Analysis
-
max time kernel
131s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe
Resource
win10v2004-20230220-en
General
-
Target
ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe
-
Size
695KB
-
MD5
0cbea0c26ac17759f1f58dd1bf6abbaf
-
SHA1
2195f3f7a28d27485aa0e88a9ec29148297cd9f6
-
SHA256
ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a
-
SHA512
58884cfbcddad7dd42f0f699a509094b7d5e7f8440e784a60126a82e433a68535da512596eb5a05689dfe6684dc2a4ecde1b2f24078d3910556d54eb86645fbb
-
SSDEEP
12288:JMrdy90RAm0qFjX0bKEmpeuN6RJ7AcPuPlhk+nuyX8rPdzR1TJigzZqHGT:cy/mwKEmY9AcPelhJvyPNRJhqmT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6512.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6512.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4208-195-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-196-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-198-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-200-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-202-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-204-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-206-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-208-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-210-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-212-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-214-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-216-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-218-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-220-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-222-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-224-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-226-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4208-228-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3024 un872671.exe 1936 pro6512.exe 4208 qu7077.exe 1168 si311070.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6512.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un872671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un872671.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1828 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 pro6512.exe 1936 pro6512.exe 4208 qu7077.exe 4208 qu7077.exe 1168 si311070.exe 1168 si311070.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 pro6512.exe Token: SeDebugPrivilege 4208 qu7077.exe Token: SeDebugPrivilege 1168 si311070.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3024 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 84 PID 1788 wrote to memory of 3024 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 84 PID 1788 wrote to memory of 3024 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 84 PID 3024 wrote to memory of 1936 3024 un872671.exe 85 PID 3024 wrote to memory of 1936 3024 un872671.exe 85 PID 3024 wrote to memory of 1936 3024 un872671.exe 85 PID 3024 wrote to memory of 4208 3024 un872671.exe 89 PID 3024 wrote to memory of 4208 3024 un872671.exe 89 PID 3024 wrote to memory of 4208 3024 un872671.exe 89 PID 1788 wrote to memory of 1168 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 90 PID 1788 wrote to memory of 1168 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 90 PID 1788 wrote to memory of 1168 1788 ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe"C:\Users\Admin\AppData\Local\Temp\ad2eea7932b3cddb6beae671d001535b51cebaec639be00a5aa4668789df1d7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872671.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872671.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6512.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6512.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7077.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311070.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311070.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a03816e14155c18c398b3175dcd28ef3
SHA1163c1c68c592e650f995298cb6de5cbaa23ac1a5
SHA256ee8b09140d6df13d3e9cd9b2184249f99bd1e0942dc071f19c88d2dfc5dd71e7
SHA512af26821582ed9a8254c6dcecdea79ef7746134263e515b1645c2223915148d37912284b9edfae6fdd95e7d2003699cb356ec8936fc917ffcdc666dee4c57eaf7
-
Filesize
175KB
MD5a03816e14155c18c398b3175dcd28ef3
SHA1163c1c68c592e650f995298cb6de5cbaa23ac1a5
SHA256ee8b09140d6df13d3e9cd9b2184249f99bd1e0942dc071f19c88d2dfc5dd71e7
SHA512af26821582ed9a8254c6dcecdea79ef7746134263e515b1645c2223915148d37912284b9edfae6fdd95e7d2003699cb356ec8936fc917ffcdc666dee4c57eaf7
-
Filesize
553KB
MD5cd0c76867b67657f2e8b539d97833849
SHA1d2e9a6e40b8c9d93e77ed2468d9a1b3bbce76b9f
SHA2567a3b014e8c631a8b7d9e6fd2763cc33d0eb943c1fe3edde3bb92acd58cab0b67
SHA5129a0ec72a98855451007facdc74a2fdb6b8bf27126bd9470e23f0525172d6422cd990429163f109a1a407eb75f3551ef147115ded98ef6a2c3fe129e61d9f613e
-
Filesize
553KB
MD5cd0c76867b67657f2e8b539d97833849
SHA1d2e9a6e40b8c9d93e77ed2468d9a1b3bbce76b9f
SHA2567a3b014e8c631a8b7d9e6fd2763cc33d0eb943c1fe3edde3bb92acd58cab0b67
SHA5129a0ec72a98855451007facdc74a2fdb6b8bf27126bd9470e23f0525172d6422cd990429163f109a1a407eb75f3551ef147115ded98ef6a2c3fe129e61d9f613e
-
Filesize
308KB
MD5226f3e610b90617415ee3caff4027068
SHA156be794bcaf6bfb211c2acac69a82979d335fe91
SHA2560cac24e306267696457488369f861698b9040c32de4654461db2402bc934af1f
SHA512982340cea7a9bc05e551c3df3e9b4ffa5144bdd8a6959da4f12d04f93c1c16cfddc96c0904c9219368de211542ca9bf7e7e8459f4765babd76e2f294e9373fdb
-
Filesize
308KB
MD5226f3e610b90617415ee3caff4027068
SHA156be794bcaf6bfb211c2acac69a82979d335fe91
SHA2560cac24e306267696457488369f861698b9040c32de4654461db2402bc934af1f
SHA512982340cea7a9bc05e551c3df3e9b4ffa5144bdd8a6959da4f12d04f93c1c16cfddc96c0904c9219368de211542ca9bf7e7e8459f4765babd76e2f294e9373fdb
-
Filesize
366KB
MD5e2e184501557fb275f3812b147373b04
SHA10ccdbbc5565c207804cda49ebfdb8cf44ef4a01b
SHA2563894a0349eff02062fdd2bcfdae9499c96b76381ed7e2dbaaafadce4e66cdb4e
SHA5125990f837b01eb5c118d8af910fec6d5ccf7b0df4baf4959b70758113dc5e83ce59e47c77fd33822e1fe98b70cdbc91a0c28ea3561cf803a57cbc3ad7680f7d2e
-
Filesize
366KB
MD5e2e184501557fb275f3812b147373b04
SHA10ccdbbc5565c207804cda49ebfdb8cf44ef4a01b
SHA2563894a0349eff02062fdd2bcfdae9499c96b76381ed7e2dbaaafadce4e66cdb4e
SHA5125990f837b01eb5c118d8af910fec6d5ccf7b0df4baf4959b70758113dc5e83ce59e47c77fd33822e1fe98b70cdbc91a0c28ea3561cf803a57cbc3ad7680f7d2e