Analysis
-
max time kernel
57s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:40
Static task
static1
Behavioral task
behavioral1
Sample
8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe
Resource
win10-20230220-en
General
-
Target
8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe
-
Size
691KB
-
MD5
13d87c218f65dc9007841c6ddb091c6a
-
SHA1
11b3f0dd6fe7a8c50d94ef1f15981a7c8e6b376e
-
SHA256
8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c
-
SHA512
fa88ee99cab4f1424f2123699b86498cfe8e65ea911aa145c0db9ec1a956935069c7ccaa976bf01be2e12d57e4ec5d8243e0b0d5be992a873f510302ba10c175
-
SSDEEP
12288:qMr3y903E9mhwLsXCg/XpdxAqcyVve/UugY1zTZnlKoQdsqV7x:JysEBQXJAIte/5gYZFlKqqVd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1589.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4476-180-0x00000000026A0000-0x00000000026E6000-memory.dmp family_redline behavioral1/memory/4476-181-0x0000000004C80000-0x0000000004CC4000-memory.dmp family_redline behavioral1/memory/4476-182-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-183-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-185-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-187-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-189-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-191-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-195-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-197-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-193-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-199-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-201-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-203-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-205-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-210-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-213-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-215-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-217-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/4476-219-0x0000000004C80000-0x0000000004CBF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un582013.exepro1589.exequ8815.exesi350751.exepid process 4732 un582013.exe 5108 pro1589.exe 4476 qu8815.exe 2216 si350751.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1589.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1589.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exeun582013.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un582013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un582013.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1589.exequ8815.exesi350751.exepid process 5108 pro1589.exe 5108 pro1589.exe 4476 qu8815.exe 4476 qu8815.exe 2216 si350751.exe 2216 si350751.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1589.exequ8815.exesi350751.exedescription pid process Token: SeDebugPrivilege 5108 pro1589.exe Token: SeDebugPrivilege 4476 qu8815.exe Token: SeDebugPrivilege 2216 si350751.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exeun582013.exedescription pid process target process PID 4256 wrote to memory of 4732 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe un582013.exe PID 4256 wrote to memory of 4732 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe un582013.exe PID 4256 wrote to memory of 4732 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe un582013.exe PID 4732 wrote to memory of 5108 4732 un582013.exe pro1589.exe PID 4732 wrote to memory of 5108 4732 un582013.exe pro1589.exe PID 4732 wrote to memory of 5108 4732 un582013.exe pro1589.exe PID 4732 wrote to memory of 4476 4732 un582013.exe qu8815.exe PID 4732 wrote to memory of 4476 4732 un582013.exe qu8815.exe PID 4732 wrote to memory of 4476 4732 un582013.exe qu8815.exe PID 4256 wrote to memory of 2216 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe si350751.exe PID 4256 wrote to memory of 2216 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe si350751.exe PID 4256 wrote to memory of 2216 4256 8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe si350751.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe"C:\Users\Admin\AppData\Local\Temp\8bc66754a8c727c41d1aa8e684765fc315ebe33cb506b4ae4d004332a44f1a1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1589.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1589.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8815.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350751.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59ef6bda691470c0ec8baa772453ab0b6
SHA1169d4f697d4c1795bced47b3ddbb834299166c21
SHA256fe8f8d06c2284e0f147f4464bf3c8a2539ac5f95014547e631a6c2be007fb750
SHA51212915b477d0b098cf294608468b842ddcac9f4db345ab3733229a63194b3f8a224587647fb4838c8f545c1cc609656a7ea7f230def14628f31b12d7e2b4732a4
-
Filesize
175KB
MD59ef6bda691470c0ec8baa772453ab0b6
SHA1169d4f697d4c1795bced47b3ddbb834299166c21
SHA256fe8f8d06c2284e0f147f4464bf3c8a2539ac5f95014547e631a6c2be007fb750
SHA51212915b477d0b098cf294608468b842ddcac9f4db345ab3733229a63194b3f8a224587647fb4838c8f545c1cc609656a7ea7f230def14628f31b12d7e2b4732a4
-
Filesize
549KB
MD53e3e845ba22ffc64f6b5e36dd1da296f
SHA1be229d37dda2ed2799d0ece0ce7c3a0bf95074a2
SHA256ca12b5b4376923a4bf7ea97ecaf41f5aa37bdbf199938109a49f9fc8f0ad2603
SHA5126a3b0e3f10e6001e87734121b44dda703b5997760edb48acf40d9195a20e97095a1751b7280e8fa539903b19cfe7ec855c755ecdd6681eb547ed4a8bb6bd8826
-
Filesize
549KB
MD53e3e845ba22ffc64f6b5e36dd1da296f
SHA1be229d37dda2ed2799d0ece0ce7c3a0bf95074a2
SHA256ca12b5b4376923a4bf7ea97ecaf41f5aa37bdbf199938109a49f9fc8f0ad2603
SHA5126a3b0e3f10e6001e87734121b44dda703b5997760edb48acf40d9195a20e97095a1751b7280e8fa539903b19cfe7ec855c755ecdd6681eb547ed4a8bb6bd8826
-
Filesize
291KB
MD518f04b95ccea77ef33e75121a4951977
SHA1ec34491951830e676731ed5aba487edaaa354f1c
SHA256cef82789c20ce86508972b5404b092c081f1b1bb27ab1d6c3435c03a801ee373
SHA5127b111b2b8421acc9f6771cfd93ebdf78d1f0e7c328f4d929a1e766072c5898c736f98afbb34d2432f2e8b185b7983187c0ed6a00b039656090711f55e491fcd6
-
Filesize
291KB
MD518f04b95ccea77ef33e75121a4951977
SHA1ec34491951830e676731ed5aba487edaaa354f1c
SHA256cef82789c20ce86508972b5404b092c081f1b1bb27ab1d6c3435c03a801ee373
SHA5127b111b2b8421acc9f6771cfd93ebdf78d1f0e7c328f4d929a1e766072c5898c736f98afbb34d2432f2e8b185b7983187c0ed6a00b039656090711f55e491fcd6
-
Filesize
350KB
MD505942ce30d78635515f0c68edd904de5
SHA1bc922c8ac08700219fb8dfe941332dd48914d180
SHA256dd60be4a12f0e6721a19565264eebe263bbffd11bcfdd4802d67dbd6fe76a237
SHA51242a61b66240203c639c83fcaae88e7b0deb3a0f6ad53b3f7a68ac904ce8353deccfcce1ab97f81d0d575383af68f65ad23a87c6ede7695a67cbbb62f98128b39
-
Filesize
350KB
MD505942ce30d78635515f0c68edd904de5
SHA1bc922c8ac08700219fb8dfe941332dd48914d180
SHA256dd60be4a12f0e6721a19565264eebe263bbffd11bcfdd4802d67dbd6fe76a237
SHA51242a61b66240203c639c83fcaae88e7b0deb3a0f6ad53b3f7a68ac904ce8353deccfcce1ab97f81d0d575383af68f65ad23a87c6ede7695a67cbbb62f98128b39