Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:01
Static task
static1
Behavioral task
behavioral1
Sample
f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe
Resource
win10v2004-20230221-en
General
-
Target
f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe
-
Size
696KB
-
MD5
47b0db360cf5cf1f3bc93fc1eba71415
-
SHA1
73632ed7deaed2fd0377c6f6456f31a11671e41c
-
SHA256
f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621
-
SHA512
2cbf30aef1794fd6f0c067bf08ff155905d6190005622e54f9fa157a5a2b8076a01193cbcaf6faddd8f4c5d4f7ba575d6452cb2e82795e9345798a2dd01f5ada
-
SSDEEP
12288:dMrJy90RFOsS5Vz6b3CfWh6IUhctrt593cHrqzyIkJQAdCY5h:cySFdw86tmtR593cHrmyna3K
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5178.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5178.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2692-190-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-191-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-193-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-195-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-197-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-199-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-201-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-203-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-205-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-207-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-209-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-211-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-213-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-215-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-217-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-219-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-223-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/2692-226-0x0000000002720000-0x0000000002730000-memory.dmp family_redline behavioral1/memory/2692-227-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2244 un588845.exe 4040 pro5178.exe 2692 qu1645.exe 4220 si270055.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5178.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un588845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un588845.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 pro5178.exe 4040 pro5178.exe 2692 qu1645.exe 2692 qu1645.exe 4220 si270055.exe 4220 si270055.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4040 pro5178.exe Token: SeDebugPrivilege 2692 qu1645.exe Token: SeDebugPrivilege 4220 si270055.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2244 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 76 PID 4824 wrote to memory of 2244 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 76 PID 4824 wrote to memory of 2244 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 76 PID 2244 wrote to memory of 4040 2244 un588845.exe 77 PID 2244 wrote to memory of 4040 2244 un588845.exe 77 PID 2244 wrote to memory of 4040 2244 un588845.exe 77 PID 2244 wrote to memory of 2692 2244 un588845.exe 83 PID 2244 wrote to memory of 2692 2244 un588845.exe 83 PID 2244 wrote to memory of 2692 2244 un588845.exe 83 PID 4824 wrote to memory of 4220 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 84 PID 4824 wrote to memory of 4220 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 84 PID 4824 wrote to memory of 4220 4824 f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe"C:\Users\Admin\AppData\Local\Temp\f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57410f183ae0154ff46dba8a83f156c93
SHA1962ab8910b3a99a7e2601c477f952174710ce8e8
SHA2564e9d048b752295c77d152ce1fbe242d42eccdb545a799a3bcb8e50644a45473c
SHA5124c60106593eefd9bee8b9b716040f495d3f6c420d0fcb82d3a5bbe071f4622373c4adb20a1b5961c75f18ca65b04dc99732b66e89bb0e8dec837adca5fc759ec
-
Filesize
175KB
MD57410f183ae0154ff46dba8a83f156c93
SHA1962ab8910b3a99a7e2601c477f952174710ce8e8
SHA2564e9d048b752295c77d152ce1fbe242d42eccdb545a799a3bcb8e50644a45473c
SHA5124c60106593eefd9bee8b9b716040f495d3f6c420d0fcb82d3a5bbe071f4622373c4adb20a1b5961c75f18ca65b04dc99732b66e89bb0e8dec837adca5fc759ec
-
Filesize
553KB
MD5f62b7e7962fd778b7c8b449d79380a51
SHA102ffd82a0f086e3c75807f013e7054e1bd533062
SHA2569d893a298bd5bda2b0b824807c6262a636005d764155d01c17a03b0381eec68a
SHA5122aa8b874553db22ea7e0249f7030194f75bff51e3a360060e75fc36c6bbc10f5e19d5668df8f105023ba0a3af52209fabf7f70ab2c75df9bfba8675223c89811
-
Filesize
553KB
MD5f62b7e7962fd778b7c8b449d79380a51
SHA102ffd82a0f086e3c75807f013e7054e1bd533062
SHA2569d893a298bd5bda2b0b824807c6262a636005d764155d01c17a03b0381eec68a
SHA5122aa8b874553db22ea7e0249f7030194f75bff51e3a360060e75fc36c6bbc10f5e19d5668df8f105023ba0a3af52209fabf7f70ab2c75df9bfba8675223c89811
-
Filesize
308KB
MD57d07571e85cb41882b2226667428e1b0
SHA1497c752ec067ace4491f2434f99d41164b35e033
SHA256dd73c5d50480e00389464f78d8f71a0aef443c7ce1fb2d0a03de848333c9e745
SHA512bc7ccc05fad65a6f4f0247a263c58cae9ae828314dd93a41311403956c776fe0c7bf1392af1b0fcd60688ac81a68bc522519c9416fe561fe2b41dbe1a902ccb7
-
Filesize
308KB
MD57d07571e85cb41882b2226667428e1b0
SHA1497c752ec067ace4491f2434f99d41164b35e033
SHA256dd73c5d50480e00389464f78d8f71a0aef443c7ce1fb2d0a03de848333c9e745
SHA512bc7ccc05fad65a6f4f0247a263c58cae9ae828314dd93a41311403956c776fe0c7bf1392af1b0fcd60688ac81a68bc522519c9416fe561fe2b41dbe1a902ccb7
-
Filesize
366KB
MD57895f3adcf78997e33e6590818a5885c
SHA165a3e8086132e4bd291e79030dcf3ad732f418a3
SHA2563f7b2256120698d499ee043d413470a2fee66bfa2f25736cdd1f6ea33b6e6c7e
SHA512571393217a74ca1f1af3ce09dee12be6252737d79c415626fd8dc20961ed6a2297697c28fe855b168c217fa9b91d34b7b7ebb22975ff2980d8a897610673f9da
-
Filesize
366KB
MD57895f3adcf78997e33e6590818a5885c
SHA165a3e8086132e4bd291e79030dcf3ad732f418a3
SHA2563f7b2256120698d499ee043d413470a2fee66bfa2f25736cdd1f6ea33b6e6c7e
SHA512571393217a74ca1f1af3ce09dee12be6252737d79c415626fd8dc20961ed6a2297697c28fe855b168c217fa9b91d34b7b7ebb22975ff2980d8a897610673f9da