Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 00:48
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
e18b0ecb25568db2735985ae4c47721f
-
SHA1
4a2fe08c76c297549f410509e70032c53ed12fe4
-
SHA256
5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d
-
SHA512
5bc7eae30df3a67e8b24ac66f7516713920de9290d709293caadc0fbe570b26270e2890ad8ae829cbc5e360f6a9a16976e54023a8599d67cddda03a4a0b231aa
-
SSDEEP
12288:+Mrdy90kSd9kvxDTNqY0Wx9D5ucAO78F30IE4qwm2Wr0vYS:7y6d9kvxDvAO78Vg4qwmBrs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3618.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3618.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro3618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-123-0x00000000022A0000-0x00000000022E6000-memory.dmp family_redline behavioral1/memory/1640-124-0x00000000022E0000-0x0000000002324000-memory.dmp family_redline behavioral1/memory/1640-125-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-126-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-128-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-130-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-132-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-134-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-136-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-138-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-140-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-142-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-144-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-147-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-151-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-153-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-155-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-157-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-159-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-161-0x00000000022E0000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/1640-1034-0x0000000004E30000-0x0000000004E70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un545606.exepro3618.exequ6477.exesi797101.exepid process 1732 un545606.exe 916 pro3618.exe 1640 qu6477.exe 2016 si797101.exe -
Loads dropped DLL 10 IoCs
Processes:
setup.exeun545606.exepro3618.exequ6477.exesi797101.exepid process 1992 setup.exe 1732 un545606.exe 1732 un545606.exe 1732 un545606.exe 916 pro3618.exe 1732 un545606.exe 1732 un545606.exe 1640 qu6477.exe 1992 setup.exe 2016 si797101.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3618.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro3618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3618.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
setup.exeun545606.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un545606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un545606.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3618.exequ6477.exesi797101.exepid process 916 pro3618.exe 916 pro3618.exe 1640 qu6477.exe 1640 qu6477.exe 2016 si797101.exe 2016 si797101.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3618.exequ6477.exesi797101.exedescription pid process Token: SeDebugPrivilege 916 pro3618.exe Token: SeDebugPrivilege 1640 qu6477.exe Token: SeDebugPrivilege 2016 si797101.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
setup.exeun545606.exedescription pid process target process PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1992 wrote to memory of 1732 1992 setup.exe un545606.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 916 1732 un545606.exe pro3618.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1732 wrote to memory of 1640 1732 un545606.exe qu6477.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe PID 1992 wrote to memory of 2016 1992 setup.exe si797101.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d36127ea4e8847374c229a54906369a6
SHA166bcdce55dec2e2466d06d34398094f6eba60d32
SHA256b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c
SHA512b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6
-
Filesize
175KB
MD5d36127ea4e8847374c229a54906369a6
SHA166bcdce55dec2e2466d06d34398094f6eba60d32
SHA256b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c
SHA512b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6
-
Filesize
558KB
MD5137f1e20525d143d9e5004e733755f39
SHA19149e537078247a3d56536addcaac5ba3d2849ac
SHA25667064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435
SHA5127e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9
-
Filesize
558KB
MD5137f1e20525d143d9e5004e733755f39
SHA19149e537078247a3d56536addcaac5ba3d2849ac
SHA25667064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435
SHA5127e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c
-
Filesize
175KB
MD5d36127ea4e8847374c229a54906369a6
SHA166bcdce55dec2e2466d06d34398094f6eba60d32
SHA256b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c
SHA512b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6
-
Filesize
175KB
MD5d36127ea4e8847374c229a54906369a6
SHA166bcdce55dec2e2466d06d34398094f6eba60d32
SHA256b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c
SHA512b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6
-
Filesize
558KB
MD5137f1e20525d143d9e5004e733755f39
SHA19149e537078247a3d56536addcaac5ba3d2849ac
SHA25667064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435
SHA5127e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9
-
Filesize
558KB
MD5137f1e20525d143d9e5004e733755f39
SHA19149e537078247a3d56536addcaac5ba3d2849ac
SHA25667064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435
SHA5127e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
307KB
MD585bf386b31300bb9a141127aca863575
SHA1f4ed8d8c99b11ec6f846555340fc0cc3156601ec
SHA256ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30
SHA512d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c
-
Filesize
365KB
MD5588eb11a9b46a2ede781e24a8cc443aa
SHA16d3d9a64f1e1bf103d68017e4a5c57ed28c2a263
SHA25633a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10
SHA51295f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c