Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe
Resource
win10-20230220-en
General
-
Target
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe
-
Size
696KB
-
MD5
418b5ed53ab9315e02c9f1d3e809479e
-
SHA1
201ce1c30233401004ff113c1caece164cf39680
-
SHA256
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14
-
SHA512
df7137e9cc1e5ff6e82448a3c518f6a4f91044dc52bf5d21e66aa198ac3f6c4a3980c58c6b5358676e6835f6ac883dc2492f5b4b42a730b1e3ded6dab5cfd56a
-
SSDEEP
12288:iMr5y90HD7YGexJsWAF3CwFha1QOLjoZQZ2HKwzM1jJxZ+eFGz:ryW7ghU3nk1QO3hZcKoMh7Z+YQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1017.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/3480-181-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/3480-182-0x00000000026B0000-0x00000000026F4000-memory.dmp family_redline behavioral1/memory/3480-183-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-184-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-186-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-188-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-190-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-192-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-194-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-196-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-198-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-200-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-202-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-204-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-206-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-208-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-210-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-212-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-214-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-216-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral1/memory/3480-277-0x0000000004E40000-0x0000000004E50000-memory.dmp family_redline behavioral1/memory/3480-1103-0x0000000004E40000-0x0000000004E50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2508 un676654.exe 2560 pro1017.exe 3480 qu9851.exe 4956 si261208.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1017.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un676654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un676654.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2560 pro1017.exe 2560 pro1017.exe 3480 qu9851.exe 3480 qu9851.exe 4956 si261208.exe 4956 si261208.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 pro1017.exe Token: SeDebugPrivilege 3480 qu9851.exe Token: SeDebugPrivilege 4956 si261208.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2508 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 66 PID 2156 wrote to memory of 2508 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 66 PID 2156 wrote to memory of 2508 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 66 PID 2508 wrote to memory of 2560 2508 un676654.exe 67 PID 2508 wrote to memory of 2560 2508 un676654.exe 67 PID 2508 wrote to memory of 2560 2508 un676654.exe 67 PID 2508 wrote to memory of 3480 2508 un676654.exe 68 PID 2508 wrote to memory of 3480 2508 un676654.exe 68 PID 2508 wrote to memory of 3480 2508 un676654.exe 68 PID 2156 wrote to memory of 4956 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 70 PID 2156 wrote to memory of 4956 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 70 PID 2156 wrote to memory of 4956 2156 672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe"C:\Users\Admin\AppData\Local\Temp\672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b9dd4dd87ac629fc627d71ea5d32a410
SHA191dc83e5767168debb061b9f51fb8e5989373748
SHA256afd7952c383cbcb722ad15589835cf705faffee1832e17860656a824445a75b4
SHA512973e6af08b98486a58e47df7ece7b3f93b5c842aabb091026d2e04257f78c15d6d19f74da390b349f70d21146afbb78fd09d9e2b1114e8b5fccd565973c43a0b
-
Filesize
175KB
MD5b9dd4dd87ac629fc627d71ea5d32a410
SHA191dc83e5767168debb061b9f51fb8e5989373748
SHA256afd7952c383cbcb722ad15589835cf705faffee1832e17860656a824445a75b4
SHA512973e6af08b98486a58e47df7ece7b3f93b5c842aabb091026d2e04257f78c15d6d19f74da390b349f70d21146afbb78fd09d9e2b1114e8b5fccd565973c43a0b
-
Filesize
553KB
MD56baa2a383f3b2873f89995f85e7a39dd
SHA1035e93ddd3a74c04d50850a0d2cc327f2f953a5b
SHA25669b1352dd220f6b28a3a02a3aaf9f36ba2370591f798daba5a480d4a1f8a9d8d
SHA51247cd354777f85fa40f17d83c0f7380b5aef5026157da6f8e21798c393559bfd4d06e9c19e0b38144a028068999136ad714ba6c4006d049c4fd41b13abc222665
-
Filesize
553KB
MD56baa2a383f3b2873f89995f85e7a39dd
SHA1035e93ddd3a74c04d50850a0d2cc327f2f953a5b
SHA25669b1352dd220f6b28a3a02a3aaf9f36ba2370591f798daba5a480d4a1f8a9d8d
SHA51247cd354777f85fa40f17d83c0f7380b5aef5026157da6f8e21798c393559bfd4d06e9c19e0b38144a028068999136ad714ba6c4006d049c4fd41b13abc222665
-
Filesize
308KB
MD5537ad88d3fd3292646a2000adee89da3
SHA1ab25c5f2390c303b2d8d22e6ad07243ea4ee3e98
SHA2561cdfeb6a05afb05d2d1692f3ff8ef3f96def0abe461b1898f99df27f3be6996c
SHA512e4a34c043c2b1ef6cc0f65684107577650b2dbb43e3d1c1f1b0b6e0006ae8321b88f72e9c6b99a2ca72d73e4446186768a14027a8517fb4a4fc83d74e471f56e
-
Filesize
308KB
MD5537ad88d3fd3292646a2000adee89da3
SHA1ab25c5f2390c303b2d8d22e6ad07243ea4ee3e98
SHA2561cdfeb6a05afb05d2d1692f3ff8ef3f96def0abe461b1898f99df27f3be6996c
SHA512e4a34c043c2b1ef6cc0f65684107577650b2dbb43e3d1c1f1b0b6e0006ae8321b88f72e9c6b99a2ca72d73e4446186768a14027a8517fb4a4fc83d74e471f56e
-
Filesize
366KB
MD5192910c290f4e9b5e28301be6bff9b1e
SHA15f3c437d3a93b2a76120585505847d66fcda2e1b
SHA2569fba3023c7f633efc9eb1dcdef6be1bb687013b8a76ef7dc48a64cda648721ac
SHA51267977865db20326ff864efcd0c17c77e918ec2ce620d2dfa6fca69529d757c8dd437331032294f96dd934c5259bde842938b35d463df313d6f0b3b67d71673e6
-
Filesize
366KB
MD5192910c290f4e9b5e28301be6bff9b1e
SHA15f3c437d3a93b2a76120585505847d66fcda2e1b
SHA2569fba3023c7f633efc9eb1dcdef6be1bb687013b8a76ef7dc48a64cda648721ac
SHA51267977865db20326ff864efcd0c17c77e918ec2ce620d2dfa6fca69529d757c8dd437331032294f96dd934c5259bde842938b35d463df313d6f0b3b67d71673e6