Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:02
Static task
static1
Behavioral task
behavioral1
Sample
c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe
Resource
win10v2004-20230220-en
General
-
Target
c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe
-
Size
695KB
-
MD5
c6efff595af26320b452eeec9cf1a327
-
SHA1
846b382063eadfc221492f16542890d7f0c54300
-
SHA256
c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b
-
SHA512
c8c3c5f545b8528cf8d6f6d6ecac480e63d7e48e33b9e9ea2f46c65aefdf92c57188c074098dc356d02bbc52c29bde22d981688d3c589e27b9945fb2f3beb173
-
SSDEEP
12288:pMrgy90NQ13jVDhR3fnJSTPs6JxQvHPnqjxitrSQ9xvHfsGzbhzJ3wQHmktN8KId:RyhDXJSThJxmHPht//kCbh5HmktyKId
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1190.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4464-191-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-192-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-194-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-196-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-198-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-200-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-206-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-202-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-210-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-212-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-214-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-216-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-218-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-220-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-222-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-224-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-226-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/4464-228-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3968 un710200.exe 2716 pro1190.exe 4464 qu4628.exe 684 si751355.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1190.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un710200.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un710200.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2716 pro1190.exe 2716 pro1190.exe 4464 qu4628.exe 4464 qu4628.exe 684 si751355.exe 684 si751355.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2716 pro1190.exe Token: SeDebugPrivilege 4464 qu4628.exe Token: SeDebugPrivilege 684 si751355.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3968 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 83 PID 2132 wrote to memory of 3968 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 83 PID 2132 wrote to memory of 3968 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 83 PID 3968 wrote to memory of 2716 3968 un710200.exe 84 PID 3968 wrote to memory of 2716 3968 un710200.exe 84 PID 3968 wrote to memory of 2716 3968 un710200.exe 84 PID 3968 wrote to memory of 4464 3968 un710200.exe 91 PID 3968 wrote to memory of 4464 3968 un710200.exe 91 PID 3968 wrote to memory of 4464 3968 un710200.exe 91 PID 2132 wrote to memory of 684 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 94 PID 2132 wrote to memory of 684 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 94 PID 2132 wrote to memory of 684 2132 c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe"C:\Users\Admin\AppData\Local\Temp\c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5720eee1697b2c672230d24df2a67c76b
SHA10f59efca126acdb2bbe591a607d6257ac052a71c
SHA2561bba3e529d64b5344ca37031bfa78007bbce314bc686c255681248ad83d32aa6
SHA5121fcd05943f7eb407d2a24e795a638c389d17e4110afe3c7dba93a661087fddc19226ead2526b863e2f45c6c525eb8e8d61c1395381b6afc3fb2e4f22ab63e248
-
Filesize
175KB
MD5720eee1697b2c672230d24df2a67c76b
SHA10f59efca126acdb2bbe591a607d6257ac052a71c
SHA2561bba3e529d64b5344ca37031bfa78007bbce314bc686c255681248ad83d32aa6
SHA5121fcd05943f7eb407d2a24e795a638c389d17e4110afe3c7dba93a661087fddc19226ead2526b863e2f45c6c525eb8e8d61c1395381b6afc3fb2e4f22ab63e248
-
Filesize
553KB
MD5418495f1372df94f1a214e4e3d7c5975
SHA103096b89d49f7b3539fb0ea98de9907df4c13cb3
SHA25685caaca52b9663732a1382b058997fcf57abc12f1d35011043aa1b998b0b1955
SHA5129e3647ceb195529cb42b72d70eab255618e4e711bbaf33b24685060677d3d6bc16cbaadcbfb04c1d70b634db9cdced9619fa569022ccfc76eb93deae45f2c7c8
-
Filesize
553KB
MD5418495f1372df94f1a214e4e3d7c5975
SHA103096b89d49f7b3539fb0ea98de9907df4c13cb3
SHA25685caaca52b9663732a1382b058997fcf57abc12f1d35011043aa1b998b0b1955
SHA5129e3647ceb195529cb42b72d70eab255618e4e711bbaf33b24685060677d3d6bc16cbaadcbfb04c1d70b634db9cdced9619fa569022ccfc76eb93deae45f2c7c8
-
Filesize
308KB
MD5c0a360db527ba0662e9af583a89a691b
SHA19a6404b8d59f3e34a2e45ae9571fa2a5c2587175
SHA256b1e3cd88a38239d468468d54417cce04fc0e10e2b782b007bcc15a870ddcca48
SHA5125cf961493a92f1a5a7be6d564e51e844adb44a28fa05ea6f7278e720382b0f8ac7d68691f209fc8879236868f7ab44dbaec5c6ea06dc203ee9b65d253efd1609
-
Filesize
308KB
MD5c0a360db527ba0662e9af583a89a691b
SHA19a6404b8d59f3e34a2e45ae9571fa2a5c2587175
SHA256b1e3cd88a38239d468468d54417cce04fc0e10e2b782b007bcc15a870ddcca48
SHA5125cf961493a92f1a5a7be6d564e51e844adb44a28fa05ea6f7278e720382b0f8ac7d68691f209fc8879236868f7ab44dbaec5c6ea06dc203ee9b65d253efd1609
-
Filesize
366KB
MD578994da864fe59d0f939acde3a334f81
SHA148985d294f3ef27546488958fecdbe9d6577ed34
SHA256ed81455bacbe08bb0bf0fd758087f8a1367411bc11e64d2cc12db13de1144b8b
SHA512d97b0cbd1ac4bd6bbfd417c3bed7ba3841c5196d09cef63449d8ffb1133b7a1d4a14a03b33c358e43824b1231cf15727d29ab8284e61151de71d1a28a8ec9bbe
-
Filesize
366KB
MD578994da864fe59d0f939acde3a334f81
SHA148985d294f3ef27546488958fecdbe9d6577ed34
SHA256ed81455bacbe08bb0bf0fd758087f8a1367411bc11e64d2cc12db13de1144b8b
SHA512d97b0cbd1ac4bd6bbfd417c3bed7ba3841c5196d09cef63449d8ffb1133b7a1d4a14a03b33c358e43824b1231cf15727d29ab8284e61151de71d1a28a8ec9bbe