0
-
SHA1
8335e4bc0ec08165dea3b1527125d76561cfd830
-
SHA256
d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7
-
SHA512
bf15839b4dcce68d51c703f625c60c84a2088e0a6cf596eab87f85b08fe1375d92bb96d117d11a9266fe4fbd84498d80f833338b097d26d9cc03dfea1e9efe73
-
SSDEEP
12288:KMrRy90dA2r8FvrJIpQMllgN774eiZHu8zJ/WJegor:ry+Fr89r6SqKt74rJOgj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9648.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1124-174-0x0000000002390000-0x00000000023D6000-memory.dmp family_redline behavioral1/memory/1124-175-0x0000000002530000-0x0000000002574000-memory.dmp family_redline behavioral1/memory/1124-177-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-176-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-179-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-181-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-183-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-185-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-187-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-189-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-191-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-193-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-195-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-197-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-199-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-201-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-206-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-209-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-211-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1124-213-0x0000000002530000-0x000000000256F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4512 un562452.exe 4324 pro9648.exe 1124 qu1819.exe 2596 si079896.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9648.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un562452.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un562452.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4324 pro9648.exe 4324 pro9648.exe 1124 qu1819.exe 1124 qu1819.exe 2596 si079896.exe 2596 si079896.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4324 pro9648.exe Token: SeDebugPrivilege 1124 qu1819.exe Token: SeDebugPrivilege 2596 si079896.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 372 wrote to memory of 4512 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 66 PID 372 wrote to memory of 4512 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 66 PID 372 wrote to memory of 4512 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 66 PID 4512 wrote to memory of 4324 4512 un562452.exe 67 PID 4512 wrote to memory of 4324 4512 un562452.exe 67 PID 4512 wrote to memory of 4324 4512 un562452.exe 67 PID 4512 wrote to memory of 1124 4512 un562452.exe 68 PID 4512 wrote to memory of 1124 4512 un562452.exe 68 PID 4512 wrote to memory of 1124 4512 un562452.exe 68 PID 372 wrote to memory of 2596 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 70 PID 372 wrote to memory of 2596 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 70 PID 372 wrote to memory of 2596 372 d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe"C:\Users\Admin\AppData\Local\Temp\d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51789c28e597a1b6d0e6790201bdab2f8
SHA1a2422229ffcddaffeb212ad81cd74f9b2dda8002
SHA25642a2a8913c20a7ced84dd472ea2565af14ffb29dbf20275e9d77d6a52360e3c7
SHA512f1037915f9ff41a773cc7764db01e95f77d9a8e9df4d2eecda2bfe9192ec34cdf51b814df39cccf7f0d5df8a7092d526a5c6baf7fb418d433cd6dbfa195075f8
-
Filesize
175KB
MD51789c28e597a1b6d0e6790201bdab2f8
SHA1a2422229ffcddaffeb212ad81cd74f9b2dda8002
SHA25642a2a8913c20a7ced84dd472ea2565af14ffb29dbf20275e9d77d6a52360e3c7
SHA512f1037915f9ff41a773cc7764db01e95f77d9a8e9df4d2eecda2bfe9192ec34cdf51b814df39cccf7f0d5df8a7092d526a5c6baf7fb418d433cd6dbfa195075f8
-
Filesize
553KB
MD55c376cae0ee1386acca298b41d4efd7d
SHA108c286cec8dbb81bb58b15d0bcd4170953b250b5
SHA256ed6f670412cb2a2ec0f436b32b2d81abf3d16268e215b623f59c3a3af39f02c4
SHA512c0a2ea0642ba6b9c103ddbc8a7b919923c56bdadafb34a79bbe6e9a85436a0c7562f0dc5e051651f4f561e9d380be13be67d9a7616c8479106d2e41d12099209
-
Filesize
553KB
MD55c376cae0ee1386acca298b41d4efd7d
SHA108c286cec8dbb81bb58b15d0bcd4170953b250b5
SHA256ed6f670412cb2a2ec0f436b32b2d81abf3d16268e215b623f59c3a3af39f02c4
SHA512c0a2ea0642ba6b9c103ddbc8a7b919923c56bdadafb34a79bbe6e9a85436a0c7562f0dc5e051651f4f561e9d380be13be67d9a7616c8479106d2e41d12099209
-
Filesize
308KB
MD5631ebb2c496b541fe1421e09f115c22b
SHA1f53cf4f79c8803a4837ba1361d21bde4a643a44c
SHA256a21cccc0a1d63c76fc9a1551c84bb83ae3df6a69681bdb2fae055ab2fbb86bd6
SHA512ebc3356445fef3c461d9dadbeab6e388eb7f6758c949f9c3d6fc415a29e652eafefa6c591d105c97b741458f1558588fa050e08a1e7e63981efcf2a477c50ea1
-
Filesize
308KB
MD5631ebb2c496b541fe1421e09f115c22b
SHA1f53cf4f79c8803a4837ba1361d21bde4a643a44c
SHA256a21cccc0a1d63c76fc9a1551c84bb83ae3df6a69681bdb2fae055ab2fbb86bd6
SHA512ebc3356445fef3c461d9dadbeab6e388eb7f6758c949f9c3d6fc415a29e652eafefa6c591d105c97b741458f1558588fa050e08a1e7e63981efcf2a477c50ea1
-
Filesize
366KB
MD5dbe3764175dbbb4024c8c1633c995c34
SHA1a270da62193283da7ffb91b16f47c35baa857d41
SHA256c9a60539796072ca3340963235ad89b1fbb49c313d172cd50d734999fba727bf
SHA512ecaf80de8a38bcff7ee5dc4d63268c4a4fb6cd7941d43988827362df7e9cce4694ad52539adee5427bfb028b7ba18172bf635d700db3ed33734042c738ab9057
-
Filesize
366KB
MD5dbe3764175dbbb4024c8c1633c995c34
SHA1a270da62193283da7ffb91b16f47c35baa857d41
SHA256c9a60539796072ca3340963235ad89b1fbb49c313d172cd50d734999fba727bf
SHA512ecaf80de8a38bcff7ee5dc4d63268c4a4fb6cd7941d43988827362df7e9cce4694ad52539adee5427bfb028b7ba18172bf635d700db3ed33734042c738ab9057