Analysis
-
max time kernel
53s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:25
Static task
static1
Behavioral task
behavioral1
Sample
a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe
Resource
win10-20230220-en
General
-
Target
a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe
-
Size
695KB
-
MD5
b9719da2a6069dcfde3c9e6bc34aad0d
-
SHA1
1388b72a002c39ebdcd51b2de3f98eb3b15af1bc
-
SHA256
a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b
-
SHA512
034bd8cc92697b84549d53698fc8af509bfbda71334f1ffcc8e749b9cf3414f48003310c18ba88ef321b6343380cd739031f4f52341336579233e5b22f212a02
-
SSDEEP
12288:AMrky903WxjP2p8OGQG8Mw9wzM7msSzRcf2zdWqJdNAMcJ:UyLd2p8OS8nqzEmsSzRcad7raMS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7245.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4532-180-0x0000000000B00000-0x0000000000B46000-memory.dmp family_redline behavioral1/memory/4532-181-0x0000000002470000-0x00000000024B4000-memory.dmp family_redline behavioral1/memory/4532-183-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-182-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-185-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-187-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-189-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-191-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-193-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-195-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-197-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-199-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-201-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-203-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-205-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-207-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-209-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-211-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-213-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-215-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4532-1101-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5096 un512435.exe 2192 pro7245.exe 4532 qu4267.exe 4468 si716102.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7245.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un512435.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un512435.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2192 pro7245.exe 2192 pro7245.exe 4532 qu4267.exe 4532 qu4267.exe 4468 si716102.exe 4468 si716102.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2192 pro7245.exe Token: SeDebugPrivilege 4532 qu4267.exe Token: SeDebugPrivilege 4468 si716102.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4772 wrote to memory of 5096 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 66 PID 4772 wrote to memory of 5096 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 66 PID 4772 wrote to memory of 5096 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 66 PID 5096 wrote to memory of 2192 5096 un512435.exe 67 PID 5096 wrote to memory of 2192 5096 un512435.exe 67 PID 5096 wrote to memory of 2192 5096 un512435.exe 67 PID 5096 wrote to memory of 4532 5096 un512435.exe 68 PID 5096 wrote to memory of 4532 5096 un512435.exe 68 PID 5096 wrote to memory of 4532 5096 un512435.exe 68 PID 4772 wrote to memory of 4468 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 70 PID 4772 wrote to memory of 4468 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 70 PID 4772 wrote to memory of 4468 4772 a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe"C:\Users\Admin\AppData\Local\Temp\a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55d52484bdf910e199bb01707763f921c
SHA1b73d28cc8ccd458d71cc4dbe8e9556fd37afb975
SHA256e690a1a985a0bbd3314e82e91416a2701392c714818b448da32c7415f23e9492
SHA51246f3cbf8329b468264dfd636520825ff4c9f8903d31bbc9690609ae0a3ce2ea523f7c55efad32e3893e130bdc7b1fcea0cb48a5c1ca0748918ad33edea8adf30
-
Filesize
175KB
MD55d52484bdf910e199bb01707763f921c
SHA1b73d28cc8ccd458d71cc4dbe8e9556fd37afb975
SHA256e690a1a985a0bbd3314e82e91416a2701392c714818b448da32c7415f23e9492
SHA51246f3cbf8329b468264dfd636520825ff4c9f8903d31bbc9690609ae0a3ce2ea523f7c55efad32e3893e130bdc7b1fcea0cb48a5c1ca0748918ad33edea8adf30
-
Filesize
553KB
MD58dc50dc70161de0ef1369af4ea7f298f
SHA13310431fc7fb3a5339a4a8cb4ec08c165f391fd7
SHA256761e7cc82713d9bccb0d4417ab2a105941d1318158a015d555bef20bbba2293e
SHA512e0547e19b4e26bed761fdeab83838cf490e7874cfdb6f6e2b484498a1634d855e4f21ba6f0e4ce52e855ec86ec12c8267eda5dc1ff26e3695ee7b60a69cf8f7d
-
Filesize
553KB
MD58dc50dc70161de0ef1369af4ea7f298f
SHA13310431fc7fb3a5339a4a8cb4ec08c165f391fd7
SHA256761e7cc82713d9bccb0d4417ab2a105941d1318158a015d555bef20bbba2293e
SHA512e0547e19b4e26bed761fdeab83838cf490e7874cfdb6f6e2b484498a1634d855e4f21ba6f0e4ce52e855ec86ec12c8267eda5dc1ff26e3695ee7b60a69cf8f7d
-
Filesize
308KB
MD59d2b5751f704d3bb8cf2409adcdf290e
SHA1034857ccfce48ddfbb4546d5ccd6137152948639
SHA25687b410686dc8fd845806c116fcc74978f020b5f813cf172d30ab4c0cc5b425dc
SHA512dd98537cc3dcfcd857f3b16440b9d8743009b358b2e3b4149b9f6aecb4c2e6b5e189ff8d6c05338a2ec8f98e007c017f1f46bfb8521c5d6a44b6a07e33f60bb3
-
Filesize
308KB
MD59d2b5751f704d3bb8cf2409adcdf290e
SHA1034857ccfce48ddfbb4546d5ccd6137152948639
SHA25687b410686dc8fd845806c116fcc74978f020b5f813cf172d30ab4c0cc5b425dc
SHA512dd98537cc3dcfcd857f3b16440b9d8743009b358b2e3b4149b9f6aecb4c2e6b5e189ff8d6c05338a2ec8f98e007c017f1f46bfb8521c5d6a44b6a07e33f60bb3
-
Filesize
366KB
MD52b2fb0f74a4868bd1b59c75a8d1e7b78
SHA12bfb8d96bfbc10c662bd5f71e2ce9ab53a37d441
SHA2567231517b98605e7dcd9b18283350466a55834ec812b1b4aa61daa4118053541a
SHA512774b4a7f9f6254b4dc2fbd23446d43a4d61599c9017e0fe0cf9885d25d6020680ae8460775c6c208ee1117caa6694437240cfbd6997c860ff2305c4d880c23d6
-
Filesize
366KB
MD52b2fb0f74a4868bd1b59c75a8d1e7b78
SHA12bfb8d96bfbc10c662bd5f71e2ce9ab53a37d441
SHA2567231517b98605e7dcd9b18283350466a55834ec812b1b4aa61daa4118053541a
SHA512774b4a7f9f6254b4dc2fbd23446d43a4d61599c9017e0fe0cf9885d25d6020680ae8460775c6c208ee1117caa6694437240cfbd6997c860ff2305c4d880c23d6