Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe
Resource
win10v2004-20230221-en
General
-
Target
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe
-
Size
695KB
-
MD5
dba39baff2d6e1a64e9a45aeb0fefdb3
-
SHA1
a11e71f7eb96db80dca943a7b8fcebf79115ba6d
-
SHA256
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee
-
SHA512
d1b6ab79d6ed93ee93ad6ad63a9dc28d8ea14caf43c4205a7f48d83a555c8a18f1c4742f96b932646f87f333d319611470f647153ca71fc17c647397bf549901
-
SSDEEP
12288:OMr3y90YJSPmW2Q8bTBCoPkgFlvqeZSvPSzzi2GJSyryWih:JyTHwUkgvvqeZSyfiHw+yP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6312.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6312.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6312.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6312.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6312.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6312.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3796-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-225-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3796-227-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4664 un268678.exe 1384 pro6312.exe 3796 qu7284.exe 1964 si597108.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6312.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6312.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un268678.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un268678.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1384 pro6312.exe 1384 pro6312.exe 3796 qu7284.exe 3796 qu7284.exe 1964 si597108.exe 1964 si597108.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 pro6312.exe Token: SeDebugPrivilege 3796 qu7284.exe Token: SeDebugPrivilege 1964 si597108.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4664 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 76 PID 2236 wrote to memory of 4664 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 76 PID 2236 wrote to memory of 4664 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 76 PID 4664 wrote to memory of 1384 4664 un268678.exe 77 PID 4664 wrote to memory of 1384 4664 un268678.exe 77 PID 4664 wrote to memory of 1384 4664 un268678.exe 77 PID 4664 wrote to memory of 3796 4664 un268678.exe 85 PID 4664 wrote to memory of 3796 4664 un268678.exe 85 PID 4664 wrote to memory of 3796 4664 un268678.exe 85 PID 2236 wrote to memory of 1964 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 88 PID 2236 wrote to memory of 1964 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 88 PID 2236 wrote to memory of 1964 2236 3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe"C:\Users\Admin\AppData\Local\Temp\3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c1dc3febc7f3dea216625e083b05a8c0
SHA1497fab2b72f1959853a976ad1f054b71998516f1
SHA256013168c96ff52032c3cf21b9dec141b414ce0824a88ec8eeab08b43fe0c0c562
SHA512eff5c9e679dfcae480caa12465144caf3fcc3a9ee53507d732d5f17db42663aecc951e2472f48207db4a3ca7c3d669ab583902fd4af4bd35e1cb5da560c55041
-
Filesize
175KB
MD5c1dc3febc7f3dea216625e083b05a8c0
SHA1497fab2b72f1959853a976ad1f054b71998516f1
SHA256013168c96ff52032c3cf21b9dec141b414ce0824a88ec8eeab08b43fe0c0c562
SHA512eff5c9e679dfcae480caa12465144caf3fcc3a9ee53507d732d5f17db42663aecc951e2472f48207db4a3ca7c3d669ab583902fd4af4bd35e1cb5da560c55041
-
Filesize
553KB
MD5abef5a077be1ca6bd176e4101094483d
SHA136dd93bc083f472e5c5049a551e71acd013466c7
SHA256f429cdddec1b63d1b558784ef25805994aa3a1f76a4f28f5cc6e09e9a1ba3b1a
SHA5129873cbfb1711fb936f4ef2bf144bfa6193a369804a65f09e427aeb87124da287488cf588fa31fb50a237d7882389827880bfbb80ee17a04cfc582e7efd215d18
-
Filesize
553KB
MD5abef5a077be1ca6bd176e4101094483d
SHA136dd93bc083f472e5c5049a551e71acd013466c7
SHA256f429cdddec1b63d1b558784ef25805994aa3a1f76a4f28f5cc6e09e9a1ba3b1a
SHA5129873cbfb1711fb936f4ef2bf144bfa6193a369804a65f09e427aeb87124da287488cf588fa31fb50a237d7882389827880bfbb80ee17a04cfc582e7efd215d18
-
Filesize
308KB
MD5d48753e1d94d5a54907cecf3be10c200
SHA1bf2d6fbbe49565b60ef18da37b96bdc679af82f9
SHA2564bce729b81e494e479d1ea47049a968dcc1a06618410e09f8234861f21f5e2c7
SHA5125c15541e242b31dc96a874f04127df3c3ca9c2e7c1845e4ee243c35fae28fc815e57ef784e8b3332fe13023115e8859050f3f4a149f4f93880474f2baf6747c4
-
Filesize
308KB
MD5d48753e1d94d5a54907cecf3be10c200
SHA1bf2d6fbbe49565b60ef18da37b96bdc679af82f9
SHA2564bce729b81e494e479d1ea47049a968dcc1a06618410e09f8234861f21f5e2c7
SHA5125c15541e242b31dc96a874f04127df3c3ca9c2e7c1845e4ee243c35fae28fc815e57ef784e8b3332fe13023115e8859050f3f4a149f4f93880474f2baf6747c4
-
Filesize
366KB
MD53af75cdcb9f021b1ba330b94c6279f8b
SHA1d6ecee3cb4928ae92b81be901367d1ca88315c12
SHA256840f61955605e04c6c9eae3d1e9f45252cbfb945cfe53b16ed5bed9a2895ee8f
SHA512a37a3fe2f2526d72853e942b66dd284615e2c9fc775ffec36a945df44eadb3117d7bfada710e42794994799b438b8f1a7b79cf291cff4c06bc493350d4e5b953
-
Filesize
366KB
MD53af75cdcb9f021b1ba330b94c6279f8b
SHA1d6ecee3cb4928ae92b81be901367d1ca88315c12
SHA256840f61955605e04c6c9eae3d1e9f45252cbfb945cfe53b16ed5bed9a2895ee8f
SHA512a37a3fe2f2526d72853e942b66dd284615e2c9fc775ffec36a945df44eadb3117d7bfada710e42794994799b438b8f1a7b79cf291cff4c06bc493350d4e5b953