Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:40
Static task
static1
Behavioral task
behavioral1
Sample
6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe
Resource
win10v2004-20230220-en
General
-
Target
6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe
-
Size
695KB
-
MD5
d0c32cd3ccb4bf84b49d2a4e923f5dae
-
SHA1
db0087743db0d54e3e74b88e6eca8ef56283c20d
-
SHA256
6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da
-
SHA512
bb50663f1626cce2393bc86d238801354fcaa1cfaa32402217644f40a2f390285b97cd3be76b5f8aeeb1da5752dfc09383b81f2bd89c14808e10f412e84fd68a
-
SSDEEP
12288:rMr0y9099Vwai17wZuPWmRYuPl/KJn/WjAzLaGJeE14JxVN:/yEVY7woWEYel/wn/LLxYk4JN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1476-191-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-192-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-194-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-196-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-198-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-200-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-202-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-204-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-206-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-208-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-210-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-212-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-214-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-216-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-218-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-222-0x0000000004EF0000-0x0000000004F00000-memory.dmp family_redline behavioral1/memory/1476-221-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-226-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/1476-228-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3024 un500286.exe 3968 pro1965.exe 1476 qu7184.exe 3780 si684263.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un500286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un500286.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3968 pro1965.exe 3968 pro1965.exe 1476 qu7184.exe 1476 qu7184.exe 3780 si684263.exe 3780 si684263.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3968 pro1965.exe Token: SeDebugPrivilege 1476 qu7184.exe Token: SeDebugPrivilege 3780 si684263.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3024 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 83 PID 4724 wrote to memory of 3024 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 83 PID 4724 wrote to memory of 3024 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 83 PID 3024 wrote to memory of 3968 3024 un500286.exe 84 PID 3024 wrote to memory of 3968 3024 un500286.exe 84 PID 3024 wrote to memory of 3968 3024 un500286.exe 84 PID 3024 wrote to memory of 1476 3024 un500286.exe 85 PID 3024 wrote to memory of 1476 3024 un500286.exe 85 PID 3024 wrote to memory of 1476 3024 un500286.exe 85 PID 4724 wrote to memory of 3780 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 86 PID 4724 wrote to memory of 3780 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 86 PID 4724 wrote to memory of 3780 4724 6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe"C:\Users\Admin\AppData\Local\Temp\6d11b84f088d009eaa5f5643a315a433b094be251f306c81cd5592a417f016da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500286.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7184.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684263.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54d7851a3dd20557e09392104affc4010
SHA189066e71d4515296662c917169250db942ab454a
SHA25682083b955e0f80c6926623fc6ed24a830b7a9b40c18b47abe59bd1b033cfd1fb
SHA5123d4f462c79785d59a2be2cda01a6c4f84349a2e180e0fa702bb646ea60b16a1a3595c2b02d5edefd013430ba44ded5197b64b83cd0a45ef9607654f7a3bb06de
-
Filesize
175KB
MD54d7851a3dd20557e09392104affc4010
SHA189066e71d4515296662c917169250db942ab454a
SHA25682083b955e0f80c6926623fc6ed24a830b7a9b40c18b47abe59bd1b033cfd1fb
SHA5123d4f462c79785d59a2be2cda01a6c4f84349a2e180e0fa702bb646ea60b16a1a3595c2b02d5edefd013430ba44ded5197b64b83cd0a45ef9607654f7a3bb06de
-
Filesize
553KB
MD54780447855bbd84eb803688704210d3e
SHA19021e892896bb2ac622aefa608e5eddf40a84615
SHA25651262e6fb2b5983cd4fe24800c2e9bc35fbdaecdadd2d57bbc509530411aa27a
SHA5127436e31f2a4ca5ea9baa20ba6c84008b7eab62ccc87ab9bc7942f79a80d61fe13b396ccdc0d1740ab2a425b612a23c2f5ed759f0893cd4af4bf9b249afedf304
-
Filesize
553KB
MD54780447855bbd84eb803688704210d3e
SHA19021e892896bb2ac622aefa608e5eddf40a84615
SHA25651262e6fb2b5983cd4fe24800c2e9bc35fbdaecdadd2d57bbc509530411aa27a
SHA5127436e31f2a4ca5ea9baa20ba6c84008b7eab62ccc87ab9bc7942f79a80d61fe13b396ccdc0d1740ab2a425b612a23c2f5ed759f0893cd4af4bf9b249afedf304
-
Filesize
308KB
MD5c29b35062e2a28ab5667c37137e9b380
SHA1e3c51ada810d059b9b4949437f5fc26005553a9e
SHA256a6459143233229b9baae575eeed12bfe7687e0244777c79a6e99b3f7df11c451
SHA5126ed3989deef04db72694f0df88f6b65933c2f561f05c5f21988e7e56e86e946d266239f663a008be21d96819d1810f4fedaf39d4edafea8c9bee6cb206258bca
-
Filesize
308KB
MD5c29b35062e2a28ab5667c37137e9b380
SHA1e3c51ada810d059b9b4949437f5fc26005553a9e
SHA256a6459143233229b9baae575eeed12bfe7687e0244777c79a6e99b3f7df11c451
SHA5126ed3989deef04db72694f0df88f6b65933c2f561f05c5f21988e7e56e86e946d266239f663a008be21d96819d1810f4fedaf39d4edafea8c9bee6cb206258bca
-
Filesize
366KB
MD5a6e395edf29f0064e167eb8a56a36327
SHA181898bbb597daaced3cd59a68812d363587af84c
SHA2561c43cddffa1aba8c4a575d7831adbfed729183732c8250a0f17b262d06afb35b
SHA512fcec79ad92f2f75b6323fdc7309b5e4e0d28cb78842fe5e495c4028a3923134259dfdb9258ad2270980ce4615695d1b149cc7c261c5f1562f789c648c87333ce
-
Filesize
366KB
MD5a6e395edf29f0064e167eb8a56a36327
SHA181898bbb597daaced3cd59a68812d363587af84c
SHA2561c43cddffa1aba8c4a575d7831adbfed729183732c8250a0f17b262d06afb35b
SHA512fcec79ad92f2f75b6323fdc7309b5e4e0d28cb78842fe5e495c4028a3923134259dfdb9258ad2270980ce4615695d1b149cc7c261c5f1562f789c648c87333ce