Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2023, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
390353878989c08b4e68406572f0914f
-
SHA1
81bb75c476a38bc191ed62b86b015d8bec10142e
-
SHA256
3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209
-
SHA512
5d51c5f8830e0a497f1a77d862af183fa9b0fec4c2c5609e176f5c739152c4d6cb414f692aad7e34093d6122fdc12ac64b8d258fd147f13ace39e9126ebc0796
-
SSDEEP
12288:KMrNy909uoPmynsWYKHjfajnDcvYRW3XpjJappxyGWt7lik8xgK:/ywPlnVYKzajnAYRIX9J2WbikTK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9315.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1720-123-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/1720-124-0x00000000024A0000-0x00000000024E4000-memory.dmp family_redline behavioral1/memory/1720-125-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-126-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-128-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-130-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-136-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-139-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-132-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-141-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-143-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-145-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-147-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-149-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-151-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-153-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-155-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-157-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-159-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-161-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1720-1034-0x00000000028C0000-0x0000000002900000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1696 un370785.exe 864 pro9315.exe 1720 qu1034.exe 1560 si956069.exe -
Loads dropped DLL 10 IoCs
pid Process 2044 setup.exe 1696 un370785.exe 1696 un370785.exe 1696 un370785.exe 864 pro9315.exe 1696 un370785.exe 1696 un370785.exe 1720 qu1034.exe 2044 setup.exe 1560 si956069.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9315.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un370785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un370785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 864 pro9315.exe 864 pro9315.exe 1720 qu1034.exe 1720 qu1034.exe 1560 si956069.exe 1560 si956069.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 864 pro9315.exe Token: SeDebugPrivilege 1720 qu1034.exe Token: SeDebugPrivilege 1560 si956069.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 2044 wrote to memory of 1696 2044 setup.exe 28 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 864 1696 un370785.exe 29 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 1696 wrote to memory of 1720 1696 un370785.exe 30 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32 PID 2044 wrote to memory of 1560 2044 setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770