Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:03
Static task
static1
Behavioral task
behavioral1
Sample
3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe
Resource
win10v2004-20230220-en
General
-
Target
3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe
-
Size
695KB
-
MD5
42102040a5e19eab9d159b4920f0b1e5
-
SHA1
96f3f6d1d19bd6c7891d5da864b0a0a5e5869190
-
SHA256
3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094
-
SHA512
d4a6191cc38f2b0f6c29a3bd865712b792b9f37e6b036516c34c45fd7afb886fcd2aeecdbadedd7302ff779fc5d44cb7d5d6e19428e05274b3bdc1714f90d513
-
SSDEEP
12288:4Mrny90nv1Np/EZX/aX1B+FSMI7MT7zM3CaYbQsYKzeQUJOmVV6sAX:Pyk+ZvnFvI7MT7zMSZe1husAX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5583.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5583.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4696-191-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-192-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-194-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-196-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-198-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-200-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-202-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-204-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-206-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-208-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-210-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-212-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-214-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-216-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-218-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-221-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-224-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/4696-227-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1496 un081258.exe 4256 pro5583.exe 4696 qu7047.exe 4188 si058441.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5583.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un081258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un081258.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3152 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4256 pro5583.exe 4256 pro5583.exe 4696 qu7047.exe 4696 qu7047.exe 4188 si058441.exe 4188 si058441.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4256 pro5583.exe Token: SeDebugPrivilege 4696 qu7047.exe Token: SeDebugPrivilege 4188 si058441.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1496 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 82 PID 4324 wrote to memory of 1496 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 82 PID 4324 wrote to memory of 1496 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 82 PID 1496 wrote to memory of 4256 1496 un081258.exe 83 PID 1496 wrote to memory of 4256 1496 un081258.exe 83 PID 1496 wrote to memory of 4256 1496 un081258.exe 83 PID 1496 wrote to memory of 4696 1496 un081258.exe 87 PID 1496 wrote to memory of 4696 1496 un081258.exe 87 PID 1496 wrote to memory of 4696 1496 un081258.exe 87 PID 4324 wrote to memory of 4188 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 89 PID 4324 wrote to memory of 4188 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 89 PID 4324 wrote to memory of 4188 4324 3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe"C:\Users\Admin\AppData\Local\Temp\3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5221dd7201af8c1ea9b7ba2febb8914ef
SHA1c7fd2f7c39341c8791702bcd0bae143d2f484e6e
SHA2563d62bd18c58ab9b3b90df84fcbc1fbf50b5ed5afb105c3da84e788886b8d5571
SHA512bce872d9ab650b3b70fbbf6c6a2d81b3dc0faa8f894189e9ea3bbdf5f9ae73579a9006d2593b9fab8a4852cc71e9deeb70089f9525e4074ca13a9258617afa2b
-
Filesize
175KB
MD5221dd7201af8c1ea9b7ba2febb8914ef
SHA1c7fd2f7c39341c8791702bcd0bae143d2f484e6e
SHA2563d62bd18c58ab9b3b90df84fcbc1fbf50b5ed5afb105c3da84e788886b8d5571
SHA512bce872d9ab650b3b70fbbf6c6a2d81b3dc0faa8f894189e9ea3bbdf5f9ae73579a9006d2593b9fab8a4852cc71e9deeb70089f9525e4074ca13a9258617afa2b
-
Filesize
553KB
MD5fce13f906d7053b6b322b7f9b6877a35
SHA1d8691a7e93337c1515714ec0b3dda182dd23ad72
SHA2567ea9dd856034506b7c870dbb7aa0b8eea79c0aa807b193addade4c4b21d2e181
SHA51280e956bfd02903c22754b4eaff0e06d3e75deb243a57e1ddcb196a0bb986e92c1841311718a2bae2836598363f8d178323f9a9c719743847cdf6d448752a218e
-
Filesize
553KB
MD5fce13f906d7053b6b322b7f9b6877a35
SHA1d8691a7e93337c1515714ec0b3dda182dd23ad72
SHA2567ea9dd856034506b7c870dbb7aa0b8eea79c0aa807b193addade4c4b21d2e181
SHA51280e956bfd02903c22754b4eaff0e06d3e75deb243a57e1ddcb196a0bb986e92c1841311718a2bae2836598363f8d178323f9a9c719743847cdf6d448752a218e
-
Filesize
308KB
MD519bf36b0b43f5532448884b4bbe339a5
SHA14cd6882b45abcb7e172b52c8d33df3af3eaf1d89
SHA25604075e40c5800818621c6eac80e39ed7a27da9ff684398e09655bbbf9bb25a4c
SHA512c3087b38d8dd31c9aed8ba0dce53e0dd784b4eb36578be1881b9c8a16c88c2d00a6ff5ff759e1336b59e683b4e151e496f3d31f39d9749a9eaa46c019b9be446
-
Filesize
308KB
MD519bf36b0b43f5532448884b4bbe339a5
SHA14cd6882b45abcb7e172b52c8d33df3af3eaf1d89
SHA25604075e40c5800818621c6eac80e39ed7a27da9ff684398e09655bbbf9bb25a4c
SHA512c3087b38d8dd31c9aed8ba0dce53e0dd784b4eb36578be1881b9c8a16c88c2d00a6ff5ff759e1336b59e683b4e151e496f3d31f39d9749a9eaa46c019b9be446
-
Filesize
366KB
MD515aed3ba0aa40b18e4596259360dd5e4
SHA1241fec4f3f2a825975be429fe820efc1450f53cc
SHA256f26e021de2b0cf47921b3c2c9cc2bd4c7d662e26f8e55ac289ae5938e2e119f7
SHA512067f88fce6b77c182e3c88cb3daf94398336d28641a8e26162985ae709759620d6927a45440c89bf29fc42e33e403110fc073f34893f8993406d87d7e633bbb0
-
Filesize
366KB
MD515aed3ba0aa40b18e4596259360dd5e4
SHA1241fec4f3f2a825975be429fe820efc1450f53cc
SHA256f26e021de2b0cf47921b3c2c9cc2bd4c7d662e26f8e55ac289ae5938e2e119f7
SHA512067f88fce6b77c182e3c88cb3daf94398336d28641a8e26162985ae709759620d6927a45440c89bf29fc42e33e403110fc073f34893f8993406d87d7e633bbb0