Analysis
-
max time kernel
60s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:12
Static task
static1
Behavioral task
behavioral1
Sample
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe
Resource
win10v2004-20230220-en
General
-
Target
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe
-
Size
696KB
-
MD5
d2f2c2b3c76b086e06adc95b7b5c19e4
-
SHA1
c0d62277b2ef94a862c98f6e9ea344bd01e1dfc7
-
SHA256
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302
-
SHA512
ec9304b39014cbd4530a9d9af29132f8720ecb353b5b6b710d87e46b1e69bea21811e1d9e840547b809200a7a4b31fbcb293176675743bb657b5e7cca94e379e
-
SSDEEP
12288:9Mrdy90OF6wJIFUXedABUtJjLcGuPlh3+L5WD7MNzB36JKHw/9G8qbj:wyNLKFUXe75LcGelhQ5W/WBqQwqbj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8515.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8515.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2844-190-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-191-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-195-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-199-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-201-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-203-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-205-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-207-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-209-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-211-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-213-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-215-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-217-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-219-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-221-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-223-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-225-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/2844-227-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1216 un729074.exe 2152 pro8515.exe 2844 qu3281.exe 4036 si974193.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8515.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un729074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un729074.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2152 pro8515.exe 2152 pro8515.exe 2844 qu3281.exe 2844 qu3281.exe 4036 si974193.exe 4036 si974193.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2152 pro8515.exe Token: SeDebugPrivilege 2844 qu3281.exe Token: SeDebugPrivilege 4036 si974193.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1216 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 83 PID 1168 wrote to memory of 1216 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 83 PID 1168 wrote to memory of 1216 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 83 PID 1216 wrote to memory of 2152 1216 un729074.exe 84 PID 1216 wrote to memory of 2152 1216 un729074.exe 84 PID 1216 wrote to memory of 2152 1216 un729074.exe 84 PID 1216 wrote to memory of 2844 1216 un729074.exe 89 PID 1216 wrote to memory of 2844 1216 un729074.exe 89 PID 1216 wrote to memory of 2844 1216 un729074.exe 89 PID 1168 wrote to memory of 4036 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 94 PID 1168 wrote to memory of 4036 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 94 PID 1168 wrote to memory of 4036 1168 7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe"C:\Users\Admin\AppData\Local\Temp\7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un729074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un729074.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8515.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3281.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si974193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si974193.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f27b1ddeec37f413ea872d35c4aa88dc
SHA18cfef5f2d7a55f9fe5785226feead7ce0fdc6cd5
SHA2562ca3eecdb40d61bedd5ec3f6cf67e850f582187f00de262dc79765a9a28ab2a3
SHA512a96ac5b5b328d8745a0813da3c6cdc680cb7c4b8912566f18c1fa87e538d336e4c3f97c71ef742ff44fce66f4abd0c5a634b0ce2a074e4bf5584bf0d1539c823
-
Filesize
175KB
MD5f27b1ddeec37f413ea872d35c4aa88dc
SHA18cfef5f2d7a55f9fe5785226feead7ce0fdc6cd5
SHA2562ca3eecdb40d61bedd5ec3f6cf67e850f582187f00de262dc79765a9a28ab2a3
SHA512a96ac5b5b328d8745a0813da3c6cdc680cb7c4b8912566f18c1fa87e538d336e4c3f97c71ef742ff44fce66f4abd0c5a634b0ce2a074e4bf5584bf0d1539c823
-
Filesize
553KB
MD5594e829bbd166b598f13c34a44819dec
SHA1b990f2a26aecba50e33eb9c546e12930bf56505d
SHA256c2ee5878fcd67fd3d5663a894bd6f3987a81b3aa38d672f708e55680794e22d6
SHA5126e20f90549eb92e1ecf8c82a286a0af8e7f50f4d1f3582e66e415c2f74ee1b9c05528fcd9623371a9be696e61ba5209522fb44da2314479f0f8d648a596c9d0e
-
Filesize
553KB
MD5594e829bbd166b598f13c34a44819dec
SHA1b990f2a26aecba50e33eb9c546e12930bf56505d
SHA256c2ee5878fcd67fd3d5663a894bd6f3987a81b3aa38d672f708e55680794e22d6
SHA5126e20f90549eb92e1ecf8c82a286a0af8e7f50f4d1f3582e66e415c2f74ee1b9c05528fcd9623371a9be696e61ba5209522fb44da2314479f0f8d648a596c9d0e
-
Filesize
308KB
MD5c52775266429c930d5ad790e0e52d6e9
SHA12194cf01de5c2021391a9843347a22a9609b1c2d
SHA25608ea6b109b4f2828686c8eb18db5496d4e8e3e695a2c913e6ced2623130e0f71
SHA512f5ed76e1fdc6add71d9e59edcbba20de6198cfd3561a092b45dedd919e4ced24a40412cd607a206d39f66561d3ab90ed41face6deb0e7b4aea57821cf2c85bbf
-
Filesize
308KB
MD5c52775266429c930d5ad790e0e52d6e9
SHA12194cf01de5c2021391a9843347a22a9609b1c2d
SHA25608ea6b109b4f2828686c8eb18db5496d4e8e3e695a2c913e6ced2623130e0f71
SHA512f5ed76e1fdc6add71d9e59edcbba20de6198cfd3561a092b45dedd919e4ced24a40412cd607a206d39f66561d3ab90ed41face6deb0e7b4aea57821cf2c85bbf
-
Filesize
366KB
MD5e492938316c848883c7c120458c9ec57
SHA12708064940fcae8c4fd70bbdbfd6ece93babb27e
SHA256b9bd3b5102cc9ec9e24135f60d1ca74e80d1c9c10c932d5927eabb4ae763f734
SHA512b133ac852d0643330a2c1fb2a6f64e1f537309a364080703e861df6fb6cafe273e6a8f95578d9c0a3c0de0b6428180a9b6b4c2cded47cf286f657482525c3dd2
-
Filesize
366KB
MD5e492938316c848883c7c120458c9ec57
SHA12708064940fcae8c4fd70bbdbfd6ece93babb27e
SHA256b9bd3b5102cc9ec9e24135f60d1ca74e80d1c9c10c932d5927eabb4ae763f734
SHA512b133ac852d0643330a2c1fb2a6f64e1f537309a364080703e861df6fb6cafe273e6a8f95578d9c0a3c0de0b6428180a9b6b4c2cded47cf286f657482525c3dd2