Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
e5c39288174fe8301d8ce5eadbb9fc45
-
SHA1
35b0f9f9d8511c84a6a6adbc9ffcdac21163eb7e
-
SHA256
59a96ae7fe2837bb38938348c93c5809df4fcd1f57fa2ea6da684451c875d516
-
SHA512
5e0d102abcb17f92eca8174b893de4e208f2d8ced06c18ba444c7a08fed84982c70fab68a717e371e7861246dda1316d91a4cb6521b231a38fe815cf90274508
-
SSDEEP
12288:qMrvy90EQpjD97tL3M9DqecAYqoNdqYTTQBmwu60EOQd5/:VyDQ/xYY/qG9He5/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0178.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0178.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0178.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1188-123-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/1188-124-0x0000000002550000-0x0000000002594000-memory.dmp family_redline behavioral1/memory/1188-125-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-126-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-128-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-130-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-132-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-135-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-139-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-141-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-143-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-145-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-147-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-149-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-151-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-153-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-155-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-157-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-159-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/1188-161-0x0000000002550000-0x000000000258F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un027665.exepro0178.exequ5708.exesi491364.exepid process 1352 un027665.exe 1176 pro0178.exe 1188 qu5708.exe 1224 si491364.exe -
Loads dropped DLL 10 IoCs
Processes:
setup.exeun027665.exepro0178.exequ5708.exesi491364.exepid process 1444 setup.exe 1352 un027665.exe 1352 un027665.exe 1352 un027665.exe 1176 pro0178.exe 1352 un027665.exe 1352 un027665.exe 1188 qu5708.exe 1444 setup.exe 1224 si491364.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0178.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro0178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0178.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
setup.exeun027665.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un027665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un027665.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0178.exequ5708.exesi491364.exepid process 1176 pro0178.exe 1176 pro0178.exe 1188 qu5708.exe 1188 qu5708.exe 1224 si491364.exe 1224 si491364.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0178.exequ5708.exesi491364.exedescription pid process Token: SeDebugPrivilege 1176 pro0178.exe Token: SeDebugPrivilege 1188 qu5708.exe Token: SeDebugPrivilege 1224 si491364.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
setup.exeun027665.exedescription pid process target process PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1444 wrote to memory of 1352 1444 setup.exe un027665.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1176 1352 un027665.exe pro0178.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1352 wrote to memory of 1188 1352 un027665.exe qu5708.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe PID 1444 wrote to memory of 1224 1444 setup.exe si491364.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027665.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0178.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491364.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491364.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5eebcd5db7c3df05e789364f005301101
SHA12285e34a146573381737b0201fd9e7fc638cd151
SHA256fec54b475baf6e4f6e355b307a0a197a150c3f99f229214d7b51a87f1d317c7b
SHA512d05dc3c64e89423c4b24c96a50b2b42b3755950cfe6e952235edfc332588178882ce7c65f89323b3b9a49cf03d51e934e56ed560ea15693a6611fdac9ac9ae43
-
Filesize
175KB
MD5eebcd5db7c3df05e789364f005301101
SHA12285e34a146573381737b0201fd9e7fc638cd151
SHA256fec54b475baf6e4f6e355b307a0a197a150c3f99f229214d7b51a87f1d317c7b
SHA512d05dc3c64e89423c4b24c96a50b2b42b3755950cfe6e952235edfc332588178882ce7c65f89323b3b9a49cf03d51e934e56ed560ea15693a6611fdac9ac9ae43
-
Filesize
558KB
MD5dbea9fc2487883c906efd56330ce00c4
SHA1fa12a1e3f77093a3f111210b8d48055d32f68d57
SHA256c0b42787a030146779caae3dc4b21e40a5ec5bdf51c639d693304de566c96365
SHA5121658549e5eb1c9cd3402bc48f79123e93ac030ddc10f7fb99a54903af838f2cd509b8a8c288c56a544051d7cab2a8d1d5e11c0caabf167e84b975774a9fa8b32
-
Filesize
558KB
MD5dbea9fc2487883c906efd56330ce00c4
SHA1fa12a1e3f77093a3f111210b8d48055d32f68d57
SHA256c0b42787a030146779caae3dc4b21e40a5ec5bdf51c639d693304de566c96365
SHA5121658549e5eb1c9cd3402bc48f79123e93ac030ddc10f7fb99a54903af838f2cd509b8a8c288c56a544051d7cab2a8d1d5e11c0caabf167e84b975774a9fa8b32
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf
-
Filesize
175KB
MD5eebcd5db7c3df05e789364f005301101
SHA12285e34a146573381737b0201fd9e7fc638cd151
SHA256fec54b475baf6e4f6e355b307a0a197a150c3f99f229214d7b51a87f1d317c7b
SHA512d05dc3c64e89423c4b24c96a50b2b42b3755950cfe6e952235edfc332588178882ce7c65f89323b3b9a49cf03d51e934e56ed560ea15693a6611fdac9ac9ae43
-
Filesize
175KB
MD5eebcd5db7c3df05e789364f005301101
SHA12285e34a146573381737b0201fd9e7fc638cd151
SHA256fec54b475baf6e4f6e355b307a0a197a150c3f99f229214d7b51a87f1d317c7b
SHA512d05dc3c64e89423c4b24c96a50b2b42b3755950cfe6e952235edfc332588178882ce7c65f89323b3b9a49cf03d51e934e56ed560ea15693a6611fdac9ac9ae43
-
Filesize
558KB
MD5dbea9fc2487883c906efd56330ce00c4
SHA1fa12a1e3f77093a3f111210b8d48055d32f68d57
SHA256c0b42787a030146779caae3dc4b21e40a5ec5bdf51c639d693304de566c96365
SHA5121658549e5eb1c9cd3402bc48f79123e93ac030ddc10f7fb99a54903af838f2cd509b8a8c288c56a544051d7cab2a8d1d5e11c0caabf167e84b975774a9fa8b32
-
Filesize
558KB
MD5dbea9fc2487883c906efd56330ce00c4
SHA1fa12a1e3f77093a3f111210b8d48055d32f68d57
SHA256c0b42787a030146779caae3dc4b21e40a5ec5bdf51c639d693304de566c96365
SHA5121658549e5eb1c9cd3402bc48f79123e93ac030ddc10f7fb99a54903af838f2cd509b8a8c288c56a544051d7cab2a8d1d5e11c0caabf167e84b975774a9fa8b32
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
307KB
MD50a36dc80fa5a24d4bc9baaa3e69ff87a
SHA195a374b7105bfa88080e8699ec5cb1b8e773954c
SHA25691ec9a1970219288802223dcd6ac3953925a42590e27984ab943d5e13cf530d5
SHA5129f232058931178934b6aee72fb6059d6d91ffc2077f2e702a8275ec1d403dc8a16963519f9194b037c14a33b7821f24f413a32bf02e996a9deb7f2f57837ef00
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf
-
Filesize
365KB
MD5059f744cee38f63340775f3741022090
SHA121b4e4795d1eae53e18695a38b98734c04bb6040
SHA256511ca0febadf7560ff121eebb1e4fc060e51aefb9f8ed7e145fffd9845cd888e
SHA5124afda4c7ecbd97abb448aaefdccfae8a1c9e306cb9d451269f4d527e5414b24e26290278681ed01186b867f0d5a74a497549316ddf61198b394657971a56cfbf