Analysis
-
max time kernel
56s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 19:59
Static task
static1
Behavioral task
behavioral1
Sample
6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe
Resource
win10-20230220-en
General
-
Target
6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe
-
Size
695KB
-
MD5
183de2383bbbacdabd21e2ddfb9dd30e
-
SHA1
efe3af25acc8fe376b80361009dd54e0273959ce
-
SHA256
6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370
-
SHA512
a3ee66774d2bd8028b75ead1ea52f9e99a0acab3a96b859a627f076a54dd0496d7498e3a0d2e45e1b622c41aff9e64c7f93df34e04f53fc5e9df76c574f2f914
-
SSDEEP
12288:BMr7y90UFm6pZk+xpuHN3NemaxgEkjoKFdehwiv1vPS/zN+uJpPKW6FA3n:ey7Zk+judNe1gEkjNFdep1ybNnPJ2Sn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0907.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3928-177-0x00000000026B0000-0x00000000026F6000-memory.dmp family_redline behavioral1/memory/3928-179-0x00000000051F0000-0x0000000005234000-memory.dmp family_redline behavioral1/memory/3928-182-0x0000000002730000-0x0000000002740000-memory.dmp family_redline behavioral1/memory/3928-183-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-186-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-184-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-188-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-190-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-192-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-194-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-196-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-198-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-200-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-202-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-204-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-206-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-208-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-210-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-212-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-214-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline behavioral1/memory/3928-216-0x00000000051F0000-0x000000000522F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4012 un011945.exe 2080 pro0907.exe 3928 qu4341.exe 4764 si177641.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0907.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2080 pro0907.exe 2080 pro0907.exe 3928 qu4341.exe 3928 qu4341.exe 4764 si177641.exe 4764 si177641.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 pro0907.exe Token: SeDebugPrivilege 3928 qu4341.exe Token: SeDebugPrivilege 4764 si177641.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4012 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 66 PID 2148 wrote to memory of 4012 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 66 PID 2148 wrote to memory of 4012 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 66 PID 4012 wrote to memory of 2080 4012 un011945.exe 67 PID 4012 wrote to memory of 2080 4012 un011945.exe 67 PID 4012 wrote to memory of 2080 4012 un011945.exe 67 PID 4012 wrote to memory of 3928 4012 un011945.exe 68 PID 4012 wrote to memory of 3928 4012 un011945.exe 68 PID 4012 wrote to memory of 3928 4012 un011945.exe 68 PID 2148 wrote to memory of 4764 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 70 PID 2148 wrote to memory of 4764 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 70 PID 2148 wrote to memory of 4764 2148 6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe"C:\Users\Admin\AppData\Local\Temp\6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5210d61a107c57d334bd2b6fdf734b85c
SHA13e2c6dc8be404eceeb9a96d729b4817cb27f1e6a
SHA25681a8b8eb0c549b2d8d1cb5f6fa37a9e64bced21c38f0951d3818ece4f07f6e68
SHA5126ebc774f07562d522cff31883a0e118f31a452de96371d33ced9c9681e7effb68e78aed37fd37a7f7f6ef43a22d221327355fcba2a28cb13a0dbafbf7e86a495
-
Filesize
175KB
MD5210d61a107c57d334bd2b6fdf734b85c
SHA13e2c6dc8be404eceeb9a96d729b4817cb27f1e6a
SHA25681a8b8eb0c549b2d8d1cb5f6fa37a9e64bced21c38f0951d3818ece4f07f6e68
SHA5126ebc774f07562d522cff31883a0e118f31a452de96371d33ced9c9681e7effb68e78aed37fd37a7f7f6ef43a22d221327355fcba2a28cb13a0dbafbf7e86a495
-
Filesize
553KB
MD52062b5e45c1762e48a7feaa9e89cbb86
SHA121ca1f6418076145cda1f65bfe6c813d586b24ca
SHA256269203b6b291848ee576abbfe186eccaebddb9e4dcc9392e7d4dca786299c174
SHA512fe27dc4eabb6f5d55694745b971129bdd06e8322f6749f92914ceb09bc67f5d99116e715bf4c1512bc8bdad9215febf400cdb616854522cc9f43fd3e0bef2edb
-
Filesize
553KB
MD52062b5e45c1762e48a7feaa9e89cbb86
SHA121ca1f6418076145cda1f65bfe6c813d586b24ca
SHA256269203b6b291848ee576abbfe186eccaebddb9e4dcc9392e7d4dca786299c174
SHA512fe27dc4eabb6f5d55694745b971129bdd06e8322f6749f92914ceb09bc67f5d99116e715bf4c1512bc8bdad9215febf400cdb616854522cc9f43fd3e0bef2edb
-
Filesize
308KB
MD52c715c370dc1dc3c4ae54d122ed45bbb
SHA1a3bb361d0fa9bc7e86cb36a7183d1862ccfc5757
SHA25635323a0fbf432d6d7d0b3059b00595c34a5588dff84c00374876d5f929edf1d1
SHA512734cea1266b557179088a21ae4f1d288b690098c71844c12cebb988b917caf8f42fb7ad51cbc75e228dee84136a1a4e1c49eb5ee20c0849e11997985f8079e3e
-
Filesize
308KB
MD52c715c370dc1dc3c4ae54d122ed45bbb
SHA1a3bb361d0fa9bc7e86cb36a7183d1862ccfc5757
SHA25635323a0fbf432d6d7d0b3059b00595c34a5588dff84c00374876d5f929edf1d1
SHA512734cea1266b557179088a21ae4f1d288b690098c71844c12cebb988b917caf8f42fb7ad51cbc75e228dee84136a1a4e1c49eb5ee20c0849e11997985f8079e3e
-
Filesize
366KB
MD5e4812d3d40bf33a9db4e29193e505d8b
SHA1524670d1fd500b499ae4506d66be2ab3a61a6aef
SHA2560f688337ca3c536a3eb7037795e7982e7f65799d0eebce356c79edad3c1c9a8c
SHA512c68c707483e58722d99b8c56dcb54442cdd6c424e1ebc960f1a70f308874f17a7510ac4bf0f0f0e195b00dcec5b5197141fce7db1177834da079e855cecb85f4
-
Filesize
366KB
MD5e4812d3d40bf33a9db4e29193e505d8b
SHA1524670d1fd500b499ae4506d66be2ab3a61a6aef
SHA2560f688337ca3c536a3eb7037795e7982e7f65799d0eebce356c79edad3c1c9a8c
SHA512c68c707483e58722d99b8c56dcb54442cdd6c424e1ebc960f1a70f308874f17a7510ac4bf0f0f0e195b00dcec5b5197141fce7db1177834da079e855cecb85f4