Analysis
-
max time kernel
55s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe
Resource
win10-20230220-en
General
-
Target
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe
-
Size
691KB
-
MD5
4f711e111e6496b8b518d78d068a0f98
-
SHA1
0943d9ce51e4f9ca480d7be3aa911345a424187a
-
SHA256
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf
-
SHA512
1211a25138b754d5efb98701e17ceea69cee22d204b2e219b68dfe6d95276795dccfe1756b26ed32afa5d9bac51d560a86fca95f331707aa63971fe276f82e1d
-
SSDEEP
12288:CMrgy901EMPjLoR/zZhI0Y9ixQoNtpNzIOtXdNa62X8ADloyP2:OyacVh+4em/oHX8ADlN2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1330.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1330.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-180-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/3048-181-0x00000000027B0000-0x00000000027F4000-memory.dmp family_redline behavioral1/memory/3048-183-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-182-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-185-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-187-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-189-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-191-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-193-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-195-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-197-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-199-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-201-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-203-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-205-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-207-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-209-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-211-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-215-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3048-213-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un581140.exepro1330.exequ7187.exesi657313.exepid process 2120 un581140.exe 4248 pro1330.exe 3048 qu7187.exe 4176 si657313.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1330.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1330.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un581140.exefd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un581140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un581140.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1330.exequ7187.exesi657313.exepid process 4248 pro1330.exe 4248 pro1330.exe 3048 qu7187.exe 3048 qu7187.exe 4176 si657313.exe 4176 si657313.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1330.exequ7187.exesi657313.exedescription pid process Token: SeDebugPrivilege 4248 pro1330.exe Token: SeDebugPrivilege 3048 qu7187.exe Token: SeDebugPrivilege 4176 si657313.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exeun581140.exedescription pid process target process PID 5044 wrote to memory of 2120 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe un581140.exe PID 5044 wrote to memory of 2120 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe un581140.exe PID 5044 wrote to memory of 2120 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe un581140.exe PID 2120 wrote to memory of 4248 2120 un581140.exe pro1330.exe PID 2120 wrote to memory of 4248 2120 un581140.exe pro1330.exe PID 2120 wrote to memory of 4248 2120 un581140.exe pro1330.exe PID 2120 wrote to memory of 3048 2120 un581140.exe qu7187.exe PID 2120 wrote to memory of 3048 2120 un581140.exe qu7187.exe PID 2120 wrote to memory of 3048 2120 un581140.exe qu7187.exe PID 5044 wrote to memory of 4176 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe si657313.exe PID 5044 wrote to memory of 4176 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe si657313.exe PID 5044 wrote to memory of 4176 5044 fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe si657313.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe"C:\Users\Admin\AppData\Local\Temp\fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD594b58cdf8d7dc0c9cef64af604a6f3ca
SHA15971b9e716ef81f3950bc9ada8d6d8402255b6d2
SHA25641fdc59a89c7511b8a66274c9183fe7d67e28abb9e274d1981cb6d8d3d0d20c1
SHA51242a77ff2749da38a315755707be55bd9003163398bc1058ab61a138b7b9588270cd0a01345a53859cbdb71989a3b4b31c75ba061340e3897d0fb9e4f9900433f
-
Filesize
175KB
MD594b58cdf8d7dc0c9cef64af604a6f3ca
SHA15971b9e716ef81f3950bc9ada8d6d8402255b6d2
SHA25641fdc59a89c7511b8a66274c9183fe7d67e28abb9e274d1981cb6d8d3d0d20c1
SHA51242a77ff2749da38a315755707be55bd9003163398bc1058ab61a138b7b9588270cd0a01345a53859cbdb71989a3b4b31c75ba061340e3897d0fb9e4f9900433f
-
Filesize
549KB
MD5295d190db031ba1f5adb0e5c6acff177
SHA1556d9617fc4be04d0f95cba670f2de5315fbec8c
SHA256cc60821fd6f881db95c18536915d1917d9ef297913cf22f99c306c60512afa8e
SHA512d9682225c13d63b6195e01fa69c7ef3f9ef633e6d09034f593cb9a9779832b8b6d08f07dc15c83a469dd21d4ca00d8afa4cdfec7d4f3e40a3b522b0d80212116
-
Filesize
549KB
MD5295d190db031ba1f5adb0e5c6acff177
SHA1556d9617fc4be04d0f95cba670f2de5315fbec8c
SHA256cc60821fd6f881db95c18536915d1917d9ef297913cf22f99c306c60512afa8e
SHA512d9682225c13d63b6195e01fa69c7ef3f9ef633e6d09034f593cb9a9779832b8b6d08f07dc15c83a469dd21d4ca00d8afa4cdfec7d4f3e40a3b522b0d80212116
-
Filesize
291KB
MD59127c1ab4945cbd7416f5df41bd8563b
SHA1d01d7ed630b5f9a6315a5b6c0ae77ea8deaf704b
SHA256526baf08ef96b74398f741692298270646f28b894bf68bfb9fcc91e74f8bbf3f
SHA5123ef5ab2be8d9a55779d34ccfec0a8c39493c6d39bfb9fb368807670e1515d956d3e1e7a4ef3cf2155743362280d0119782374a104d30bb09480bb5e965b48073
-
Filesize
291KB
MD59127c1ab4945cbd7416f5df41bd8563b
SHA1d01d7ed630b5f9a6315a5b6c0ae77ea8deaf704b
SHA256526baf08ef96b74398f741692298270646f28b894bf68bfb9fcc91e74f8bbf3f
SHA5123ef5ab2be8d9a55779d34ccfec0a8c39493c6d39bfb9fb368807670e1515d956d3e1e7a4ef3cf2155743362280d0119782374a104d30bb09480bb5e965b48073
-
Filesize
350KB
MD572f8aaedc02080b469b870943902227e
SHA14df4cfd962551f0ee4571efb7ddb96432a6c0938
SHA25681da7c18be2ac0e341f097fce2c042430cdffe6d1870aca086d77d7b6238f044
SHA512634ae73b934f1991d2e30fb94dc136d6f2d9a93ac73ab260314f195817696fc92270e1c3ce9fd6cfe6230d8f50687b36c8d5e59b581b350d1241b2f3fc52fde8
-
Filesize
350KB
MD572f8aaedc02080b469b870943902227e
SHA14df4cfd962551f0ee4571efb7ddb96432a6c0938
SHA25681da7c18be2ac0e341f097fce2c042430cdffe6d1870aca086d77d7b6238f044
SHA512634ae73b934f1991d2e30fb94dc136d6f2d9a93ac73ab260314f195817696fc92270e1c3ce9fd6cfe6230d8f50687b36c8d5e59b581b350d1241b2f3fc52fde8