Analysis
-
max time kernel
67s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 20:46
Static task
static1
Behavioral task
behavioral1
Sample
3c21487478306bb0e48ae27cab7c9465.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3c21487478306bb0e48ae27cab7c9465.exe
Resource
win10v2004-20230220-en
General
-
Target
3c21487478306bb0e48ae27cab7c9465.exe
-
Size
695KB
-
MD5
3c21487478306bb0e48ae27cab7c9465
-
SHA1
5947976e655f52f6411d2022fef7fb9d03a901e1
-
SHA256
503ba0174224929fc89facfb25050d0d39f0cc88f384ebd9d717ec7f45680d0d
-
SHA512
00d733d46b96ebb9f21279a4a992fcd949963cd28b9dcd6e2e802a5395f6cec19ace2c828fe037cf5bd7f3f0395f94f2de944f81b100b680be01db2fb5382b86
-
SSDEEP
12288:+Mr7y90dAI5mSsIkP00dAbqGxIjfSCPO0gmRnhvATAChIger/CW:lyfIYCd0dyYjaQgmBhvAMCyPOW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4158.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1096-123-0x0000000002490000-0x00000000024D6000-memory.dmp family_redline behavioral1/memory/1096-124-0x0000000004CB0000-0x0000000004CF4000-memory.dmp family_redline behavioral1/memory/1096-125-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-126-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-128-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-130-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-132-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-134-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-136-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-138-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-140-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-142-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-144-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-146-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-148-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-150-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-152-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-154-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-156-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-158-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/1096-1037-0x0000000004D20000-0x0000000004D60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1988 un579524.exe 1660 pro4158.exe 1096 qu8398.exe 1620 si499492.exe -
Loads dropped DLL 10 IoCs
pid Process 1744 3c21487478306bb0e48ae27cab7c9465.exe 1988 un579524.exe 1988 un579524.exe 1988 un579524.exe 1660 pro4158.exe 1988 un579524.exe 1988 un579524.exe 1096 qu8398.exe 1744 3c21487478306bb0e48ae27cab7c9465.exe 1620 si499492.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro4158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4158.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un579524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un579524.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3c21487478306bb0e48ae27cab7c9465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c21487478306bb0e48ae27cab7c9465.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1660 pro4158.exe 1660 pro4158.exe 1096 qu8398.exe 1096 qu8398.exe 1620 si499492.exe 1620 si499492.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1660 pro4158.exe Token: SeDebugPrivilege 1096 qu8398.exe Token: SeDebugPrivilege 1620 si499492.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1744 wrote to memory of 1988 1744 3c21487478306bb0e48ae27cab7c9465.exe 28 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1660 1988 un579524.exe 29 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1988 wrote to memory of 1096 1988 un579524.exe 30 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32 PID 1744 wrote to memory of 1620 1744 3c21487478306bb0e48ae27cab7c9465.