Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:52
Static task
static1
Behavioral task
behavioral1
Sample
d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe
Resource
win10v2004-20230220-en
General
-
Target
d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe
-
Size
696KB
-
MD5
40a03eb86172df45ecd517d3f450a90d
-
SHA1
bde35a673d071d6dfce7657033099cc86e4829f6
-
SHA256
d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502
-
SHA512
082eb417c60c858359d94762df60642909e16c162411ff787858811493b8b88900c9edc5f4eeb23148333d425b3dc0564a850b63cce0ead37d8132c834258687
-
SSDEEP
12288:nMrJy900eokNjdbdD0KBk6lOpMLyj/5+p7frYbzmSaJwyEyKOTEX:Gynp2JtjBqpMLyN+xgmPmO+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5243.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5108-192-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-191-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-195-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-199-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-202-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-204-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-206-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-208-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-210-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-212-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-214-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-216-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-218-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-220-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-222-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-224-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-226-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-228-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/5108-1111-0x00000000026E0000-0x00000000026F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 404 un399701.exe 4692 pro5243.exe 5108 qu3412.exe 1716 si953091.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5243.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un399701.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un399701.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4692 pro5243.exe 4692 pro5243.exe 5108 qu3412.exe 5108 qu3412.exe 1716 si953091.exe 1716 si953091.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4692 pro5243.exe Token: SeDebugPrivilege 5108 qu3412.exe Token: SeDebugPrivilege 1716 si953091.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3196 wrote to memory of 404 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 84 PID 3196 wrote to memory of 404 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 84 PID 3196 wrote to memory of 404 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 84 PID 404 wrote to memory of 4692 404 un399701.exe 85 PID 404 wrote to memory of 4692 404 un399701.exe 85 PID 404 wrote to memory of 4692 404 un399701.exe 85 PID 404 wrote to memory of 5108 404 un399701.exe 89 PID 404 wrote to memory of 5108 404 un399701.exe 89 PID 404 wrote to memory of 5108 404 un399701.exe 89 PID 3196 wrote to memory of 1716 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 91 PID 3196 wrote to memory of 1716 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 91 PID 3196 wrote to memory of 1716 3196 d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe"C:\Users\Admin\AppData\Local\Temp\d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f2b1dc2432afed3f04674dbe4430a203
SHA16938b372f2f5543117be8cd998def2c75f417d1f
SHA256572c0ec418572c057edd894212a7c6ff014ffbc9e5f0e5ef49664fefbe0d79cf
SHA51234fc4d3c96566796e19632afeadacca7354700eff7459cd5807d7428ce0d69e66daffcf4b82be8d45680bba22c1de7a410b7192f3d0aa77df6e5676b8a875b06
-
Filesize
175KB
MD5f2b1dc2432afed3f04674dbe4430a203
SHA16938b372f2f5543117be8cd998def2c75f417d1f
SHA256572c0ec418572c057edd894212a7c6ff014ffbc9e5f0e5ef49664fefbe0d79cf
SHA51234fc4d3c96566796e19632afeadacca7354700eff7459cd5807d7428ce0d69e66daffcf4b82be8d45680bba22c1de7a410b7192f3d0aa77df6e5676b8a875b06
-
Filesize
553KB
MD5c5839ba3e3cc0424e91b39320dfd6275
SHA15b1e816ceb9b62cf15cc68766a7e7f6171759363
SHA256a332952bf6fa56d369399f297cc2d2e12e7beaa2a9b1bd8f4d91071416b5b18b
SHA512d06c1e14d82d3f62b6781b2bea3b3e1e38937b739c1c70b9e02057920f5a3d48f32d907044eb2cfa4b085a83b800a83fe1adf12ef23e53419bab39346a500aa2
-
Filesize
553KB
MD5c5839ba3e3cc0424e91b39320dfd6275
SHA15b1e816ceb9b62cf15cc68766a7e7f6171759363
SHA256a332952bf6fa56d369399f297cc2d2e12e7beaa2a9b1bd8f4d91071416b5b18b
SHA512d06c1e14d82d3f62b6781b2bea3b3e1e38937b739c1c70b9e02057920f5a3d48f32d907044eb2cfa4b085a83b800a83fe1adf12ef23e53419bab39346a500aa2
-
Filesize
308KB
MD54792d46e3ba0cbca4b32249d6582bca5
SHA1ec63cff1bb9c9d6a73199a965463cab592f075a5
SHA25609f46a8dfa5cbd490bf9ca5dc073a19023aed915587354ce353fd0ab41d45337
SHA51243d0ff847b4aa372348d3dd1840193c025d1f86c359f64762e62a3e472ad0e555c5d9fab49bb8a1e1253e8e090752a18de6d46268272325ed9a0945923a49fbd
-
Filesize
308KB
MD54792d46e3ba0cbca4b32249d6582bca5
SHA1ec63cff1bb9c9d6a73199a965463cab592f075a5
SHA25609f46a8dfa5cbd490bf9ca5dc073a19023aed915587354ce353fd0ab41d45337
SHA51243d0ff847b4aa372348d3dd1840193c025d1f86c359f64762e62a3e472ad0e555c5d9fab49bb8a1e1253e8e090752a18de6d46268272325ed9a0945923a49fbd
-
Filesize
366KB
MD516b95140cfd0b73c81028fd38e8b3f3a
SHA16c40feecb6faa8668df49d269847d3a263e7864b
SHA2566851d2b7cc90ba1cca6e9283249722766917ffe0e3a8186bb2917d6ab005cd92
SHA512028303e8ad26d9fc61bd7d6667066f6bd1ae0556934de0b803442ef451ac7d1b08dee3835f1247945043272576d2700d2157a90917ae17afafc17d8312f0cec3
-
Filesize
366KB
MD516b95140cfd0b73c81028fd38e8b3f3a
SHA16c40feecb6faa8668df49d269847d3a263e7864b
SHA2566851d2b7cc90ba1cca6e9283249722766917ffe0e3a8186bb2917d6ab005cd92
SHA512028303e8ad26d9fc61bd7d6667066f6bd1ae0556934de0b803442ef451ac7d1b08dee3835f1247945043272576d2700d2157a90917ae17afafc17d8312f0cec3