Analysis
-
max time kernel
58s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:04
Static task
static1
Behavioral task
behavioral1
Sample
26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe
Resource
win10v2004-20230220-en
General
-
Target
26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe
-
Size
695KB
-
MD5
05667a524837d06c6a4312f1390b986d
-
SHA1
4416b2de3d1cde8f7ab00f12391171af38b966a9
-
SHA256
26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860
-
SHA512
d20e0ce4c50aba6901710b0312d1eedd0fb63e9fcaa36e8d9b0fe784355b4c54d83fd13cde20b472c938ca464fa55dcf506dd314dd41903c8e02cd9552e7a385
-
SSDEEP
12288:dMrTy90U2e/ESPlq6oDpYh8deDuml0m0R4Km+cKDlzSFqJbEAz0n0ObPAG0:Cyb2e/ESPPh8deDHlT0R4KXTxSUvA3bQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7482.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1680-189-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-190-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-192-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-194-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-196-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-198-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-200-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-202-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-204-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-206-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-208-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-210-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-214-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-217-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-219-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-221-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-223-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-225-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/1680-1109-0x00000000026B0000-0x00000000026C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4768 un332912.exe 464 pro7482.exe 1680 qu3333.exe 448 si189581.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7482.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7482.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un332912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un332912.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 464 pro7482.exe 464 pro7482.exe 1680 qu3333.exe 1680 qu3333.exe 448 si189581.exe 448 si189581.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 464 pro7482.exe Token: SeDebugPrivilege 1680 qu3333.exe Token: SeDebugPrivilege 448 si189581.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4768 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 85 PID 4896 wrote to memory of 4768 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 85 PID 4896 wrote to memory of 4768 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 85 PID 4768 wrote to memory of 464 4768 un332912.exe 86 PID 4768 wrote to memory of 464 4768 un332912.exe 86 PID 4768 wrote to memory of 464 4768 un332912.exe 86 PID 4768 wrote to memory of 1680 4768 un332912.exe 89 PID 4768 wrote to memory of 1680 4768 un332912.exe 89 PID 4768 wrote to memory of 1680 4768 un332912.exe 89 PID 4896 wrote to memory of 448 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 90 PID 4896 wrote to memory of 448 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 90 PID 4896 wrote to memory of 448 4896 26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe"C:\Users\Admin\AppData\Local\Temp\26aa0cb4f40f9533360870030aaf572ddb58a0455d80ff5fe90baae8b4a53860.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un332912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un332912.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7482.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3333.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3333.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si189581.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si189581.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bc51c0add3ff144d7fc40dbb26cca0e7
SHA12fc0a8fcf8552720ea18e60dc6b56fb7f48ef4de
SHA25660fa87a755f8c86598cb9e685598d0103ac5d4e7393d36185e2113aaea54c241
SHA512348f3b5c0944327b6323fa2b61bf5caa9fafe33396ef1b7ba6ef3c9e333c6040edf7bf2c764fda39f49e1fab17bfead9977de11346d8f09d048aeb612dcd6e36
-
Filesize
175KB
MD5bc51c0add3ff144d7fc40dbb26cca0e7
SHA12fc0a8fcf8552720ea18e60dc6b56fb7f48ef4de
SHA25660fa87a755f8c86598cb9e685598d0103ac5d4e7393d36185e2113aaea54c241
SHA512348f3b5c0944327b6323fa2b61bf5caa9fafe33396ef1b7ba6ef3c9e333c6040edf7bf2c764fda39f49e1fab17bfead9977de11346d8f09d048aeb612dcd6e36
-
Filesize
554KB
MD57bd089f480d1d391226b3da1ddaea006
SHA1968457cf65db4d391e1a866f4830096de6eccdce
SHA256539d5f768362d03845cd87b6dcc5a92a73426a2c07db77bcc722cbba0818b517
SHA51259bee639c923efbf0d781e4ce7ce20a020b95d2072deeec8e9b1b466c9f26623745b54a0080221f6227aa4045e3fcf352ba364a68ccc258eed6c24f8b5d878d5
-
Filesize
554KB
MD57bd089f480d1d391226b3da1ddaea006
SHA1968457cf65db4d391e1a866f4830096de6eccdce
SHA256539d5f768362d03845cd87b6dcc5a92a73426a2c07db77bcc722cbba0818b517
SHA51259bee639c923efbf0d781e4ce7ce20a020b95d2072deeec8e9b1b466c9f26623745b54a0080221f6227aa4045e3fcf352ba364a68ccc258eed6c24f8b5d878d5
-
Filesize
308KB
MD591eddd2e4c55451086398bff3c7c3dfb
SHA1948cf7edd2f7bd3488549256e352ccfb77a3a0fc
SHA25625d2c1bbbc56434e4c17335c93529b5e87a116d313456e9faeb344de0cca7aa7
SHA51263fd3410359f24a28cd110ea66944d57722effe4b7023eb62fc387048edf1b10d5b27c741a8fae55eb4bb8e26a618e93890512d470081857e788b69c6cd9753e
-
Filesize
308KB
MD591eddd2e4c55451086398bff3c7c3dfb
SHA1948cf7edd2f7bd3488549256e352ccfb77a3a0fc
SHA25625d2c1bbbc56434e4c17335c93529b5e87a116d313456e9faeb344de0cca7aa7
SHA51263fd3410359f24a28cd110ea66944d57722effe4b7023eb62fc387048edf1b10d5b27c741a8fae55eb4bb8e26a618e93890512d470081857e788b69c6cd9753e
-
Filesize
366KB
MD5f226b619bd44d93ef0589d183793495f
SHA1a7a3c257e950835ac65f1eaad78584867ec6bdfa
SHA25643a6aba63c700fa34070e73429b90f45ddb33394939bb82b3129fb4cdc666a5c
SHA51289461083ec0080d100b83b2d4909573d4a4047845319b3a24eaec04a8ac2d02d01e621aec43ebb29f226dba73c82cf0e43a4027578784b1808c58947c8c1d21f
-
Filesize
366KB
MD5f226b619bd44d93ef0589d183793495f
SHA1a7a3c257e950835ac65f1eaad78584867ec6bdfa
SHA25643a6aba63c700fa34070e73429b90f45ddb33394939bb82b3129fb4cdc666a5c
SHA51289461083ec0080d100b83b2d4909573d4a4047845319b3a24eaec04a8ac2d02d01e621aec43ebb29f226dba73c82cf0e43a4027578784b1808c58947c8c1d21f