Analysis
-
max time kernel
56s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe
Resource
win10-20230220-en
General
-
Target
852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe
-
Size
696KB
-
MD5
bb769f88159ee86bcb5529630637d357
-
SHA1
44c5812f174fb136e4b1d4c419d9803a1169d5a7
-
SHA256
852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9
-
SHA512
f528f6236687e8f030c4f62deb4eb02f458641ecccae198412ca278c9a52dae237e49f0caf3aa595060e97b86af607d195751d0365bd7577e2535b5bb986e2e8
-
SSDEEP
12288:/MrYy90jGml9TaSxjOk5lymwl2plsz3LUWd4VyDdnhk4ZzNFxJuSKQwSKPXvv:HyHmlNjSxl2p03oi5dnrpNvfzgv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9195.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9195.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9195.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9195.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9195.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/2752-178-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/2752-179-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/2752-181-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-180-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-183-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-185-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-187-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-189-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-191-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-193-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-195-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-197-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-199-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-201-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-203-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-205-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-210-0x0000000002210000-0x0000000002220000-memory.dmp family_redline behavioral1/memory/2752-209-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-213-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-215-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-217-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/2752-1099-0x0000000002210000-0x0000000002220000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2112 un225467.exe 3972 pro9195.exe 2752 qu7786.exe 4796 si325959.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9195.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9195.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un225467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un225467.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3972 pro9195.exe 3972 pro9195.exe 2752 qu7786.exe 2752 qu7786.exe 4796 si325959.exe 4796 si325959.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3972 pro9195.exe Token: SeDebugPrivilege 2752 qu7786.exe Token: SeDebugPrivilege 4796 si325959.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2112 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 66 PID 5044 wrote to memory of 2112 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 66 PID 5044 wrote to memory of 2112 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 66 PID 2112 wrote to memory of 3972 2112 un225467.exe 67 PID 2112 wrote to memory of 3972 2112 un225467.exe 67 PID 2112 wrote to memory of 3972 2112 un225467.exe 67 PID 2112 wrote to memory of 2752 2112 un225467.exe 68 PID 2112 wrote to memory of 2752 2112 un225467.exe 68 PID 2112 wrote to memory of 2752 2112 un225467.exe 68 PID 5044 wrote to memory of 4796 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 70 PID 5044 wrote to memory of 4796 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 70 PID 5044 wrote to memory of 4796 5044 852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe"C:\Users\Admin\AppData\Local\Temp\852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb09f3ddaf1a99c63ec1e2a48ad2245c
SHA130b7ea8b52290ce194ecab9643f6eda17f7dcd94
SHA256a9c9aba4783bb7e19b088c59ed2d9b5f45213c934440d2d3b4fa314c3938e052
SHA512636bef607be2087944cd8db204f4c3e8e1d0576366cb41edd66a33b81d3033fd4edc06333445c4b04c78ff80f8fd9562dacb874dfba8ffce3354cc93767a3339
-
Filesize
175KB
MD5bb09f3ddaf1a99c63ec1e2a48ad2245c
SHA130b7ea8b52290ce194ecab9643f6eda17f7dcd94
SHA256a9c9aba4783bb7e19b088c59ed2d9b5f45213c934440d2d3b4fa314c3938e052
SHA512636bef607be2087944cd8db204f4c3e8e1d0576366cb41edd66a33b81d3033fd4edc06333445c4b04c78ff80f8fd9562dacb874dfba8ffce3354cc93767a3339
-
Filesize
554KB
MD56529bf3e5cd2fd86fe248bc622ec8d80
SHA1c2be25c3f92d90d91ef8b0725976451bde6295e7
SHA256d82a1aa359de3665f28f20fe47b574f947681c1c82638a47ee06e622df50e2bb
SHA512113f166e79474806394e5d9a2fcdfc8da3ae91fa6d0aec55e0dbcd6c485f9d2fba960d83029b8b5e46764dd972c3db1a31c438b516c3608363c8df60d0c535d6
-
Filesize
554KB
MD56529bf3e5cd2fd86fe248bc622ec8d80
SHA1c2be25c3f92d90d91ef8b0725976451bde6295e7
SHA256d82a1aa359de3665f28f20fe47b574f947681c1c82638a47ee06e622df50e2bb
SHA512113f166e79474806394e5d9a2fcdfc8da3ae91fa6d0aec55e0dbcd6c485f9d2fba960d83029b8b5e46764dd972c3db1a31c438b516c3608363c8df60d0c535d6
-
Filesize
308KB
MD5890ead97435cfab3f1add0f6f0a5b149
SHA1903378f0310bbf881389eec91c4616d6d47a9526
SHA256394481c7708fdfea2a6e4c39a16473fe88f1e1ba7b30ab7ec1875a84670cffc9
SHA512d1c2d603de4d1c34c98c2beb0394b1abae830d1c68dd3e2bb1e51a95b4db53a0d107fcfc5b8125b8dd0687502685fcd77198f26dbbb1a5bbe442f5570e0b94de
-
Filesize
308KB
MD5890ead97435cfab3f1add0f6f0a5b149
SHA1903378f0310bbf881389eec91c4616d6d47a9526
SHA256394481c7708fdfea2a6e4c39a16473fe88f1e1ba7b30ab7ec1875a84670cffc9
SHA512d1c2d603de4d1c34c98c2beb0394b1abae830d1c68dd3e2bb1e51a95b4db53a0d107fcfc5b8125b8dd0687502685fcd77198f26dbbb1a5bbe442f5570e0b94de
-
Filesize
366KB
MD5c3134c6c939591615e9cffb6a17bc5bc
SHA113434e1c1cef3856cefa04fae465f193fded4494
SHA256e51906f292eb0b0fb261a8c88cc9439b8ad8bbc1b0cd20e0153983607ab5d852
SHA512bc7ca2904550d658e56dfe6b916eec973d3ebf78da20edfdfbc23ae084b500123b5afafa74a57e90eac4bc7d6c3443043de0128478f4be0e4427d006c5f06450
-
Filesize
366KB
MD5c3134c6c939591615e9cffb6a17bc5bc
SHA113434e1c1cef3856cefa04fae465f193fded4494
SHA256e51906f292eb0b0fb261a8c88cc9439b8ad8bbc1b0cd20e0153983607ab5d852
SHA512bc7ca2904550d658e56dfe6b916eec973d3ebf78da20edfdfbc23ae084b500123b5afafa74a57e90eac4bc7d6c3443043de0128478f4be0e4427d006c5f06450