Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:07
Static task
static1
Behavioral task
behavioral1
Sample
a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe
Resource
win10v2004-20230220-en
General
-
Target
a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe
-
Size
695KB
-
MD5
4c19150d459ba981120a4311d31368b8
-
SHA1
8e920063b955f027cc202cf30f5462d14476d834
-
SHA256
a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada
-
SHA512
b948c4099ba4e8c424e4940c692cbc33509b6529d563aa3cefddaa6626b2ede2ed99553f3941a2ff85d4e041e0966ae77b01db330570e1902fbf861cba829542
-
SSDEEP
12288:fMrPy90Js6SyhrnGbfGTRbFxMylueSK394eyvPSKzF9vJ6ay3X8/hu4zz:Ay8s67aGdbFxMylueJt4eyyGF53y3X81
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3979.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3979.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2404-190-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-220-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline behavioral1/memory/2404-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2404-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4184 un422653.exe 4736 pro3979.exe 2404 qu5644.exe 3128 si149018.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3979.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un422653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un422653.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4736 pro3979.exe 4736 pro3979.exe 2404 qu5644.exe 2404 qu5644.exe 3128 si149018.exe 3128 si149018.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4736 pro3979.exe Token: SeDebugPrivilege 2404 qu5644.exe Token: SeDebugPrivilege 3128 si149018.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4184 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 83 PID 3080 wrote to memory of 4184 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 83 PID 3080 wrote to memory of 4184 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 83 PID 4184 wrote to memory of 4736 4184 un422653.exe 84 PID 4184 wrote to memory of 4736 4184 un422653.exe 84 PID 4184 wrote to memory of 4736 4184 un422653.exe 84 PID 4184 wrote to memory of 2404 4184 un422653.exe 91 PID 4184 wrote to memory of 2404 4184 un422653.exe 91 PID 4184 wrote to memory of 2404 4184 un422653.exe 91 PID 3080 wrote to memory of 3128 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 93 PID 3080 wrote to memory of 3128 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 93 PID 3080 wrote to memory of 3128 3080 a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe"C:\Users\Admin\AppData\Local\Temp\a7e90548f89f37c67e4d4dbf19bd08aef7b9ccd396c88a51af57f511dcf83ada.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422653.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422653.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3979.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5644.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si149018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si149018.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55602d77c09d5552f35dd13894c60bc1a
SHA156917fc4f2545c7cd94784c42fd8b9238f77f464
SHA25698d82a44ab2d8f80eb5131ab58054aeebc63354e6afa5c9000a9f4aea759437a
SHA512b8008bd28d49c32f98990c20f8fecea30ea15126f9c3cd32a81dbe693874d0fe570c9b744022840b59ecddafcdb187e03273c2100c2c76ac701b47601ebf7233
-
Filesize
175KB
MD55602d77c09d5552f35dd13894c60bc1a
SHA156917fc4f2545c7cd94784c42fd8b9238f77f464
SHA25698d82a44ab2d8f80eb5131ab58054aeebc63354e6afa5c9000a9f4aea759437a
SHA512b8008bd28d49c32f98990c20f8fecea30ea15126f9c3cd32a81dbe693874d0fe570c9b744022840b59ecddafcdb187e03273c2100c2c76ac701b47601ebf7233
-
Filesize
553KB
MD593d027b2b41ad1812b807704ec806278
SHA1ebb33e55af06d3f18a8c7a7740b93c74380b9662
SHA256a3ef4c17d9e03022524b94f9c72dd7beb6cb3fbde2e9deb53739b90e32450e38
SHA5124191ef71da2054b51bb500a4b72d10bbc2c032a9fc81e16ab0c52c8ee80342147c86d378bca428a7e1171656721e63d4f4c030f62afc5578ce8abfb6f241d1fa
-
Filesize
553KB
MD593d027b2b41ad1812b807704ec806278
SHA1ebb33e55af06d3f18a8c7a7740b93c74380b9662
SHA256a3ef4c17d9e03022524b94f9c72dd7beb6cb3fbde2e9deb53739b90e32450e38
SHA5124191ef71da2054b51bb500a4b72d10bbc2c032a9fc81e16ab0c52c8ee80342147c86d378bca428a7e1171656721e63d4f4c030f62afc5578ce8abfb6f241d1fa
-
Filesize
308KB
MD5703ea2e6b2655868482cf5405e1dfef2
SHA1631f90dfd1ab3e52a965fef7e0557b50cf152b6e
SHA256c479a38db9839ee37eabcf579d7756f93f31bf99fb8add8e2d01e948e9977578
SHA512259688e4e28a6c67083f6f97b7e245c42a5e1967b20ee8d4186ce37bb5ed03696330c128128c86e769de682859be02d91259c4eb5091748ec239c0e4d68af437
-
Filesize
308KB
MD5703ea2e6b2655868482cf5405e1dfef2
SHA1631f90dfd1ab3e52a965fef7e0557b50cf152b6e
SHA256c479a38db9839ee37eabcf579d7756f93f31bf99fb8add8e2d01e948e9977578
SHA512259688e4e28a6c67083f6f97b7e245c42a5e1967b20ee8d4186ce37bb5ed03696330c128128c86e769de682859be02d91259c4eb5091748ec239c0e4d68af437
-
Filesize
366KB
MD590ca74c30e910508fa097488315b4863
SHA1132566c0f7a6d483825366044ae334f94a86d01f
SHA256b0a9020cea59bc62188c5721df273e5a05e1752a16d5d5e26fd2ac36e649cef4
SHA5120e68cf0693916eff9b6ff4e1060a65eb632d3a5f9f8b4b93229c8823ed08269e4496fb4f58e4c2b53a314c8a5f5551db9905be991cb26bd4ac9acdee96ba07c8
-
Filesize
366KB
MD590ca74c30e910508fa097488315b4863
SHA1132566c0f7a6d483825366044ae334f94a86d01f
SHA256b0a9020cea59bc62188c5721df273e5a05e1752a16d5d5e26fd2ac36e649cef4
SHA5120e68cf0693916eff9b6ff4e1060a65eb632d3a5f9f8b4b93229c8823ed08269e4496fb4f58e4c2b53a314c8a5f5551db9905be991cb26bd4ac9acdee96ba07c8