Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:48
Static task
static1
Behavioral task
behavioral1
Sample
c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe
Resource
win10v2004-20230221-en
General
-
Target
c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe
-
Size
696KB
-
MD5
41fc6777968949bcb038070cc8a00b7b
-
SHA1
c89d4fa83d5a8cf9dbfa65ceb036a4c561548da1
-
SHA256
c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77
-
SHA512
335659f1e6e7a97e226fe887dd4e8d0bd05a6d1f4314dc1bfe5c125353791f9539291a99905e572980117a1ee3879b5b1eb4bd85cd0c630603b444de0bfaff72
-
SSDEEP
12288:4MrLy90anlkTlhTP77HhfwVzIhhJtr32AYraIM+zSSyJ2Spl5b:zydnoP77YzAztx7LKSFgSnB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6709.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6709.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1496-195-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-194-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-197-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-199-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-201-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-203-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-205-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-207-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-209-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-211-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-213-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-215-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-217-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-219-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-221-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-223-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-225-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-227-0x0000000002680000-0x00000000026BF000-memory.dmp family_redline behavioral1/memory/1496-563-0x0000000004F90000-0x0000000004FA0000-memory.dmp family_redline behavioral1/memory/1496-1113-0x0000000004F90000-0x0000000004FA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1964 un233609.exe 4100 pro6709.exe 1496 qu0980.exe 1960 si599738.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6709.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un233609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un233609.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4100 pro6709.exe 4100 pro6709.exe 1496 qu0980.exe 1496 qu0980.exe 1960 si599738.exe 1960 si599738.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4100 pro6709.exe Token: SeDebugPrivilege 1496 qu0980.exe Token: SeDebugPrivilege 1960 si599738.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1964 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 85 PID 2264 wrote to memory of 1964 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 85 PID 2264 wrote to memory of 1964 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 85 PID 1964 wrote to memory of 4100 1964 un233609.exe 86 PID 1964 wrote to memory of 4100 1964 un233609.exe 86 PID 1964 wrote to memory of 4100 1964 un233609.exe 86 PID 1964 wrote to memory of 1496 1964 un233609.exe 90 PID 1964 wrote to memory of 1496 1964 un233609.exe 90 PID 1964 wrote to memory of 1496 1964 un233609.exe 90 PID 2264 wrote to memory of 1960 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 91 PID 2264 wrote to memory of 1960 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 91 PID 2264 wrote to memory of 1960 2264 c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe"C:\Users\Admin\AppData\Local\Temp\c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54028d492332539d0d61191f5955073cc
SHA1194ca03432ac6bff708f0966a146f29cbd73d422
SHA2569ce2b00143fe49da970bc254f1e9bb0e47811aa9f11b0e7d927475dbb4467af8
SHA512387e3ed11eadac16b4bfcc4e1f02a60c06cb983c9a6b705ede95e4eaa49f7d53c1b99f6b52488f63ccf02a513b74aa185b7010d6d0b840087652a60ee5a40405
-
Filesize
175KB
MD54028d492332539d0d61191f5955073cc
SHA1194ca03432ac6bff708f0966a146f29cbd73d422
SHA2569ce2b00143fe49da970bc254f1e9bb0e47811aa9f11b0e7d927475dbb4467af8
SHA512387e3ed11eadac16b4bfcc4e1f02a60c06cb983c9a6b705ede95e4eaa49f7d53c1b99f6b52488f63ccf02a513b74aa185b7010d6d0b840087652a60ee5a40405
-
Filesize
553KB
MD51215f81cec7e2d10754fda3651ff944e
SHA159432769c6fcbaa57fed422ce7eef5bfbb155dbc
SHA256e9702e48dd3f75674e986917b3605aecf984b35aee62e15b404e0e57d34d7811
SHA5120232d32af583e7205ff31eebcc8c9f77a54b75cfb88b73473e2b8515ec71368a865c55b50fc7807676c48ef65fb40c7c532fdf3e146d7c4fe22a6c8ca5f1112e
-
Filesize
553KB
MD51215f81cec7e2d10754fda3651ff944e
SHA159432769c6fcbaa57fed422ce7eef5bfbb155dbc
SHA256e9702e48dd3f75674e986917b3605aecf984b35aee62e15b404e0e57d34d7811
SHA5120232d32af583e7205ff31eebcc8c9f77a54b75cfb88b73473e2b8515ec71368a865c55b50fc7807676c48ef65fb40c7c532fdf3e146d7c4fe22a6c8ca5f1112e
-
Filesize
308KB
MD5475807e35eaf8173678b41ebd5fd637f
SHA12e6fbe4144d5f76901e72fa8d07c5c2f28f5a7d4
SHA25691c8798fd16b6e3c82e9f5fcaa31b3aaccc406ae41f1cfcfa76a9d1436d5029a
SHA512bc0d4e0f5851c9980c97130d2c5927fc6f45cbc9aeb0617e505c91504d9e1645935369adb937949d895ff98d68f970cee4c8440e38dd7dfb8842186008ba4ed9
-
Filesize
308KB
MD5475807e35eaf8173678b41ebd5fd637f
SHA12e6fbe4144d5f76901e72fa8d07c5c2f28f5a7d4
SHA25691c8798fd16b6e3c82e9f5fcaa31b3aaccc406ae41f1cfcfa76a9d1436d5029a
SHA512bc0d4e0f5851c9980c97130d2c5927fc6f45cbc9aeb0617e505c91504d9e1645935369adb937949d895ff98d68f970cee4c8440e38dd7dfb8842186008ba4ed9
-
Filesize
366KB
MD54370dd706f433a9d97a53a773abb4459
SHA1a120df05649b83d03b4ef19c763e8db148883ee0
SHA256b16f918539fbd8cfb9d0668d54f39d51b62d6828be68e9d5860875cef1156d8a
SHA5123a1c7422db198c2394595134f694f6cfaa0e327f7d0f0ec11c9df229aabe723ae5c36c63b879b55aa8e9de73527fd4e80575c2d632fcaef9080b542be8b73c9b
-
Filesize
366KB
MD54370dd706f433a9d97a53a773abb4459
SHA1a120df05649b83d03b4ef19c763e8db148883ee0
SHA256b16f918539fbd8cfb9d0668d54f39d51b62d6828be68e9d5860875cef1156d8a
SHA5123a1c7422db198c2394595134f694f6cfaa0e327f7d0f0ec11c9df229aabe723ae5c36c63b879b55aa8e9de73527fd4e80575c2d632fcaef9080b542be8b73c9b