Analysis
-
max time kernel
56s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:15
Static task
static1
Behavioral task
behavioral1
Sample
b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe
Resource
win10-20230220-en
General
-
Target
b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe
-
Size
695KB
-
MD5
bd61c76837b0bfe214297bfb76f1eef0
-
SHA1
474688cb7f9daee4b56d4d39d83c0dfb07be84a6
-
SHA256
b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d
-
SHA512
889d5316db01cc8cba6ab237f1065163795773a725df27969bcc16c8225627fd90311fd8f73cc479e76cffd2a4c0544a77f8e6b491a79a5cf3a52d923b0bfeab
-
SSDEEP
12288:5MrPy90by0l9sRb/6qwBPTxDtKMuU4SuPl28XBMvPSbz4uRJluqwtQo:KyOMRWqwB7xxSSel2yBMyX4+xwyo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2736-177-0x0000000002270000-0x00000000022B6000-memory.dmp family_redline behavioral1/memory/2736-178-0x0000000002500000-0x0000000002544000-memory.dmp family_redline behavioral1/memory/2736-179-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-182-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-180-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-184-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-186-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-188-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-190-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-192-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-194-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-196-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-198-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-200-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-202-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-204-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-206-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-208-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-210-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2736-212-0x0000000002500000-0x000000000253F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4116 un603549.exe 4112 pro2898.exe 2736 qu1367.exe 3776 si728008.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2898.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un603549.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un603549.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4112 pro2898.exe 4112 pro2898.exe 2736 qu1367.exe 2736 qu1367.exe 3776 si728008.exe 3776 si728008.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4112 pro2898.exe Token: SeDebugPrivilege 2736 qu1367.exe Token: SeDebugPrivilege 3776 si728008.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 352 wrote to memory of 4116 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 66 PID 352 wrote to memory of 4116 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 66 PID 352 wrote to memory of 4116 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 66 PID 4116 wrote to memory of 4112 4116 un603549.exe 67 PID 4116 wrote to memory of 4112 4116 un603549.exe 67 PID 4116 wrote to memory of 4112 4116 un603549.exe 67 PID 4116 wrote to memory of 2736 4116 un603549.exe 68 PID 4116 wrote to memory of 2736 4116 un603549.exe 68 PID 4116 wrote to memory of 2736 4116 un603549.exe 68 PID 352 wrote to memory of 3776 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 70 PID 352 wrote to memory of 3776 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 70 PID 352 wrote to memory of 3776 352 b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe"C:\Users\Admin\AppData\Local\Temp\b6f75b292cc62728b4eb2c43412464dd1e5fe73464b98a475b2e0d82a0087f3d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603549.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603549.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2898.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1367.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728008.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728008.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD527f7e55278b5c23881c2ca26c915032f
SHA1a8c986be33b572e7ca8295f96a8eef49a9850227
SHA256abcea29dd4a9c5122861f6198d36203927285a1799ccedfcfbfacbed69f4d7e2
SHA51209c44f762eaea044ece4b476b61704b9e298daa267c4d682dfd16461dabdfbbd1e3af16f3d02ce104cfd2679658ca5fc1336b0a2cf3906163db35f70048b5fd1
-
Filesize
175KB
MD527f7e55278b5c23881c2ca26c915032f
SHA1a8c986be33b572e7ca8295f96a8eef49a9850227
SHA256abcea29dd4a9c5122861f6198d36203927285a1799ccedfcfbfacbed69f4d7e2
SHA51209c44f762eaea044ece4b476b61704b9e298daa267c4d682dfd16461dabdfbbd1e3af16f3d02ce104cfd2679658ca5fc1336b0a2cf3906163db35f70048b5fd1
-
Filesize
553KB
MD537eb6fc0778240596112c87dbccece2d
SHA1bd4a067e6c91a4e612907eeee0cbe02097365566
SHA2569e95ff1641cb35d3bf4c96f21ea3c31602dbb7f61522c34aa45f89f7b97c28da
SHA5120f0dd0a2691651f97be674055e858fa854c8fc051ac14b9f747e1b894c1e65fed1652e6e382076fd4d003d77fe2e38add2e1053ae922d2465761819c25c37c79
-
Filesize
553KB
MD537eb6fc0778240596112c87dbccece2d
SHA1bd4a067e6c91a4e612907eeee0cbe02097365566
SHA2569e95ff1641cb35d3bf4c96f21ea3c31602dbb7f61522c34aa45f89f7b97c28da
SHA5120f0dd0a2691651f97be674055e858fa854c8fc051ac14b9f747e1b894c1e65fed1652e6e382076fd4d003d77fe2e38add2e1053ae922d2465761819c25c37c79
-
Filesize
308KB
MD567cdbfb17f341dd149b960bd4ab0ea8d
SHA115b02249e4b80e74ab19789c86f0064153576265
SHA256305331730030431ee755f21ec0dbaaea34aeec9915f3f3d84a545d14fa2881af
SHA512967681921a84d722308310c0d239df2b8a87dd8fad50e7346897b235ada4b18254ccf09787bbab8af33cf4a25f4ead24f906e179338bbed2d00290608a003222
-
Filesize
308KB
MD567cdbfb17f341dd149b960bd4ab0ea8d
SHA115b02249e4b80e74ab19789c86f0064153576265
SHA256305331730030431ee755f21ec0dbaaea34aeec9915f3f3d84a545d14fa2881af
SHA512967681921a84d722308310c0d239df2b8a87dd8fad50e7346897b235ada4b18254ccf09787bbab8af33cf4a25f4ead24f906e179338bbed2d00290608a003222
-
Filesize
366KB
MD5d2c078d8e637156db24a18892c975f93
SHA1477bf08b71ddab379307d218be7b12f7b4cdcc10
SHA2563f13c34c0c787e875ec9aa1188ed54d4d265d888c1edf3f38b57186fa057eded
SHA51203757e32e238e43740be5680044deeb86ecbd2d4e60974280415d9a288433857a0d5f2e48e712304aa6335007492bac08a9e755ccb5ec402855d6d7a1c959c35
-
Filesize
366KB
MD5d2c078d8e637156db24a18892c975f93
SHA1477bf08b71ddab379307d218be7b12f7b4cdcc10
SHA2563f13c34c0c787e875ec9aa1188ed54d4d265d888c1edf3f38b57186fa057eded
SHA51203757e32e238e43740be5680044deeb86ecbd2d4e60974280415d9a288433857a0d5f2e48e712304aa6335007492bac08a9e755ccb5ec402855d6d7a1c959c35