Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:50
Static task
static1
Behavioral task
behavioral1
Sample
c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe
Resource
win10v2004-20230220-en
General
-
Target
c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe
-
Size
695KB
-
MD5
825e2c3a42386159cad22b8d8de44422
-
SHA1
746a1294dec74faf715ae92c1de4aa054e0f1e31
-
SHA256
c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff
-
SHA512
45821744532edad0716e478d0a8218654e6d9851d4a6eb9962927d0a584a433941bd7e5aec8e638a1776049acdeb13115a1698688215f75d66757205346ab6ce
-
SSDEEP
12288:qMrzy90/AddAq0sA1HDg7BeDtUY1/2ouPlypDkkFrzhs/JK4WZICq:hyaUksAJM7Bex7/2oelypDkShckM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3064-189-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-188-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-193-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-199-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-219-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3064-1108-0x0000000004DB0000-0x0000000004DC0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 60 un477289.exe 840 pro3773.exe 3064 qu8836.exe 3652 si686884.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3773.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un477289.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un477289.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3152 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 840 pro3773.exe 840 pro3773.exe 3064 qu8836.exe 3064 qu8836.exe 3652 si686884.exe 3652 si686884.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 840 pro3773.exe Token: SeDebugPrivilege 3064 qu8836.exe Token: SeDebugPrivilege 3652 si686884.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1480 wrote to memory of 60 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 82 PID 1480 wrote to memory of 60 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 82 PID 1480 wrote to memory of 60 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 82 PID 60 wrote to memory of 840 60 un477289.exe 83 PID 60 wrote to memory of 840 60 un477289.exe 83 PID 60 wrote to memory of 840 60 un477289.exe 83 PID 60 wrote to memory of 3064 60 un477289.exe 87 PID 60 wrote to memory of 3064 60 un477289.exe 87 PID 60 wrote to memory of 3064 60 un477289.exe 87 PID 1480 wrote to memory of 3652 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 89 PID 1480 wrote to memory of 3652 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 89 PID 1480 wrote to memory of 3652 1480 c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe"C:\Users\Admin\AppData\Local\Temp\c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59579fb866ec6da91ea187574880c6391
SHA17f470f8944b9feb4896a3fbd16949ca235ee8c1b
SHA256089f562ebe74be5d0be1a83918ea8171af71a649b2afd4de3d76aef75c3b3179
SHA51296b208ac3062de5de3c6b06821ce28913fea011220f9429cb735df8bd93fd3adb072754c8b79afb36b60cef702ccc113a9dc28ecf7234d0c5902d399aaf27f11
-
Filesize
175KB
MD59579fb866ec6da91ea187574880c6391
SHA17f470f8944b9feb4896a3fbd16949ca235ee8c1b
SHA256089f562ebe74be5d0be1a83918ea8171af71a649b2afd4de3d76aef75c3b3179
SHA51296b208ac3062de5de3c6b06821ce28913fea011220f9429cb735df8bd93fd3adb072754c8b79afb36b60cef702ccc113a9dc28ecf7234d0c5902d399aaf27f11
-
Filesize
553KB
MD506756fc37ad404bc6eda871fe988a63c
SHA118ebedeb995ca16ca548ca9ef286887b558bb291
SHA2566d41291585587b9c8ef9efc8b154bc5fbaec98164670b54cfd09cae53ea8ff80
SHA5121625a1d373db8ef3275ed8b40f51dabe53bdbba2d0555b7febeb04329e695118d9261b29353f888a1e2e97e3d4b66a066bcc1bcfc8b676f18c3417c9822ee19b
-
Filesize
553KB
MD506756fc37ad404bc6eda871fe988a63c
SHA118ebedeb995ca16ca548ca9ef286887b558bb291
SHA2566d41291585587b9c8ef9efc8b154bc5fbaec98164670b54cfd09cae53ea8ff80
SHA5121625a1d373db8ef3275ed8b40f51dabe53bdbba2d0555b7febeb04329e695118d9261b29353f888a1e2e97e3d4b66a066bcc1bcfc8b676f18c3417c9822ee19b
-
Filesize
308KB
MD5feafc067d05cd58c4e5a36938bede5c1
SHA1d270106dbcd942cc66b3607af0be7ab06bd0bab1
SHA256ff5531464ecc681542a5f6f4cc464b62216b9eb197d7ef743be67103780468e2
SHA512e0d8173cf1824e42bf9dcdcb22013df47601facc99d37770311908036897515c90aaf0aaec119b8b72a89bc82248949f059ff0458521bdad979366876239d8ae
-
Filesize
308KB
MD5feafc067d05cd58c4e5a36938bede5c1
SHA1d270106dbcd942cc66b3607af0be7ab06bd0bab1
SHA256ff5531464ecc681542a5f6f4cc464b62216b9eb197d7ef743be67103780468e2
SHA512e0d8173cf1824e42bf9dcdcb22013df47601facc99d37770311908036897515c90aaf0aaec119b8b72a89bc82248949f059ff0458521bdad979366876239d8ae
-
Filesize
366KB
MD501176c72d027b4002c3370a407e6f36b
SHA18d015994ac5d0bf4f12bb06791b79f2f53915a0e
SHA25611896a6f902692cc010fe30b129a2656277bf28fa84f6289bdefc1acb7a83ab5
SHA512f368732b271282ddb93a0b5476e5e7d27c797cc9fed3749db9bfd60589fc36560ef09af92de441a426a829daa45fae7fa86dd2dd1bfdb4aaa4e72061a6103d6f
-
Filesize
366KB
MD501176c72d027b4002c3370a407e6f36b
SHA18d015994ac5d0bf4f12bb06791b79f2f53915a0e
SHA25611896a6f902692cc010fe30b129a2656277bf28fa84f6289bdefc1acb7a83ab5
SHA512f368732b271282ddb93a0b5476e5e7d27c797cc9fed3749db9bfd60589fc36560ef09af92de441a426a829daa45fae7fa86dd2dd1bfdb4aaa4e72061a6103d6f