Analysis
-
max time kernel
105s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:49
Static task
static1
Behavioral task
behavioral1
Sample
43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe
Resource
win10v2004-20230220-en
General
-
Target
43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe
-
Size
695KB
-
MD5
b4bf4af149607f98138166d7aab2b806
-
SHA1
c1a5e20903e664accff8e68e53aebe7f8d449ffe
-
SHA256
43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265
-
SHA512
437c9fdd79a663a7b7a8f3a8cf3b54a8a175960c24c140f39625b057ad372cdff01e21a9f75b5a2aa1f4673a2da2d42325073b5b9d51888bfeb30bda3a82d26f
-
SSDEEP
12288:RMrPy90BSVuHZFZy2PrAnwyOinGlQJGFOvPSpzbjoJiEAz97MRt:CyiXrymr5ioQogy5bMyaRt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3368-190-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-191-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-193-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-195-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-197-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-199-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-201-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-203-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-205-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-207-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-211-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-217-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-215-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-219-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-221-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-223-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-225-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/3368-227-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1436 un385157.exe 2428 pro3211.exe 3368 qu0024.exe 3768 si607210.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3211.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un385157.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un385157.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 pro3211.exe 2428 pro3211.exe 3368 qu0024.exe 3368 qu0024.exe 3768 si607210.exe 3768 si607210.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2428 pro3211.exe Token: SeDebugPrivilege 3368 qu0024.exe Token: SeDebugPrivilege 3768 si607210.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1436 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 86 PID 3656 wrote to memory of 1436 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 86 PID 3656 wrote to memory of 1436 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 86 PID 1436 wrote to memory of 2428 1436 un385157.exe 87 PID 1436 wrote to memory of 2428 1436 un385157.exe 87 PID 1436 wrote to memory of 2428 1436 un385157.exe 87 PID 1436 wrote to memory of 3368 1436 un385157.exe 92 PID 1436 wrote to memory of 3368 1436 un385157.exe 92 PID 1436 wrote to memory of 3368 1436 un385157.exe 92 PID 3656 wrote to memory of 3768 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 96 PID 3656 wrote to memory of 3768 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 96 PID 3656 wrote to memory of 3768 3656 43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe"C:\Users\Admin\AppData\Local\Temp\43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e8b6021829d1ee3095f01a74ce14e8f9
SHA1b9ee689382b8d4b5f735bb6b4e86037bb39d8cc1
SHA256f0ee866abfe1993572dedd4117c7f3f1a71617d3b78293aad3232c8aa9e0d4e5
SHA512c7323116d4135bfeb304cd1686ccb01a49333caddf2823fea769b8c9c8bc636ff25d5ff33687007dc81ba2c9249cb40fe0893f70e18141ee4c25a99f1b282ccf
-
Filesize
175KB
MD5e8b6021829d1ee3095f01a74ce14e8f9
SHA1b9ee689382b8d4b5f735bb6b4e86037bb39d8cc1
SHA256f0ee866abfe1993572dedd4117c7f3f1a71617d3b78293aad3232c8aa9e0d4e5
SHA512c7323116d4135bfeb304cd1686ccb01a49333caddf2823fea769b8c9c8bc636ff25d5ff33687007dc81ba2c9249cb40fe0893f70e18141ee4c25a99f1b282ccf
-
Filesize
553KB
MD58b7cad2e504b1b2ee081d60ac3f6c380
SHA13f679be40fab394b5b00d3bbdc224966f8dfd04d
SHA256455dcf68c78b9979917c8405d8e5857c6421b5129ca82386f12d43f1cfc8954d
SHA512540ea85d33aba252514aa4b34121e56bbe2ec44bdbfaa4d7e0f0a21eceab3f34e1ca7ec52be9f7bb6b0b1941caa1ba7f168e844ed847428c9206cecc603c64fe
-
Filesize
553KB
MD58b7cad2e504b1b2ee081d60ac3f6c380
SHA13f679be40fab394b5b00d3bbdc224966f8dfd04d
SHA256455dcf68c78b9979917c8405d8e5857c6421b5129ca82386f12d43f1cfc8954d
SHA512540ea85d33aba252514aa4b34121e56bbe2ec44bdbfaa4d7e0f0a21eceab3f34e1ca7ec52be9f7bb6b0b1941caa1ba7f168e844ed847428c9206cecc603c64fe
-
Filesize
308KB
MD577ffac6986f5f07ef220664d34f326a2
SHA1e0679c0f93d422b9d1c40de01d0a423d123dbff8
SHA25689af4e8a1e8017c7719905db189896092d4d8e950173ddca42ed8b04231813b6
SHA5125ec31740d2d8e4ed1ef3a52f901c15735807af70b9b15c49320363f3eabfedb3800891e314f3ec9f9aca5eaa8315689c64a183b5c32138c816d4a9eca29673df
-
Filesize
308KB
MD577ffac6986f5f07ef220664d34f326a2
SHA1e0679c0f93d422b9d1c40de01d0a423d123dbff8
SHA25689af4e8a1e8017c7719905db189896092d4d8e950173ddca42ed8b04231813b6
SHA5125ec31740d2d8e4ed1ef3a52f901c15735807af70b9b15c49320363f3eabfedb3800891e314f3ec9f9aca5eaa8315689c64a183b5c32138c816d4a9eca29673df
-
Filesize
366KB
MD5b0ff4d46bfe59b1e87fc025a654f7ceb
SHA1e1ff298bdb2858af27067222fcb5242d97452faf
SHA256881aa6b72fb5b1efce036e413a35af03d298fa5a3f40b39c4a9b1b06dbd3a2c5
SHA51282af0f77546b81a57c52bc40dd745955443cba2ce42e039ca862b003e3b88c60d7e2e0cc4aa72173c8b5d94741810deb47e214cb2899dffdffbd2356b62a8d51
-
Filesize
366KB
MD5b0ff4d46bfe59b1e87fc025a654f7ceb
SHA1e1ff298bdb2858af27067222fcb5242d97452faf
SHA256881aa6b72fb5b1efce036e413a35af03d298fa5a3f40b39c4a9b1b06dbd3a2c5
SHA51282af0f77546b81a57c52bc40dd745955443cba2ce42e039ca862b003e3b88c60d7e2e0cc4aa72173c8b5d94741810deb47e214cb2899dffdffbd2356b62a8d51