Analysis
-
max time kernel
85s -
max time network
88s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:13
Static task
static1
Behavioral task
behavioral1
Sample
6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe
Resource
win10-20230220-en
General
-
Target
6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe
-
Size
696KB
-
MD5
f65eea1d654a775d9239f7d6f40b6a53
-
SHA1
cc679e7dacbd3f65a7d95a7a1acda573f0a0523e
-
SHA256
6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336
-
SHA512
e5689623521f17e05af193518ad5df30c4fefa493f9ec8b2c06be3f614a41028455a1e30ec6cad40f6efde8c53db6d3e3f46c531a15036aa91a5563c4015c0f6
-
SSDEEP
12288:GMrVy90ERy5z4LxZlasVEG3FeAshNRkv3hFvTCvjzhGwBVzI2za+oJb9Ihn2:7ylRs4LryaehGjTCvJGwP7abjIB2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9726.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/3724-178-0x0000000002440000-0x0000000002486000-memory.dmp family_redline behavioral1/memory/3724-179-0x0000000004CC0000-0x0000000004D04000-memory.dmp family_redline behavioral1/memory/3724-180-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-181-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-183-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-185-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-187-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-189-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3724-1100-0x0000000004D20000-0x0000000004D30000-memory.dmp family_redline behavioral1/memory/3724-1101-0x0000000004D20000-0x0000000004D30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4000 un201059.exe 4504 pro9726.exe 3724 qu1448.exe 4652 si405070.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9726.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un201059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un201059.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 pro9726.exe 4504 pro9726.exe 3724 qu1448.exe 3724 qu1448.exe 4652 si405070.exe 4652 si405070.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 pro9726.exe Token: SeDebugPrivilege 3724 qu1448.exe Token: SeDebugPrivilege 4652 si405070.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3956 wrote to memory of 4000 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 66 PID 3956 wrote to memory of 4000 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 66 PID 3956 wrote to memory of 4000 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 66 PID 4000 wrote to memory of 4504 4000 un201059.exe 67 PID 4000 wrote to memory of 4504 4000 un201059.exe 67 PID 4000 wrote to memory of 4504 4000 un201059.exe 67 PID 4000 wrote to memory of 3724 4000 un201059.exe 68 PID 4000 wrote to memory of 3724 4000 un201059.exe 68 PID 4000 wrote to memory of 3724 4000 un201059.exe 68 PID 3956 wrote to memory of 4652 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 70 PID 3956 wrote to memory of 4652 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 70 PID 3956 wrote to memory of 4652 3956 6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe"C:\Users\Admin\AppData\Local\Temp\6ff73ed03efb93a5b9b4d74d5ffc1b4e8c530e22993dbd81b4f20b8d71048336.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201059.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9726.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1448.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si405070.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si405070.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5182c04e207c1cd76300b5df22d523723
SHA10a9194741cc9430b97c39d2879123f45ae2b3e1a
SHA2563c749ae0b5695afa86c2c99c46c6ab756812e7b23699348f11350591bd3f6bbb
SHA51278a9303ab03526db6ad9e156881d4894629056d676bb2199c1f1d972d4dd5f80e0d83be97cfba65cda501e8f6539ca3564b6de58ecfee2eb9f09d69d1338e417
-
Filesize
175KB
MD5182c04e207c1cd76300b5df22d523723
SHA10a9194741cc9430b97c39d2879123f45ae2b3e1a
SHA2563c749ae0b5695afa86c2c99c46c6ab756812e7b23699348f11350591bd3f6bbb
SHA51278a9303ab03526db6ad9e156881d4894629056d676bb2199c1f1d972d4dd5f80e0d83be97cfba65cda501e8f6539ca3564b6de58ecfee2eb9f09d69d1338e417
-
Filesize
553KB
MD5b1bbf42cfe8eebb8044893125c55f804
SHA13f1aaf4945d786e892daa72f2474cafbb162f968
SHA256adb643c9b3970bcd2e3e039f052d93637c39af0d9cf4c93f62cbeb11b5fdebd6
SHA51239d412c455df41575ae9325b03c68bf9c360149e3eb14930f105ea53bb62bf16d3e7b1b714bb01e29e31167fc4ac5860003f4d5f27ebaae40b3b3e572667340f
-
Filesize
553KB
MD5b1bbf42cfe8eebb8044893125c55f804
SHA13f1aaf4945d786e892daa72f2474cafbb162f968
SHA256adb643c9b3970bcd2e3e039f052d93637c39af0d9cf4c93f62cbeb11b5fdebd6
SHA51239d412c455df41575ae9325b03c68bf9c360149e3eb14930f105ea53bb62bf16d3e7b1b714bb01e29e31167fc4ac5860003f4d5f27ebaae40b3b3e572667340f
-
Filesize
308KB
MD56e115c7e8babdf86b1246f08e42a10bf
SHA1ff767e7468da6d0e7b8ab6c5c8edf2f77b4b16bb
SHA256894ae5847420b90a528cf79168b9521bdfa4b34634a017280efb7f1be73a30be
SHA51238a3814678f05ca1cea22c8773c66f704dfc5c074e6595fe9b64f6829c7defa6ae9e60af649e8a19e7e605dbb55142113922b709be61d7f7a3bb71245975eaba
-
Filesize
308KB
MD56e115c7e8babdf86b1246f08e42a10bf
SHA1ff767e7468da6d0e7b8ab6c5c8edf2f77b4b16bb
SHA256894ae5847420b90a528cf79168b9521bdfa4b34634a017280efb7f1be73a30be
SHA51238a3814678f05ca1cea22c8773c66f704dfc5c074e6595fe9b64f6829c7defa6ae9e60af649e8a19e7e605dbb55142113922b709be61d7f7a3bb71245975eaba
-
Filesize
366KB
MD59d80e8f592d2744bac5f998dba5e883b
SHA16b1593980fc2eec96cce063205adacb5390bfa2c
SHA256b83f909aeff58fb07a93d4b4489225ed9d76b0334f017a892680d874e7d9fb7b
SHA5121b9589b5115ff7e312204a3c8002549b37cc24c5e55a80d5d3028f5e38160011d1b1ee232c08f19f2e2c5eb8aa3c5d7526534578c523c334901a9da0be21c7cc
-
Filesize
366KB
MD59d80e8f592d2744bac5f998dba5e883b
SHA16b1593980fc2eec96cce063205adacb5390bfa2c
SHA256b83f909aeff58fb07a93d4b4489225ed9d76b0334f017a892680d874e7d9fb7b
SHA5121b9589b5115ff7e312204a3c8002549b37cc24c5e55a80d5d3028f5e38160011d1b1ee232c08f19f2e2c5eb8aa3c5d7526534578c523c334901a9da0be21c7cc