Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:07
Static task
static1
Behavioral task
behavioral1
Sample
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe
Resource
win10v2004-20230220-en
General
-
Target
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe
-
Size
696KB
-
MD5
c9922b38dddf2d3815af1b655d5cb24e
-
SHA1
47d9e67204afa0f75da59de6d515c75e8d46c680
-
SHA256
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465
-
SHA512
9bb801848938c24324fd5962b3b1153faaf54ce94fee138d89d65af7f5c492b7b3cc68e7590e5426cb2e83944eae9a7952feccf84df116d5d0d77916d54d6a64
-
SSDEEP
12288:VMrdy90yCM+7cuFcH7gVSa/hJkjaEEHL2Vdl/JzvHRJitEnqqrd6:Qy+I+nVjXEqId9Zvx2EX6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0619.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/912-190-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-191-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-193-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-197-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-200-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-202-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-204-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-206-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-208-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-210-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-212-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-214-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-216-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-218-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-220-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-222-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-224-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-226-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/912-1107-0x0000000004EB0000-0x0000000004EC0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1432 un713230.exe 4656 pro0619.exe 912 qu2695.exe 5116 si015714.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0619.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un713230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un713230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4656 pro0619.exe 4656 pro0619.exe 912 qu2695.exe 912 qu2695.exe 5116 si015714.exe 5116 si015714.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4656 pro0619.exe Token: SeDebugPrivilege 912 qu2695.exe Token: SeDebugPrivilege 5116 si015714.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1432 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 83 PID 1924 wrote to memory of 1432 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 83 PID 1924 wrote to memory of 1432 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 83 PID 1432 wrote to memory of 4656 1432 un713230.exe 84 PID 1432 wrote to memory of 4656 1432 un713230.exe 84 PID 1432 wrote to memory of 4656 1432 un713230.exe 84 PID 1432 wrote to memory of 912 1432 un713230.exe 89 PID 1432 wrote to memory of 912 1432 un713230.exe 89 PID 1432 wrote to memory of 912 1432 un713230.exe 89 PID 1924 wrote to memory of 5116 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 93 PID 1924 wrote to memory of 5116 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 93 PID 1924 wrote to memory of 5116 1924 ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe"C:\Users\Admin\AppData\Local\Temp\ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713230.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0619.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0619.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2695.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si015714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si015714.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f350d16c9f0f3ac515c606c9772e9538
SHA1261d8f4b513b9a46392bf64174290897c27c243e
SHA256b6636eefc797135fc3d1a3345baeb0be6fd251f3390f708a1b24c602ad81b88d
SHA51226f314cfff0bd0bbfe3937ead4902a03298a7587e61732424ded264782be38382b27465d948fce5038f29deb57659eb9802ddaadd86f43f29b23d3f79d500dfc
-
Filesize
175KB
MD5f350d16c9f0f3ac515c606c9772e9538
SHA1261d8f4b513b9a46392bf64174290897c27c243e
SHA256b6636eefc797135fc3d1a3345baeb0be6fd251f3390f708a1b24c602ad81b88d
SHA51226f314cfff0bd0bbfe3937ead4902a03298a7587e61732424ded264782be38382b27465d948fce5038f29deb57659eb9802ddaadd86f43f29b23d3f79d500dfc
-
Filesize
553KB
MD56c6b1facd67688a3b6a169a62245b7c2
SHA1b3070fa3b72475efc57d7ca891469da4b796bd5f
SHA256f8d20398c0237fd27032327f66408adcf79368f08573f48be481626c5974c3e1
SHA512e32380a4600d898b8045d8fa2b154e92374a1e1fd4f85abe971b962aab04c1bfe82f2fbd5e892522215d53e9638dd88e368a9ff85a3c20c9e77e14d0ae753cc3
-
Filesize
553KB
MD56c6b1facd67688a3b6a169a62245b7c2
SHA1b3070fa3b72475efc57d7ca891469da4b796bd5f
SHA256f8d20398c0237fd27032327f66408adcf79368f08573f48be481626c5974c3e1
SHA512e32380a4600d898b8045d8fa2b154e92374a1e1fd4f85abe971b962aab04c1bfe82f2fbd5e892522215d53e9638dd88e368a9ff85a3c20c9e77e14d0ae753cc3
-
Filesize
308KB
MD56f379817230f034eb8b501e99ccdbe67
SHA18e8a65b1b7371726499a9a729066dd376c12c870
SHA2563011ec88a65ab2e4f351587cca3a133b410242333e45eaa34e58c94b1f630482
SHA51229d614279e3c6ac8ee056e34098b8de89df343eeae008f123d642190327c00f08fa49da908d655e973e528a6684357a2d452732e3159e5ee7aaf190a04565698
-
Filesize
308KB
MD56f379817230f034eb8b501e99ccdbe67
SHA18e8a65b1b7371726499a9a729066dd376c12c870
SHA2563011ec88a65ab2e4f351587cca3a133b410242333e45eaa34e58c94b1f630482
SHA51229d614279e3c6ac8ee056e34098b8de89df343eeae008f123d642190327c00f08fa49da908d655e973e528a6684357a2d452732e3159e5ee7aaf190a04565698
-
Filesize
366KB
MD59d6bf65bb895360fabd71a67aea6bfb3
SHA1ca76c9eff92f0c847d1adff7c9ac5fdb2ab40845
SHA25623b613328ebc081fe4da65b60ea03422796e549ab9d60457485aeede9fafa39f
SHA5121707a21981b5075ce9a74b7467bccd7b07cf5a97ff0bad70d92649b68585f1273ff49d94934d03f1cc676da5ab161c63a8461065f371f65447da3360c0c78b97
-
Filesize
366KB
MD59d6bf65bb895360fabd71a67aea6bfb3
SHA1ca76c9eff92f0c847d1adff7c9ac5fdb2ab40845
SHA25623b613328ebc081fe4da65b60ea03422796e549ab9d60457485aeede9fafa39f
SHA5121707a21981b5075ce9a74b7467bccd7b07cf5a97ff0bad70d92649b68585f1273ff49d94934d03f1cc676da5ab161c63a8461065f371f65447da3360c0c78b97