Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe
Resource
win10v2004-20230220-en
General
-
Target
0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe
-
Size
694KB
-
MD5
6af8844480f4b43cec6afb0af2e9a237
-
SHA1
360e269437066daadd1a1e14b84f6aaec58da342
-
SHA256
0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec
-
SHA512
b7e358293fa9329e44d324cff11704df633c3890bcbd810f5d9b479a73b9b9548b1551e5c83348492cd2309b876ebf77d3a34a7a62453c9e630c1360a885fba6
-
SSDEEP
12288:9Mr+Oy904hidir2ifOTRTSoWvvPSQzKrLJa6Xownpd2S3o:8yDuifmgyIKnAWnpdG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8893.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2332-189-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2332-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5096 un541713.exe 4724 pro8893.exe 2332 qu1982.exe 2916 si636083.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8893.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un541713.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un541713.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4724 pro8893.exe 4724 pro8893.exe 2332 qu1982.exe 2332 qu1982.exe 2916 si636083.exe 2916 si636083.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4724 pro8893.exe Token: SeDebugPrivilege 2332 qu1982.exe Token: SeDebugPrivilege 2916 si636083.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3388 wrote to memory of 5096 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 84 PID 3388 wrote to memory of 5096 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 84 PID 3388 wrote to memory of 5096 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 84 PID 5096 wrote to memory of 4724 5096 un541713.exe 85 PID 5096 wrote to memory of 4724 5096 un541713.exe 85 PID 5096 wrote to memory of 4724 5096 un541713.exe 85 PID 5096 wrote to memory of 2332 5096 un541713.exe 89 PID 5096 wrote to memory of 2332 5096 un541713.exe 89 PID 5096 wrote to memory of 2332 5096 un541713.exe 89 PID 3388 wrote to memory of 2916 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 90 PID 3388 wrote to memory of 2916 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 90 PID 3388 wrote to memory of 2916 3388 0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe"C:\Users\Admin\AppData\Local\Temp\0e7b98053bbb55f350854a13e1c24297458e3f32d31efd4a30210c980bf2acec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541713.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8893.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1982.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636083.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57004f23988bdc13f436b01c634e88063
SHA1f07c1b3707b9e3549dd9e798170c87e399aa1eee
SHA256f2a24e2101c3d394e38fa3cc5a9d6933c523f4b909301bb8672a78bacbb5b139
SHA512f566f3e82ae44a9f519f8fc878919f98cc34442f17d8cff616568f329b9183a643bcb9ee4dfc622ec6834bf19cb788fdbebdc94d2c1386225805352025618fb1
-
Filesize
175KB
MD57004f23988bdc13f436b01c634e88063
SHA1f07c1b3707b9e3549dd9e798170c87e399aa1eee
SHA256f2a24e2101c3d394e38fa3cc5a9d6933c523f4b909301bb8672a78bacbb5b139
SHA512f566f3e82ae44a9f519f8fc878919f98cc34442f17d8cff616568f329b9183a643bcb9ee4dfc622ec6834bf19cb788fdbebdc94d2c1386225805352025618fb1
-
Filesize
553KB
MD5516a1f16cdfb5f4e60d85791026fba20
SHA177025f18503c1b949fa131a60564680ff0191600
SHA256c7a03fc0b3478b7d0547de21b42f69fe192606e474f328f9788f59e7c33253d6
SHA5121c98a4c5f21976f108cb8b7186dbc450a3b3a6cbd76bc4b1c29776a674d91aeaf3604477d36b8c3081ca920712836324f700f476f4da10a54515a598ab398390
-
Filesize
553KB
MD5516a1f16cdfb5f4e60d85791026fba20
SHA177025f18503c1b949fa131a60564680ff0191600
SHA256c7a03fc0b3478b7d0547de21b42f69fe192606e474f328f9788f59e7c33253d6
SHA5121c98a4c5f21976f108cb8b7186dbc450a3b3a6cbd76bc4b1c29776a674d91aeaf3604477d36b8c3081ca920712836324f700f476f4da10a54515a598ab398390
-
Filesize
308KB
MD5dbbea8a4353de2f03b3e58960e97cb4e
SHA110f7a07ef98a4ff2e658f250cf323aa75901b398
SHA256539713cae75540b9139a748fd8f24a1c46de4f4a27dbb43eeace854265b2ae20
SHA51272463692fbd9b5ffdad3dd4c436d4be7895de4bc2891c2fa9e173e2fcde9921b12bfdc22090e8fa90939f6b0fd272e1594c2df5ce7e857f4e80f4f54df2d8878
-
Filesize
308KB
MD5dbbea8a4353de2f03b3e58960e97cb4e
SHA110f7a07ef98a4ff2e658f250cf323aa75901b398
SHA256539713cae75540b9139a748fd8f24a1c46de4f4a27dbb43eeace854265b2ae20
SHA51272463692fbd9b5ffdad3dd4c436d4be7895de4bc2891c2fa9e173e2fcde9921b12bfdc22090e8fa90939f6b0fd272e1594c2df5ce7e857f4e80f4f54df2d8878
-
Filesize
366KB
MD5c24c00ba0c3fbf28b7baefdc3d9766a6
SHA17fedc26184d7234a4d5dc66b59791ba413166332
SHA256423707a0664a6050200e1dc116be8be76c1342ec4207c53cdc9e9e1618f41220
SHA5129451e20dada40b96365ac470f0a677b2ba6971c3b745951572081081f5c4990ea1211bbb939cf30b4d5b45d3262f22d22e782514db2ae0ddc2bec7cc1a3c2049
-
Filesize
366KB
MD5c24c00ba0c3fbf28b7baefdc3d9766a6
SHA17fedc26184d7234a4d5dc66b59791ba413166332
SHA256423707a0664a6050200e1dc116be8be76c1342ec4207c53cdc9e9e1618f41220
SHA5129451e20dada40b96365ac470f0a677b2ba6971c3b745951572081081f5c4990ea1211bbb939cf30b4d5b45d3262f22d22e782514db2ae0ddc2bec7cc1a3c2049