Analysis
-
max time kernel
54s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28/03/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe
Resource
win10-20230220-en
General
-
Target
415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe
-
Size
695KB
-
MD5
0d86b6d79e6597b66ab8d4bff0e7a5d3
-
SHA1
e998b38c3eebac063b8281b0c131ddeb9b8de39f
-
SHA256
415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5
-
SHA512
6d9d56dc0021f21e69238b8c06269434020b155fc145c00bfa1632f07327bb2fae7d6369f18dcc1258e4a3c8933712f20759cd1e40c98cafa4301568791beef3
-
SSDEEP
12288:FMr9y90bQz/zl2OLjk43NBQ9Ml5QO69/cX9LaQcLW6ekv0KFHFD+mE+NUVU:0yJb9BQ9YQO6qXNuRvp0GL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zaza
176.113.115.145:4125
-
auth_value
48bf44c663fe3c1035fb4dd0b91fde5d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2363.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4280-180-0x00000000049E0000-0x0000000004A26000-memory.dmp family_redline behavioral1/memory/4280-184-0x0000000007630000-0x0000000007674000-memory.dmp family_redline behavioral1/memory/4280-185-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-186-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-190-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-188-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-192-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-194-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-196-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-199-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-198-0x0000000004A90000-0x0000000004AA0000-memory.dmp family_redline behavioral1/memory/4280-201-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-203-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-205-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-207-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-209-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-211-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-213-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-215-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-217-0x0000000007630000-0x000000000766F000-memory.dmp family_redline behavioral1/memory/4280-219-0x0000000007630000-0x000000000766F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2608 un438634.exe 4228 pro2363.exe 4280 qu1880.exe 4712 si108582.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2363.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un438634.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un438634.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4228 pro2363.exe 4228 pro2363.exe 4280 qu1880.exe 4280 qu1880.exe 4712 si108582.exe 4712 si108582.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4228 pro2363.exe Token: SeDebugPrivilege 4280 qu1880.exe Token: SeDebugPrivilege 4712 si108582.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2608 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 66 PID 2612 wrote to memory of 2608 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 66 PID 2612 wrote to memory of 2608 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 66 PID 2608 wrote to memory of 4228 2608 un438634.exe 67 PID 2608 wrote to memory of 4228 2608 un438634.exe 67 PID 2608 wrote to memory of 4228 2608 un438634.exe 67 PID 2608 wrote to memory of 4280 2608 un438634.exe 68 PID 2608 wrote to memory of 4280 2608 un438634.exe 68 PID 2608 wrote to memory of 4280 2608 un438634.exe 68 PID 2612 wrote to memory of 4712 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 70 PID 2612 wrote to memory of 4712 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 70 PID 2612 wrote to memory of 4712 2612 415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe"C:\Users\Admin\AppData\Local\Temp\415669ebbf3e3b127c4f1e1a09e4aab46f53405302659741af060228e690c6f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438634.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438634.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2363.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1880.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1880.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108582.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50789a45e4dffc458c4ec5e735e9e6ebb
SHA1517c155f9c1e5144b6f4cdc87d1400e56bdd364b
SHA2565b09dc2185e1c2c1cf0aeeaab84cf935221cb3b58d43ccfcfc74ca2e34c42267
SHA512422fd020433d1a692055cf0a1fe8a96efb58a6c05756d9658f0b1f1a94831f3b82c6ad6e4910d3000e30d9f73a525f89cf3a9c530f4464d1e391edd7ae609495
-
Filesize
175KB
MD50789a45e4dffc458c4ec5e735e9e6ebb
SHA1517c155f9c1e5144b6f4cdc87d1400e56bdd364b
SHA2565b09dc2185e1c2c1cf0aeeaab84cf935221cb3b58d43ccfcfc74ca2e34c42267
SHA512422fd020433d1a692055cf0a1fe8a96efb58a6c05756d9658f0b1f1a94831f3b82c6ad6e4910d3000e30d9f73a525f89cf3a9c530f4464d1e391edd7ae609495
-
Filesize
554KB
MD5b2474885a7bab6ea4e5161b2f66d7026
SHA12c571cfa75c2c535295ed4f0ce8426af70a03388
SHA256e7d3e59dcd6d3418b235d1d56568a1fc78b811bf966c46a6e86211403c8c3ab1
SHA512682aad5dd87cc9ef2efb36d8f2dcd91184a61a3dca7830311c253dee24cbd887dce18c0e6f94ecaefcf9c6d6f5733cc794fcfff22c2681fa1a766365e8f73e36
-
Filesize
554KB
MD5b2474885a7bab6ea4e5161b2f66d7026
SHA12c571cfa75c2c535295ed4f0ce8426af70a03388
SHA256e7d3e59dcd6d3418b235d1d56568a1fc78b811bf966c46a6e86211403c8c3ab1
SHA512682aad5dd87cc9ef2efb36d8f2dcd91184a61a3dca7830311c253dee24cbd887dce18c0e6f94ecaefcf9c6d6f5733cc794fcfff22c2681fa1a766365e8f73e36
-
Filesize
345KB
MD5b6aa34450fc693fdd8588c3e2f2dee28
SHA1dbd167767cfbe07f45a0de58a6fb481ac1fb15e7
SHA256fa4925e4b3b135e60e4956eff8f1c4d5daeb028a65ebb2ecfdeafdf83f305b65
SHA512d335eb49356563c9937b9eaad219bd0450db2dd84b81a8b4100304f43620652fc156a956d1298bd6beafe951a610342a87d0f0fd251575745da2b9cfc4c0df56
-
Filesize
345KB
MD5b6aa34450fc693fdd8588c3e2f2dee28
SHA1dbd167767cfbe07f45a0de58a6fb481ac1fb15e7
SHA256fa4925e4b3b135e60e4956eff8f1c4d5daeb028a65ebb2ecfdeafdf83f305b65
SHA512d335eb49356563c9937b9eaad219bd0450db2dd84b81a8b4100304f43620652fc156a956d1298bd6beafe951a610342a87d0f0fd251575745da2b9cfc4c0df56
-
Filesize
403KB
MD57f9a6e9d9fce40363188e24f8e666044
SHA1a1d3545eb489ed1b385d32ce0ff331e998366c56
SHA256176bdf947ccf59ed4f64bdabff4392a2b25db6c4c6346c84334b6d87a8582e67
SHA5121513400f47a48638a4bc6537aae15182b2962a51833d99dc7ee8082cb0711b523c3a8a67e950a88541b575522a7ed5880990c9061c2550cdb8c59c9190694d52
-
Filesize
403KB
MD57f9a6e9d9fce40363188e24f8e666044
SHA1a1d3545eb489ed1b385d32ce0ff331e998366c56
SHA256176bdf947ccf59ed4f64bdabff4392a2b25db6c4c6346c84334b6d87a8582e67
SHA5121513400f47a48638a4bc6537aae15182b2962a51833d99dc7ee8082cb0711b523c3a8a67e950a88541b575522a7ed5880990c9061c2550cdb8c59c9190694d52