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c21487478306bb0e48ae27cab7c9465.exe"C:\Users\Admin\AppData\Local\Temp\3c21487478306bb0e48ae27cab7c9465.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579524.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579524.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4158.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4158.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8398.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si499492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si499492.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55e37764ee2b604cf15229e03bd48f598
SHA1bfa4531d65c9518f46384c545b3fe6a6c8069ae3
SHA2566619ae6f8095b57068069f5897dee10d36870985e6e537dc0c3b06c2db1958fe
SHA5122cb84d50a1586d04df39e5a1f15247198fdd20a29a669160ff72c38650f67f3c52148ce9b301dba46b31fbcde46a24acf092931b3bfc77cedd7b4c573bf4715c
-
Filesize
175KB
MD55e37764ee2b604cf15229e03bd48f598
SHA1bfa4531d65c9518f46384c545b3fe6a6c8069ae3
SHA2566619ae6f8095b57068069f5897dee10d36870985e6e537dc0c3b06c2db1958fe
SHA5122cb84d50a1586d04df39e5a1f15247198fdd20a29a669160ff72c38650f67f3c52148ce9b301dba46b31fbcde46a24acf092931b3bfc77cedd7b4c573bf4715c
-
Filesize
553KB
MD5505c6141ae086dd6daf33dfdcaea42b3
SHA1dde4229d50f07763a420c961ba0e623589c9e45e
SHA2562c7a18d443c0916c55d88284043690ee41829286d7d8b6c8e753e639ca9567e1
SHA5128225e1fb69c54dd8eb3660b94b63c4218aadb7640d4bf5c3485970da1f04344b52fc419623c9c99360d76c64cb762bafaea21a3a9c2f6c9caca730555bcce668
-
Filesize
553KB
MD5505c6141ae086dd6daf33dfdcaea42b3
SHA1dde4229d50f07763a420c961ba0e623589c9e45e
SHA2562c7a18d443c0916c55d88284043690ee41829286d7d8b6c8e753e639ca9567e1
SHA5128225e1fb69c54dd8eb3660b94b63c4218aadb7640d4bf5c3485970da1f04344b52fc419623c9c99360d76c64cb762bafaea21a3a9c2f6c9caca730555bcce668
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8
-
Filesize
175KB
MD55e37764ee2b604cf15229e03bd48f598
SHA1bfa4531d65c9518f46384c545b3fe6a6c8069ae3
SHA2566619ae6f8095b57068069f5897dee10d36870985e6e537dc0c3b06c2db1958fe
SHA5122cb84d50a1586d04df39e5a1f15247198fdd20a29a669160ff72c38650f67f3c52148ce9b301dba46b31fbcde46a24acf092931b3bfc77cedd7b4c573bf4715c
-
Filesize
175KB
MD55e37764ee2b604cf15229e03bd48f598
SHA1bfa4531d65c9518f46384c545b3fe6a6c8069ae3
SHA2566619ae6f8095b57068069f5897dee10d36870985e6e537dc0c3b06c2db1958fe
SHA5122cb84d50a1586d04df39e5a1f15247198fdd20a29a669160ff72c38650f67f3c52148ce9b301dba46b31fbcde46a24acf092931b3bfc77cedd7b4c573bf4715c
-
Filesize
553KB
MD5505c6141ae086dd6daf33dfdcaea42b3
SHA1dde4229d50f07763a420c961ba0e623589c9e45e
SHA2562c7a18d443c0916c55d88284043690ee41829286d7d8b6c8e753e639ca9567e1
SHA5128225e1fb69c54dd8eb3660b94b63c4218aadb7640d4bf5c3485970da1f04344b52fc419623c9c99360d76c64cb762bafaea21a3a9c2f6c9caca730555bcce668
-
Filesize
553KB
MD5505c6141ae086dd6daf33dfdcaea42b3
SHA1dde4229d50f07763a420c961ba0e623589c9e45e
SHA2562c7a18d443c0916c55d88284043690ee41829286d7d8b6c8e753e639ca9567e1
SHA5128225e1fb69c54dd8eb3660b94b63c4218aadb7640d4bf5c3485970da1f04344b52fc419623c9c99360d76c64cb762bafaea21a3a9c2f6c9caca730555bcce668
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
308KB
MD566a02d46cf13dbd173bca54316979c0c
SHA1ceb6d2d49ac8fba99812bb5f11c6b6008f7af53d
SHA256dcbae1c022f80755f73c57da9bad0155b30456a22dc73092643dbcea7d8b714a
SHA512db875977f4b1a20ff4a26afd4e22abeade53013d361d7e8f548b0c01f8bdfee8cba4c73f6a38a961c13ebf1d9ce8fd7414e964d0fb6e4ac6fd7e19f45611387b
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8
-
Filesize
366KB
MD522a808b7fa4620b6eb0a5259ebbf1c2a
SHA197c38e170060b2f8ad9b6177962577f20bc7fb8d
SHA25654cc24f6b8c502560bc3ed2d448c55390be9698d857925322879ecdac6dccf62
SHA51268bbe0732b2dd7689b8f02d7095734c2b64fdecf3772a6b7e6a56858be4412686f365d5fd97d1964bec84bbd5b3c72148a9ac567ea67133b0ff2af59841d5ee8