Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:42
Static task
static1
Behavioral task
behavioral1
Sample
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe
Resource
win10v2004-20230220-en
General
-
Target
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe
-
Size
696KB
-
MD5
e3bd04773207081be534b64140172082
-
SHA1
f9d94e31fe10ee049ba4a1f40a3668ba5e5a2b3c
-
SHA256
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b
-
SHA512
67adddecd3fd97cb8f387f79b05ac9f5ca1027f8be0125373e8ac2ebc4ff9b23239059071ed281fb2460ba97104c61b0d9d0fa7fc7d24b6c5db898479596f229
-
SSDEEP
12288:rMrVy90UEetbiQmUvd2YtYJv3hFvTCsjTYFGEdwDzQsiJL8UkErd:my2eBmUvEYGRjTCsQFGhvQVyUvd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4034.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2596-191-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-192-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-194-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-196-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-198-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-200-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-203-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-206-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/2596-208-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-210-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-212-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-214-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-216-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-218-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-220-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-222-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-224-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-226-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2596-228-0x0000000005300000-0x000000000533F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2776 un209170.exe 3380 pro4034.exe 2596 qu6153.exe 668 si139815.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4034.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4034.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un209170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un209170.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3380 pro4034.exe 3380 pro4034.exe 2596 qu6153.exe 2596 qu6153.exe 668 si139815.exe 668 si139815.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3380 pro4034.exe Token: SeDebugPrivilege 2596 qu6153.exe Token: SeDebugPrivilege 668 si139815.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2776 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 83 PID 4260 wrote to memory of 2776 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 83 PID 4260 wrote to memory of 2776 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 83 PID 2776 wrote to memory of 3380 2776 un209170.exe 84 PID 2776 wrote to memory of 3380 2776 un209170.exe 84 PID 2776 wrote to memory of 3380 2776 un209170.exe 84 PID 2776 wrote to memory of 2596 2776 un209170.exe 88 PID 2776 wrote to memory of 2596 2776 un209170.exe 88 PID 2776 wrote to memory of 2596 2776 un209170.exe 88 PID 4260 wrote to memory of 668 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 89 PID 4260 wrote to memory of 668 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 89 PID 4260 wrote to memory of 668 4260 f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe"C:\Users\Admin\AppData\Local\Temp\f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d9f04913fdf16fad2277c2f748c2247b
SHA1b498e9abf9f0ec4a00aa5f7bb0ba3cad1a85cbc6
SHA256ad3002a0019d6c7d0d98a3575e1ac067ae318f8adf70581ec42e155c753ee51e
SHA5126a528bee3db4903953e0b1f187e23bd43829b62339a2b08a6bb97022b8d94e2738ab96578d7a2e6bfd00fac6bebb4cc3c3016431641cd5f8709d8f43ec8241f5
-
Filesize
175KB
MD5d9f04913fdf16fad2277c2f748c2247b
SHA1b498e9abf9f0ec4a00aa5f7bb0ba3cad1a85cbc6
SHA256ad3002a0019d6c7d0d98a3575e1ac067ae318f8adf70581ec42e155c753ee51e
SHA5126a528bee3db4903953e0b1f187e23bd43829b62339a2b08a6bb97022b8d94e2738ab96578d7a2e6bfd00fac6bebb4cc3c3016431641cd5f8709d8f43ec8241f5
-
Filesize
553KB
MD588ac7a350ab23d74239ec316a19cb188
SHA15f400735024749e6d6ce37f2f47e6c8f4bb3c0fe
SHA256f379713ecfca44a04ef501d5aace6f2602edfa21c601ffa841fd54857c709af4
SHA512afb12abd9c1630d4c7ed365af1216263cb60a1a9ac1422d358e614936018b727b24ca984bd9ae92727150e992e7bb5bc68a9b14a192ef550898c529eee5e8182
-
Filesize
553KB
MD588ac7a350ab23d74239ec316a19cb188
SHA15f400735024749e6d6ce37f2f47e6c8f4bb3c0fe
SHA256f379713ecfca44a04ef501d5aace6f2602edfa21c601ffa841fd54857c709af4
SHA512afb12abd9c1630d4c7ed365af1216263cb60a1a9ac1422d358e614936018b727b24ca984bd9ae92727150e992e7bb5bc68a9b14a192ef550898c529eee5e8182
-
Filesize
308KB
MD5ac129ecbc565af20f7bbff6868982143
SHA1e22071822fa8ac02a16ba0fbec4e376a8addb473
SHA256c050864b0771080217eeb7b78dae95011f7472f510af77934afef33b245481ce
SHA512b4b5bd79a502cb53f09d74d388fb7f2f4f03223548522a387b84be7ab9955056a29256c511aa906f9d4da3544241abe1eae9b68469bf0dd8f7b75c2f4bbfc4a3
-
Filesize
308KB
MD5ac129ecbc565af20f7bbff6868982143
SHA1e22071822fa8ac02a16ba0fbec4e376a8addb473
SHA256c050864b0771080217eeb7b78dae95011f7472f510af77934afef33b245481ce
SHA512b4b5bd79a502cb53f09d74d388fb7f2f4f03223548522a387b84be7ab9955056a29256c511aa906f9d4da3544241abe1eae9b68469bf0dd8f7b75c2f4bbfc4a3
-
Filesize
366KB
MD51e4abf317bc452658fea6c3dd57545d1
SHA1eb34b6af37c78d31cb8070054b9b51f29c75aace
SHA256a160b4b84b392a3858e8abb4ba43451c31470c424523a37a4ea9c1be479db363
SHA512130a4273a76b9f4c39c4324b0b7dd9482314ae8955c283ac7b752bf315ddb28c7b5ff22dd5777960df7779ad2563b0044743d868ea19ebac24ac71652e814372
-
Filesize
366KB
MD51e4abf317bc452658fea6c3dd57545d1
SHA1eb34b6af37c78d31cb8070054b9b51f29c75aace
SHA256a160b4b84b392a3858e8abb4ba43451c31470c424523a37a4ea9c1be479db363
SHA512130a4273a76b9f4c39c4324b0b7dd9482314ae8955c283ac7b752bf315ddb28c7b5ff22dd5777960df7779ad2563b0044743d868ea19ebac24ac71652e814372