Analysis
-
max time kernel
52s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe
Resource
win10-20230220-en
General
-
Target
62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe
-
Size
695KB
-
MD5
7ad5e5f23ff2ff5aa9ef295168068566
-
SHA1
6cc8eb0bc4d2c996fe063dc2e6c8d9218ef9de8b
-
SHA256
62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b
-
SHA512
8cfe77ddd138e85a59eff40d8cea133e3325508c814b69f53e503d7f26e076450749b6ecab208d563c968c26d45c525bf0d9422669851d17145957c326316c50
-
SSDEEP
12288:LMrPy90czcoYr8Dsuwwl6plh3pVXe/21hZvPS4z/b7J6KN0MAf0U2I:kyJG8Dsurl6pHpwSPyg//rAaI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4348.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4744-181-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/4744-183-0x0000000002400000-0x0000000002444000-memory.dmp family_redline behavioral1/memory/4744-187-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-188-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-190-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-192-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-194-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-196-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-198-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-200-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-202-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-204-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-206-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-208-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-210-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-212-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-214-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-218-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-216-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/4744-220-0x0000000002400000-0x000000000243F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3488 un790192.exe 2692 pro4348.exe 4744 qu9428.exe 1276 si689889.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4348.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4348.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un790192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un790192.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 pro4348.exe 2692 pro4348.exe 4744 qu9428.exe 4744 qu9428.exe 1276 si689889.exe 1276 si689889.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro4348.exe Token: SeDebugPrivilege 4744 qu9428.exe Token: SeDebugPrivilege 1276 si689889.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3488 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 66 PID 4024 wrote to memory of 3488 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 66 PID 4024 wrote to memory of 3488 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 66 PID 3488 wrote to memory of 2692 3488 un790192.exe 67 PID 3488 wrote to memory of 2692 3488 un790192.exe 67 PID 3488 wrote to memory of 2692 3488 un790192.exe 67 PID 3488 wrote to memory of 4744 3488 un790192.exe 68 PID 3488 wrote to memory of 4744 3488 un790192.exe 68 PID 3488 wrote to memory of 4744 3488 un790192.exe 68 PID 4024 wrote to memory of 1276 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 70 PID 4024 wrote to memory of 1276 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 70 PID 4024 wrote to memory of 1276 4024 62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe"C:\Users\Admin\AppData\Local\Temp\62a6834dcacb00e998ca4428ebabd8c1fa73bff529aa07ebc0302d198927d90b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790192.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790192.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4348.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9428.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9428.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689889.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689889.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD556f86bd11bc328bbe395168c0c58437e
SHA1e07b485d5f489aa194bd3070b30505738fc586ed
SHA256a69cdef002d5b74a8e3e7ea191e5d670a167601fd3df81ccb9d33eb4a1f19362
SHA512050c3974d2a15f6b192e75b7e858b2e489a729d491e00e2eedff91c3e7c1ad972af8809ab2e56b961e2980f164d3f8f71e227e57513afd6eb2f1bd6cc61762b6
-
Filesize
175KB
MD556f86bd11bc328bbe395168c0c58437e
SHA1e07b485d5f489aa194bd3070b30505738fc586ed
SHA256a69cdef002d5b74a8e3e7ea191e5d670a167601fd3df81ccb9d33eb4a1f19362
SHA512050c3974d2a15f6b192e75b7e858b2e489a729d491e00e2eedff91c3e7c1ad972af8809ab2e56b961e2980f164d3f8f71e227e57513afd6eb2f1bd6cc61762b6
-
Filesize
553KB
MD59ff80bade274b3f9bae7c67b71fdf564
SHA1756aedb1b46ca87068fdde0e8a41185eb9010c81
SHA256db90dbc7c065a73a84539f548a805fc5c517e877a15c60c6982d05ec0e5358bb
SHA512204bd62041a830955a775cdb98a68c8c12e4ae22a85d41e1239dca06fa2395d74b19c6f457d8f01ee2916832396f61afb81267c2040208fb81721bf3d1cbd2b6
-
Filesize
553KB
MD59ff80bade274b3f9bae7c67b71fdf564
SHA1756aedb1b46ca87068fdde0e8a41185eb9010c81
SHA256db90dbc7c065a73a84539f548a805fc5c517e877a15c60c6982d05ec0e5358bb
SHA512204bd62041a830955a775cdb98a68c8c12e4ae22a85d41e1239dca06fa2395d74b19c6f457d8f01ee2916832396f61afb81267c2040208fb81721bf3d1cbd2b6
-
Filesize
308KB
MD5cef945b7d3e66873b22ae9d9c76f7ff4
SHA114a42b142610a7d37b3d961a492718094b348c84
SHA256c0ddef8dd43e9364d83793369f527936f4685c78787cf3a9fbb0120048d019f6
SHA512ebc1e1bc60924fdad47850a53ea160c93e78f11cfbc0f7ed85818b06783e97980186fdbc9b6bfab0b9402be7c8aa348c02388796a7370a0d9e71d6c94bda6ffc
-
Filesize
308KB
MD5cef945b7d3e66873b22ae9d9c76f7ff4
SHA114a42b142610a7d37b3d961a492718094b348c84
SHA256c0ddef8dd43e9364d83793369f527936f4685c78787cf3a9fbb0120048d019f6
SHA512ebc1e1bc60924fdad47850a53ea160c93e78f11cfbc0f7ed85818b06783e97980186fdbc9b6bfab0b9402be7c8aa348c02388796a7370a0d9e71d6c94bda6ffc
-
Filesize
366KB
MD5c44416a1d08c2269bd3a8216a03eff8d
SHA1a1e559d2e925634b416f551c28099ab77cff550e
SHA256b405bdc18965262cb2de7ff2b6b03e4b7628f991c36ade9d9417286fdbd69487
SHA51209c82b746e47d5d8c7b48e4013d65cfe9cfb6cc18893e7b1436d0b598df045e118a5be8ae4aef3550a5bfa783feafb44ff8684fb54d45911ae8683ebc087a15e
-
Filesize
366KB
MD5c44416a1d08c2269bd3a8216a03eff8d
SHA1a1e559d2e925634b416f551c28099ab77cff550e
SHA256b405bdc18965262cb2de7ff2b6b03e4b7628f991c36ade9d9417286fdbd69487
SHA51209c82b746e47d5d8c7b48e4013d65cfe9cfb6cc18893e7b1436d0b598df045e118a5be8ae4aef3550a5bfa783feafb44ff8684fb54d45911ae8683ebc087a15e