Analysis
-
max time kernel
52s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe
Resource
win10-20230220-en
General
-
Target
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe
-
Size
695KB
-
MD5
07cdbf97a992dccbc58200bb3167d55a
-
SHA1
2118f80cdab97d143da4484a63af72b32fa0f460
-
SHA256
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70
-
SHA512
93b5b61746ef0701076bc9f185a7d99343ce5a5926ff61b3ef01b0dceec591df76cde20ad74d9e893efd56df9963cc636977e1fa53a2da91c01116c7deb0175c
-
SSDEEP
12288:AMrOy90D2MLM9Xj+Rb1nD33csmkUBUAAoit5NDEuM6cziVIJ1tEhqjrKCMdJ6So:+yjMO2bNcVvUpt5NDyXiuFEnCMdJ6n
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7547.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4616-179-0x0000000000B10000-0x0000000000B56000-memory.dmp family_redline behavioral1/memory/4616-180-0x0000000002720000-0x0000000002764000-memory.dmp family_redline behavioral1/memory/4616-181-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-182-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-184-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-186-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-188-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-190-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-192-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-194-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-198-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-196-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-200-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-202-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-204-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-206-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-208-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-210-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-212-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/4616-218-0x0000000002720000-0x000000000275F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 420 un048025.exe 2284 pro7547.exe 4616 qu6749.exe 2984 si896955.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7547.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un048025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un048025.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2284 pro7547.exe 2284 pro7547.exe 4616 qu6749.exe 4616 qu6749.exe 2984 si896955.exe 2984 si896955.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2284 pro7547.exe Token: SeDebugPrivilege 4616 qu6749.exe Token: SeDebugPrivilege 2984 si896955.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1884 wrote to memory of 420 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 66 PID 1884 wrote to memory of 420 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 66 PID 1884 wrote to memory of 420 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 66 PID 420 wrote to memory of 2284 420 un048025.exe 67 PID 420 wrote to memory of 2284 420 un048025.exe 67 PID 420 wrote to memory of 2284 420 un048025.exe 67 PID 420 wrote to memory of 4616 420 un048025.exe 68 PID 420 wrote to memory of 4616 420 un048025.exe 68 PID 420 wrote to memory of 4616 420 un048025.exe 68 PID 1884 wrote to memory of 2984 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 70 PID 1884 wrote to memory of 2984 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 70 PID 1884 wrote to memory of 2984 1884 c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe"C:\Users\Admin\AppData\Local\Temp\c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un048025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un048025.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7547.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6749.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896955.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896955.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55244ca87e2d490a959a47fef8e5df47d
SHA1f221c6194383d5f405c978fdccba409b3b3bfb8d
SHA256d15bd4edfbcc02e0c38dc850b135fe20b400fd03009862ed665f2a68dccc14c6
SHA5127799ce2a3461e6030584190e176306b593a3d99707475386a214d06ca885b583ba45e30db07711828537cff8e525c454946ddff43f68130049af17ff88454686
-
Filesize
175KB
MD55244ca87e2d490a959a47fef8e5df47d
SHA1f221c6194383d5f405c978fdccba409b3b3bfb8d
SHA256d15bd4edfbcc02e0c38dc850b135fe20b400fd03009862ed665f2a68dccc14c6
SHA5127799ce2a3461e6030584190e176306b593a3d99707475386a214d06ca885b583ba45e30db07711828537cff8e525c454946ddff43f68130049af17ff88454686
-
Filesize
553KB
MD59d5a63025d433963cd99921c2c1990f4
SHA1914ed62b8a99d9a744a73f99cdb17a6ab386edcd
SHA256762e8b7db374c71dae167d1f5d821170908c1ad18058365b711a0d475bb21c92
SHA5125f8286f007aefd51a4453abbd307d97a18fd14c089db2632b5cf10f2fc5fd3c623eb2b8e4f4e2426003c13c70b65985942472fab3c3770b117c5062b5ff7874e
-
Filesize
553KB
MD59d5a63025d433963cd99921c2c1990f4
SHA1914ed62b8a99d9a744a73f99cdb17a6ab386edcd
SHA256762e8b7db374c71dae167d1f5d821170908c1ad18058365b711a0d475bb21c92
SHA5125f8286f007aefd51a4453abbd307d97a18fd14c089db2632b5cf10f2fc5fd3c623eb2b8e4f4e2426003c13c70b65985942472fab3c3770b117c5062b5ff7874e
-
Filesize
308KB
MD52ec910713ddb5e69be034ce290f207e4
SHA1ce88a6a372a1a8069a656c78e0c64e97346cf050
SHA25623b277864bc4740145f2b3d35fc9dff03d1cad2020d0555b292ba800cc17c12d
SHA5122b467bcddc361aa18e63997ebd6c9d07c477d65b203802c9f72ef85e4d4797abb53a4def2e35b1b1245a1ef93ecdbce053494a04914f72c52a6d912d0490295c
-
Filesize
308KB
MD52ec910713ddb5e69be034ce290f207e4
SHA1ce88a6a372a1a8069a656c78e0c64e97346cf050
SHA25623b277864bc4740145f2b3d35fc9dff03d1cad2020d0555b292ba800cc17c12d
SHA5122b467bcddc361aa18e63997ebd6c9d07c477d65b203802c9f72ef85e4d4797abb53a4def2e35b1b1245a1ef93ecdbce053494a04914f72c52a6d912d0490295c
-
Filesize
366KB
MD5e168b8789f66a9cc40304152298aedc7
SHA156d7129a4bab1acc6c8ded2fb8d5162cb4830b58
SHA25635abb38f647dfced708f7a046607211fdb5e7510b4489357492850ad506291cb
SHA512f5d39cec3c8f1e80f72e71723d50e04f6c8676de617329861b0cbf78e1246a5023311fbc673d1ae3fb15aa61ed9e87c864d4a6783def61cc2a2f501ed47cb537
-
Filesize
366KB
MD5e168b8789f66a9cc40304152298aedc7
SHA156d7129a4bab1acc6c8ded2fb8d5162cb4830b58
SHA25635abb38f647dfced708f7a046607211fdb5e7510b4489357492850ad506291cb
SHA512f5d39cec3c8f1e80f72e71723d50e04f6c8676de617329861b0cbf78e1246a5023311fbc673d1ae3fb15aa61ed9e87c864d4a6783def61cc2a2f501ed47cb537