Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:58
Static task
static1
Behavioral task
behavioral1
Sample
44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe
Resource
win10v2004-20230220-en
General
-
Target
44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe
-
Size
695KB
-
MD5
b322ae4378334acc36396a4fbffa658c
-
SHA1
b51e037707f69b961e78bb4a53431b62fa6fcb66
-
SHA256
44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50
-
SHA512
d44071dc82e506c8888ede4254a3ec02fc207b9f8ae3d58c904f29f06ccdd6c277194899ae3076bc69d1f0e685a2f345ad90cc04d9c5c17a23e4a73e42813ac9
-
SSDEEP
12288:CMrvy90vMEw7r8ULM89kC4Og43rWuuPle99p7tvPSwzIdyJ/7SqiMH:1ywFwH4Wg4SuelevBtyoIocs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8968.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4708-191-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-192-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-194-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-196-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-198-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-200-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-202-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-204-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-206-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-208-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-210-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-212-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-217-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline behavioral1/memory/4708-216-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-219-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-221-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-223-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-225-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/4708-227-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4648 un794866.exe 4504 pro8968.exe 4708 qu9060.exe 2864 si046980.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8968.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un794866.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un794866.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 pro8968.exe 4504 pro8968.exe 4708 qu9060.exe 4708 qu9060.exe 2864 si046980.exe 2864 si046980.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 pro8968.exe Token: SeDebugPrivilege 4708 qu9060.exe Token: SeDebugPrivilege 2864 si046980.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4648 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 84 PID 4604 wrote to memory of 4648 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 84 PID 4604 wrote to memory of 4648 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 84 PID 4648 wrote to memory of 4504 4648 un794866.exe 85 PID 4648 wrote to memory of 4504 4648 un794866.exe 85 PID 4648 wrote to memory of 4504 4648 un794866.exe 85 PID 4648 wrote to memory of 4708 4648 un794866.exe 91 PID 4648 wrote to memory of 4708 4648 un794866.exe 91 PID 4648 wrote to memory of 4708 4648 un794866.exe 91 PID 4604 wrote to memory of 2864 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 94 PID 4604 wrote to memory of 2864 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 94 PID 4604 wrote to memory of 2864 4604 44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe"C:\Users\Admin\AppData\Local\Temp\44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55806e915d7fe82bb5f9b40d559569d3d
SHA1115cc89afd98ee2af3cd70e21844d3f5e56f544f
SHA256fcc0864462c21432db47b18e420844d36bcd07b7d2045e7106b107efcac7ca3a
SHA5126a0a7e66ee878512946df73c41c041b64e3aa7aaa71cb062005d1fb481434692c7c4627b328164a6fdd01333456e4552f76dee3e79cb01d96625f25b4892fd95
-
Filesize
175KB
MD55806e915d7fe82bb5f9b40d559569d3d
SHA1115cc89afd98ee2af3cd70e21844d3f5e56f544f
SHA256fcc0864462c21432db47b18e420844d36bcd07b7d2045e7106b107efcac7ca3a
SHA5126a0a7e66ee878512946df73c41c041b64e3aa7aaa71cb062005d1fb481434692c7c4627b328164a6fdd01333456e4552f76dee3e79cb01d96625f25b4892fd95
-
Filesize
553KB
MD5eb2e187519cd52b6ea556a65b8a50b00
SHA180798bcbbc00fa9148f4be977a21172ca8f6d813
SHA256f1ea93800c8b0630aee1aed8e51335dbb60c1f4b889d367a239249de48e055c5
SHA512535ad7d98c5dfa873b44aeccf02d5cfa7cccffe5bf74a934bf884578b5b612052b3ad82ad7a80e620fedcde3c924ebe8cc6337b1b206b2294e9bf56a11d060e0
-
Filesize
553KB
MD5eb2e187519cd52b6ea556a65b8a50b00
SHA180798bcbbc00fa9148f4be977a21172ca8f6d813
SHA256f1ea93800c8b0630aee1aed8e51335dbb60c1f4b889d367a239249de48e055c5
SHA512535ad7d98c5dfa873b44aeccf02d5cfa7cccffe5bf74a934bf884578b5b612052b3ad82ad7a80e620fedcde3c924ebe8cc6337b1b206b2294e9bf56a11d060e0
-
Filesize
308KB
MD5cd67051cd36da2099adaa81eaf506800
SHA1d2eb5a155960771a0e49f4fb3194dcae055e2e16
SHA25618c981ada3061c35a001e0c41e536d86f455c215b1c78c92896da848f12bbde2
SHA512d92aecac4842da2e621bbd63971c0dbe8a0090421251193dc497b0719f78894bfb958031276477e22fa17c6d08f2dc90fb9b9659d0da896229005f656b16a856
-
Filesize
308KB
MD5cd67051cd36da2099adaa81eaf506800
SHA1d2eb5a155960771a0e49f4fb3194dcae055e2e16
SHA25618c981ada3061c35a001e0c41e536d86f455c215b1c78c92896da848f12bbde2
SHA512d92aecac4842da2e621bbd63971c0dbe8a0090421251193dc497b0719f78894bfb958031276477e22fa17c6d08f2dc90fb9b9659d0da896229005f656b16a856
-
Filesize
366KB
MD5d498a7e421bb4b0f4f90058daf642d68
SHA14b7c80e164b131b09adf02c42e7b581a1f48d386
SHA25634e7782cb34725befbd3887051740a5f2906c2db065022eb56465932abb7c4a8
SHA51283ceef37a9ace9f01438a50af09be23d7074c26e71423decd3a096ab48829b313b2442efd2423c255b72a954759d39078f4e79cdcc41c074dacab8bcb4db9e68
-
Filesize
366KB
MD5d498a7e421bb4b0f4f90058daf642d68
SHA14b7c80e164b131b09adf02c42e7b581a1f48d386
SHA25634e7782cb34725befbd3887051740a5f2906c2db065022eb56465932abb7c4a8
SHA51283ceef37a9ace9f01438a50af09be23d7074c26e71423decd3a096ab48829b313b2442efd2423c255b72a954759d39078f4e79cdcc41c074dacab8bcb4db9e68