Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:36
Static task
static1
Behavioral task
behavioral1
Sample
63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe
Resource
win10v2004-20230221-en
General
-
Target
63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe
-
Size
695KB
-
MD5
5837af1bdc881085c939f2a713ad9ad0
-
SHA1
506e9b2dbbe28eb3eea9cd25b459af6ce22ee660
-
SHA256
63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd
-
SHA512
039944f3dd933199a6d8b5064b6c6cf20184a4f94a8a2f1bc5dafd52ecaaef61d910ba0ea4fe59eaddff53d7283441ecc158d086a2c1ed902ca713f697a2ecd1
-
SSDEEP
12288:OMrfy90jAfyqUleFsn1pg4q/44GulfuMylW45jDDg1K+NzB6JJonKWkNWr:xypfyqUcsY4OdJuMylWO3EMSBmDNQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3067.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3067.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1920-191-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-192-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-194-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-196-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-198-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-200-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-202-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-204-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-207-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-212-0x0000000002690000-0x00000000026A0000-memory.dmp family_redline behavioral1/memory/1920-211-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-214-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-216-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-218-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-220-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-222-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-224-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-226-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1920-228-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2132 un260713.exe 2160 pro3067.exe 1920 qu9502.exe 1632 si619547.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3067.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un260713.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un260713.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2160 pro3067.exe 2160 pro3067.exe 1920 qu9502.exe 1920 qu9502.exe 1632 si619547.exe 1632 si619547.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2160 pro3067.exe Token: SeDebugPrivilege 1920 qu9502.exe Token: SeDebugPrivilege 1632 si619547.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2132 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 83 PID 2516 wrote to memory of 2132 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 83 PID 2516 wrote to memory of 2132 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 83 PID 2132 wrote to memory of 2160 2132 un260713.exe 84 PID 2132 wrote to memory of 2160 2132 un260713.exe 84 PID 2132 wrote to memory of 2160 2132 un260713.exe 84 PID 2132 wrote to memory of 1920 2132 un260713.exe 89 PID 2132 wrote to memory of 1920 2132 un260713.exe 89 PID 2132 wrote to memory of 1920 2132 un260713.exe 89 PID 2516 wrote to memory of 1632 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 93 PID 2516 wrote to memory of 1632 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 93 PID 2516 wrote to memory of 1632 2516 63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe"C:\Users\Admin\AppData\Local\Temp\63193bf557ecf54d331b25b030ae9267640197701af06d4d47e66f5f4fb15dbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260713.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3067.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9502.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9502.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si619547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si619547.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD543796136a76398c309e4d35951e9b550
SHA1848c5d205545444937d00b2fdd4d66523cf8300a
SHA256422eafef49c35b527f9a6fcc7f6258699b354c244b77b24c42e0df04a8a9adf5
SHA51212d8e35808a662c2108d39b5c03b5b6f8c506f0de8cb713d98b716cd53419a4cc5ee93fc45f00257853ca0375740b885ff5351f4828428086894602243246d18
-
Filesize
175KB
MD543796136a76398c309e4d35951e9b550
SHA1848c5d205545444937d00b2fdd4d66523cf8300a
SHA256422eafef49c35b527f9a6fcc7f6258699b354c244b77b24c42e0df04a8a9adf5
SHA51212d8e35808a662c2108d39b5c03b5b6f8c506f0de8cb713d98b716cd53419a4cc5ee93fc45f00257853ca0375740b885ff5351f4828428086894602243246d18
-
Filesize
553KB
MD5608fca90a9556886c1d1cf4111938fd7
SHA1826f97efdbfe2d14d5789c506a1bf519659b5a14
SHA2565483bc63d6d987da53d3a4e74db5ad4407c79a93c201da0887444e865dfa5455
SHA5122a7ed3ec80d83ee45effd64dc038b4b89968ccc291028874881fed9417c67a76bf126a2247124a1084cbd7683196ebf5b0f5be0bedc338c27d4464c0160568ef
-
Filesize
553KB
MD5608fca90a9556886c1d1cf4111938fd7
SHA1826f97efdbfe2d14d5789c506a1bf519659b5a14
SHA2565483bc63d6d987da53d3a4e74db5ad4407c79a93c201da0887444e865dfa5455
SHA5122a7ed3ec80d83ee45effd64dc038b4b89968ccc291028874881fed9417c67a76bf126a2247124a1084cbd7683196ebf5b0f5be0bedc338c27d4464c0160568ef
-
Filesize
308KB
MD59304731f9ed4a3e0843c80e1600dc380
SHA10e926a477698d9a8b28299b02b0f64b0341d27a7
SHA256c69aec68aa38449700009ea4280502f3ff15a78347f25b1fa0e8ec4df6edbd9e
SHA512fb4ce4c194c377f9ef2794e135ea1d5f263d59ccf990440cbe86757bc39281fe289ddc3762c8284ab177652ba5e447cd1a6703848b53412e5775c8f32618e6c3
-
Filesize
308KB
MD59304731f9ed4a3e0843c80e1600dc380
SHA10e926a477698d9a8b28299b02b0f64b0341d27a7
SHA256c69aec68aa38449700009ea4280502f3ff15a78347f25b1fa0e8ec4df6edbd9e
SHA512fb4ce4c194c377f9ef2794e135ea1d5f263d59ccf990440cbe86757bc39281fe289ddc3762c8284ab177652ba5e447cd1a6703848b53412e5775c8f32618e6c3
-
Filesize
366KB
MD50cd8bb50e83fe34ee51bb71339c0e550
SHA191fdbbe84998e0b60cf9b87ab795cb264f08bce2
SHA256c1c9b46cb2067a9a03162a3d982e73027e58189865c70733b9cef38c8dc6d03c
SHA512b21165f339096b6ce432f61e73a2be934251610439aacfdeea158014f3839ef8eef0ad268e5226d0efdb2e35091da73b0a592e2c517719207dcb38b0de9e54a0
-
Filesize
366KB
MD50cd8bb50e83fe34ee51bb71339c0e550
SHA191fdbbe84998e0b60cf9b87ab795cb264f08bce2
SHA256c1c9b46cb2067a9a03162a3d982e73027e58189865c70733b9cef38c8dc6d03c
SHA512b21165f339096b6ce432f61e73a2be934251610439aacfdeea158014f3839ef8eef0ad268e5226d0efdb2e35091da73b0a592e2c517719207dcb38b0de9e54a0