Analysis
-
max time kernel
87s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe
Resource
win10-20230220-en
General
-
Target
28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe
-
Size
695KB
-
MD5
4457da36722b993d663eeaee5b4ca439
-
SHA1
7da6cc21ef7fe48aa37571d18ba4ce050aad40b9
-
SHA256
28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2
-
SHA512
78516b6e3b8da58e8b7c3f8f62bcc25058aebc6ac236bf86eb1bf1c46de2361ae9ef875b55be91d066bbf37089437cca27db5bb0d02a07749f060a225e67cb36
-
SSDEEP
12288:sMruy90nchnwdm/nDtJVBumlLp3Zc/UtRmz8mzo2iJmz+bbtn2lsIa:iy+chIm/nxLBHl13ZOUbioZQbW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2103.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4664-178-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/4664-179-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/4664-184-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-185-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-187-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-189-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-191-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-193-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-195-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-197-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-199-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-203-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-205-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-207-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-209-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-211-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-213-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-215-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4664-217-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2412 un297496.exe 2680 pro2103.exe 4664 qu3577.exe 3748 si134561.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2103.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2103.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un297496.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un297496.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2680 pro2103.exe 2680 pro2103.exe 4664 qu3577.exe 4664 qu3577.exe 3748 si134561.exe 3748 si134561.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2680 pro2103.exe Token: SeDebugPrivilege 4664 qu3577.exe Token: SeDebugPrivilege 3748 si134561.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2412 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 66 PID 2140 wrote to memory of 2412 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 66 PID 2140 wrote to memory of 2412 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 66 PID 2412 wrote to memory of 2680 2412 un297496.exe 67 PID 2412 wrote to memory of 2680 2412 un297496.exe 67 PID 2412 wrote to memory of 2680 2412 un297496.exe 67 PID 2412 wrote to memory of 4664 2412 un297496.exe 68 PID 2412 wrote to memory of 4664 2412 un297496.exe 68 PID 2412 wrote to memory of 4664 2412 un297496.exe 68 PID 2140 wrote to memory of 3748 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 70 PID 2140 wrote to memory of 3748 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 70 PID 2140 wrote to memory of 3748 2140 28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe"C:\Users\Admin\AppData\Local\Temp\28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c2719bd009111a79dc527e61562ee538
SHA14133c46bf6a7e7f7cbb3f4239dc54c05597787d2
SHA2564aa11db47e4678982d9764ef34a83fab01d77569fd5b0e768d8000a7a29cd02b
SHA512c0f6e014099d678c97d9634fa2546707af1ea9730e028c2dc7055c1a51c5f25a2224a4722708cae9194ae8c432cc09150e3accfe60e52bdf54151065e06eb63f
-
Filesize
175KB
MD5c2719bd009111a79dc527e61562ee538
SHA14133c46bf6a7e7f7cbb3f4239dc54c05597787d2
SHA2564aa11db47e4678982d9764ef34a83fab01d77569fd5b0e768d8000a7a29cd02b
SHA512c0f6e014099d678c97d9634fa2546707af1ea9730e028c2dc7055c1a51c5f25a2224a4722708cae9194ae8c432cc09150e3accfe60e52bdf54151065e06eb63f
-
Filesize
553KB
MD5421aabd057828716a1df57c71182b7e1
SHA178483980cefa9528df650d920e2c4a009f437c12
SHA2561d2e8c7ef294a3ffa9d76b5098b6736e9a1efa2451abe4451a31a9c4ebef7f9b
SHA512de725d304a2bbe8b06cb79cfcc2a130cea421e78b882f2d56887c03cab545c48d827981f9d11ca80e8bedd4a6c13927eeabbd708f844d31bd53421111309de67
-
Filesize
553KB
MD5421aabd057828716a1df57c71182b7e1
SHA178483980cefa9528df650d920e2c4a009f437c12
SHA2561d2e8c7ef294a3ffa9d76b5098b6736e9a1efa2451abe4451a31a9c4ebef7f9b
SHA512de725d304a2bbe8b06cb79cfcc2a130cea421e78b882f2d56887c03cab545c48d827981f9d11ca80e8bedd4a6c13927eeabbd708f844d31bd53421111309de67
-
Filesize
308KB
MD5a422a2baf6949b783f42c69c8cf3aa43
SHA100aa0c24c217076e7b9cf5ec5cde2f4ff85584fb
SHA25655fda30859a52daf278ad95f30f25786539795090e7d71cd361c08b991b6835a
SHA51215ad07a2a5eb736c71db53d411426bf4411483463e89ce12f0e1fbbc4dd2383c5814e6813eb6e903b82e4bde5d7fbd663029a2ebf25ab540e5e28a7fdd605c0a
-
Filesize
308KB
MD5a422a2baf6949b783f42c69c8cf3aa43
SHA100aa0c24c217076e7b9cf5ec5cde2f4ff85584fb
SHA25655fda30859a52daf278ad95f30f25786539795090e7d71cd361c08b991b6835a
SHA51215ad07a2a5eb736c71db53d411426bf4411483463e89ce12f0e1fbbc4dd2383c5814e6813eb6e903b82e4bde5d7fbd663029a2ebf25ab540e5e28a7fdd605c0a
-
Filesize
366KB
MD527cfba8ac5e5f3e6e6b13856931c2b77
SHA197461741e58af794642dde2c2ca825620bf15668
SHA256ff8356527cd8054353c4884875c3c2d9f5cf9878fdd44c920cd6ff6c5c4c0fc0
SHA512e17c05e94089dd635a5dde26c9f7f94f5e02697b5297b6427d64b2109254da816998f7f31cffe0d08f973b427d55f8c042a1b04a69269e29e7788faf19d8d8db
-
Filesize
366KB
MD527cfba8ac5e5f3e6e6b13856931c2b77
SHA197461741e58af794642dde2c2ca825620bf15668
SHA256ff8356527cd8054353c4884875c3c2d9f5cf9878fdd44c920cd6ff6c5c4c0fc0
SHA512e17c05e94089dd635a5dde26c9f7f94f5e02697b5297b6427d64b2109254da816998f7f31cffe0d08f973b427d55f8c042a1b04a69269e29e7788faf19d8d8db