Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:54
Static task
static1
Behavioral task
behavioral1
Sample
7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe
Resource
win10v2004-20230221-en
General
-
Target
7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe
-
Size
695KB
-
MD5
2fa825ef635555e7855f53d66fcf8f11
-
SHA1
035fa54b68caef7d0eb50235c12f03bdba0da31e
-
SHA256
7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc
-
SHA512
b2ada0cc9b670c2f7b6788561e3d625bb771fcf3e4e64f8db1ead390254229a62ecb077617ca6d036d8833379bc95bdd4a5a1ef89f98f7ba9c8c982974b5c4b6
-
SSDEEP
12288:qMrVy90/XSLDMJFJ/yDtQ2YruPleGhktbEtw/uhqDgSzaveJlBktjtQaWWL8:fyCXeDMJLKxxYreleGhxhqDg+aGHGtjk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7060.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7060.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4640-190-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-191-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-193-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-195-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-197-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-199-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-201-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-203-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-205-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-207-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-209-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-211-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-213-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-215-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-217-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-219-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-221-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4640-223-0x0000000002760000-0x000000000279F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1576 un328602.exe 2692 pro7060.exe 4640 qu4686.exe 3540 si147026.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7060.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7060.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un328602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un328602.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 pro7060.exe 2692 pro7060.exe 4640 qu4686.exe 4640 qu4686.exe 3540 si147026.exe 3540 si147026.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro7060.exe Token: SeDebugPrivilege 4640 qu4686.exe Token: SeDebugPrivilege 3540 si147026.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1576 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 82 PID 2636 wrote to memory of 1576 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 82 PID 2636 wrote to memory of 1576 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 82 PID 1576 wrote to memory of 2692 1576 un328602.exe 83 PID 1576 wrote to memory of 2692 1576 un328602.exe 83 PID 1576 wrote to memory of 2692 1576 un328602.exe 83 PID 1576 wrote to memory of 4640 1576 un328602.exe 88 PID 1576 wrote to memory of 4640 1576 un328602.exe 88 PID 1576 wrote to memory of 4640 1576 un328602.exe 88 PID 2636 wrote to memory of 3540 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 93 PID 2636 wrote to memory of 3540 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 93 PID 2636 wrote to memory of 3540 2636 7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe"C:\Users\Admin\AppData\Local\Temp\7676b67885e867fe8d8d7c5beeffcf66811c1ef0d02bc263c35d866c2b8e3ecc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328602.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7060.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4686.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si147026.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si147026.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5362179056cfc9357f1761bf16b5c0819
SHA1e251d0b10d657f6e3b1ddc26df78f68ea490eb7e
SHA2569e36c37829904e127a12c46fa9129cf40816e589a018cabab2f2b073161dc127
SHA512c63660b58812a51ea376071cd1b476fe33b1e99172d9f29ffe171fc84616b365ae2a7d704af6489e00f683baf085a90aa1c8f0c434c58c5357d08f3d0a50a1cc
-
Filesize
175KB
MD5362179056cfc9357f1761bf16b5c0819
SHA1e251d0b10d657f6e3b1ddc26df78f68ea490eb7e
SHA2569e36c37829904e127a12c46fa9129cf40816e589a018cabab2f2b073161dc127
SHA512c63660b58812a51ea376071cd1b476fe33b1e99172d9f29ffe171fc84616b365ae2a7d704af6489e00f683baf085a90aa1c8f0c434c58c5357d08f3d0a50a1cc
-
Filesize
553KB
MD570bd0f35499a5de03223f72eb06cbe0d
SHA147f464484fe23411b2caef89a7887fa0031d6c3a
SHA256c09fca9603985c1f5ad81aebe403c037548bb40065345ad8b83d1927a2071616
SHA51248e22840619bd7108f0a07d04bcb6feaf4649ec7aa66022be02e3c2449d9c601ddac14371a954cf3914556b5693477f8ee8d99533bb05def29369032e4800c6c
-
Filesize
553KB
MD570bd0f35499a5de03223f72eb06cbe0d
SHA147f464484fe23411b2caef89a7887fa0031d6c3a
SHA256c09fca9603985c1f5ad81aebe403c037548bb40065345ad8b83d1927a2071616
SHA51248e22840619bd7108f0a07d04bcb6feaf4649ec7aa66022be02e3c2449d9c601ddac14371a954cf3914556b5693477f8ee8d99533bb05def29369032e4800c6c
-
Filesize
308KB
MD5a258eb999a754dc6b39a789d7e1c819e
SHA1fdd663817f517065a76353e35ad6b6081024bf25
SHA256ddf409555f8fec406936fbc09b4fd00cf880de6cf099da8e41427a5a4d30fd51
SHA51283062eb38d52950e09b77a04d6d1aed2e975bf73cd277686759068f1b4b1d8f9ccc0ffa4e50cea61fe08201281d097b4013420e5734da20ee94a5a74cada775c
-
Filesize
308KB
MD5a258eb999a754dc6b39a789d7e1c819e
SHA1fdd663817f517065a76353e35ad6b6081024bf25
SHA256ddf409555f8fec406936fbc09b4fd00cf880de6cf099da8e41427a5a4d30fd51
SHA51283062eb38d52950e09b77a04d6d1aed2e975bf73cd277686759068f1b4b1d8f9ccc0ffa4e50cea61fe08201281d097b4013420e5734da20ee94a5a74cada775c
-
Filesize
366KB
MD5240bbe5605e6172255b2357a07eefa39
SHA19a3c03bb2c3309cce52008ad36b1c99af03a248f
SHA25675d2bf0ffd4feedc9112238df0fcf1e861d002eb5e74a856e3a3b8e74641a56b
SHA512a661c7c89c9476ba3019f84a8024771f66021072eade5048d846e8fcb1525a91677e05def6088999c31e8129e41e4b7f877233ff07bb9bba2bd1c60a3b3c988c
-
Filesize
366KB
MD5240bbe5605e6172255b2357a07eefa39
SHA19a3c03bb2c3309cce52008ad36b1c99af03a248f
SHA25675d2bf0ffd4feedc9112238df0fcf1e861d002eb5e74a856e3a3b8e74641a56b
SHA512a661c7c89c9476ba3019f84a8024771f66021072eade5048d846e8fcb1525a91677e05def6088999c31e8129e41e4b7f877233ff07bb9bba2bd1c60a3b3c988c