Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:05
Static task
static1
Behavioral task
behavioral1
Sample
00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe
Resource
win10v2004-20230220-en
General
-
Target
00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe
-
Size
694KB
-
MD5
e523a28ef765b891f65e2cb086bd29b3
-
SHA1
f212163b08065a6368fd5986f62916bbc27e0c25
-
SHA256
00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf
-
SHA512
ad58e9047768f35fd92877354ebc9ae76b891a3f49678b1de0e4616208a8c1615f343c63aadbbe4050ad667d1d39ccd297966a4d0e10fb79c5bf900eea5e1310
-
SSDEEP
12288:VMrIy90KpuNkkA0Vgqq5DtWmMzIpyTvPS2zIrYJZvv3n:pyLQkmgqq5xXMzIqyyI0f3X
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1756.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1756.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/848-189-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-190-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-192-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-194-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-196-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-198-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-200-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-202-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-204-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-206-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-208-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-210-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-212-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-214-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-216-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-218-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-220-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-222-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/848-507-0x0000000002750000-0x0000000002760000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4632 un666560.exe 1028 pro1756.exe 848 qu9564.exe 1304 si577635.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1756.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un666560.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un666560.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2180 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1028 pro1756.exe 1028 pro1756.exe 848 qu9564.exe 848 qu9564.exe 1304 si577635.exe 1304 si577635.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1028 pro1756.exe Token: SeDebugPrivilege 848 qu9564.exe Token: SeDebugPrivilege 1304 si577635.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4632 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 85 PID 4232 wrote to memory of 4632 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 85 PID 4232 wrote to memory of 4632 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 85 PID 4632 wrote to memory of 1028 4632 un666560.exe 86 PID 4632 wrote to memory of 1028 4632 un666560.exe 86 PID 4632 wrote to memory of 1028 4632 un666560.exe 86 PID 4632 wrote to memory of 848 4632 un666560.exe 90 PID 4632 wrote to memory of 848 4632 un666560.exe 90 PID 4632 wrote to memory of 848 4632 un666560.exe 90 PID 4232 wrote to memory of 1304 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 92 PID 4232 wrote to memory of 1304 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 92 PID 4232 wrote to memory of 1304 4232 00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe"C:\Users\Admin\AppData\Local\Temp\00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD595c70b11dffd6630f080638131eda6a3
SHA1a3552161b19f6b029cacc34d60bbe6239358fa05
SHA2567112a7b18c84129d8d6d3d6107e3b97118928d9bb540bc3134506d50f6d53e5c
SHA5121a66c3578e6256b9640dc2b15ba9a893bf29827b6e309539ffae4c684fdd228f4558a38b522d7c03c2e31046233c244ef63ec0a1197279e1b7dfe9743bd148e1
-
Filesize
175KB
MD595c70b11dffd6630f080638131eda6a3
SHA1a3552161b19f6b029cacc34d60bbe6239358fa05
SHA2567112a7b18c84129d8d6d3d6107e3b97118928d9bb540bc3134506d50f6d53e5c
SHA5121a66c3578e6256b9640dc2b15ba9a893bf29827b6e309539ffae4c684fdd228f4558a38b522d7c03c2e31046233c244ef63ec0a1197279e1b7dfe9743bd148e1
-
Filesize
552KB
MD517133c50dbef29f27e58523904368e74
SHA1ce7bb3656d053b57b9e7542c92dc917b83f54696
SHA2563029ee3607b4d462d314907cfa8af82712f6957638fdb049c596831533d8304e
SHA512dc7b28423711b376c9bc898193b107de491905e7f79062ce4f12aa737a24c3caa766ef9e35ea0a5fe720191614ff7a8062ebb6ea259f176f5941adf9557965af
-
Filesize
552KB
MD517133c50dbef29f27e58523904368e74
SHA1ce7bb3656d053b57b9e7542c92dc917b83f54696
SHA2563029ee3607b4d462d314907cfa8af82712f6957638fdb049c596831533d8304e
SHA512dc7b28423711b376c9bc898193b107de491905e7f79062ce4f12aa737a24c3caa766ef9e35ea0a5fe720191614ff7a8062ebb6ea259f176f5941adf9557965af
-
Filesize
308KB
MD5c47c742f3059d2fbc2d95cbedd6f28b4
SHA1b0aa456756d0d38809b9fe3bb3079ac42ebadc95
SHA2560f3581b854d86f5ac97a73db1ccfd0d812d6ff375105b7fec2e403a43f9dd5e1
SHA512a028f6c531d96895229f7dbdc44275013d148b9593168eb76222aec297072691a61f34947175cfd64e4e61d6d22a90738a25215891fd6a2d8ba02d6b85bfe638
-
Filesize
308KB
MD5c47c742f3059d2fbc2d95cbedd6f28b4
SHA1b0aa456756d0d38809b9fe3bb3079ac42ebadc95
SHA2560f3581b854d86f5ac97a73db1ccfd0d812d6ff375105b7fec2e403a43f9dd5e1
SHA512a028f6c531d96895229f7dbdc44275013d148b9593168eb76222aec297072691a61f34947175cfd64e4e61d6d22a90738a25215891fd6a2d8ba02d6b85bfe638
-
Filesize
366KB
MD5244c5c85843e54c965568c66897b36aa
SHA12eeaac589be4419c76847480f6d49efbc9751512
SHA2563a05b40cbcd14c5a2dcfa3b820d4865821f0c64ae79326c8ae4c3ded1c129e71
SHA5123e505257196c0e8cbe1b17aebd158e2e17eeb83dfadce64f4a25b1a851d9c63d6e62daf9314ff5ed95c69ca5dd6a0d6179c8c753e6499479cf06affe29a03b4f
-
Filesize
366KB
MD5244c5c85843e54c965568c66897b36aa
SHA12eeaac589be4419c76847480f6d49efbc9751512
SHA2563a05b40cbcd14c5a2dcfa3b820d4865821f0c64ae79326c8ae4c3ded1c129e71
SHA5123e505257196c0e8cbe1b17aebd158e2e17eeb83dfadce64f4a25b1a851d9c63d6e62daf9314ff5ed95c69ca5dd6a0d6179c8c753e6499479cf06affe29a03b4f