Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 00:51
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
560438562e86acf69f02aeda2086968b
-
SHA1
96d0dc3fd4d18e54f933109d75ac5807caa1cc77
-
SHA256
8b539d02f4658dc80f89a69e2b355796f48d8d68b6174dff551b4ff29277523c
-
SHA512
0e9047c7ca34da83dde4394846a060988af4c412e3025177775ad3deb5d95cae38a25d3cdbdadc3cc58c083855b87d427670edea6441ffb3bc75c70a6369674a
-
SSDEEP
12288:WMrTy900GpXQD7JDgatv9DGIcA6GNPqO+0/XOAnDOju60hO0xfg:1yBHDVzX6wqE/XO4DOCzg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5627.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/940-124-0x0000000000840000-0x0000000000886000-memory.dmp family_redline behavioral1/memory/940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp family_redline behavioral1/memory/940-126-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-127-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-129-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-131-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-133-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-135-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-137-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-139-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-141-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-143-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-145-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-147-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-149-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-151-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-153-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-155-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-157-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-159-0x0000000000E80000-0x0000000000EBF000-memory.dmp family_redline behavioral1/memory/940-1035-0x0000000004F10000-0x0000000004F50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1668 un253705.exe 1736 pro5627.exe 940 qu8658.exe 2044 si931348.exe -
Loads dropped DLL 10 IoCs
pid Process 2032 setup.exe 1668 un253705.exe 1668 un253705.exe 1668 un253705.exe 1736 pro5627.exe 1668 un253705.exe 1668 un253705.exe 940 qu8658.exe 2032 setup.exe 2044 si931348.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro5627.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un253705.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un253705.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1736 pro5627.exe 1736 pro5627.exe 940 qu8658.exe 940 qu8658.exe 2044 si931348.exe 2044 si931348.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1736 pro5627.exe Token: SeDebugPrivilege 940 qu8658.exe Token: SeDebugPrivilege 2044 si931348.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 2032 wrote to memory of 1668 2032 setup.exe 27 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 1736 1668 un253705.exe 28 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 1668 wrote to memory of 940 1668 un253705.exe 29 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31 PID 2032 wrote to memory of 2044 2032 setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fa52d4790dd6c0b52d36161f70fe2152
SHA1c723449883ff847e69b9e00e90d1dd1994c439a8
SHA2564ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2
SHA512fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f
-
Filesize
175KB
MD5fa52d4790dd6c0b52d36161f70fe2152
SHA1c723449883ff847e69b9e00e90d1dd1994c439a8
SHA2564ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2
SHA512fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f
-
Filesize
558KB
MD5f714a682a4e5f9c53e6c2b3d7a3b978e
SHA11e5932682cd957a590b9316796f51745a077e8f9
SHA2563d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d
SHA512960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d
-
Filesize
558KB
MD5f714a682a4e5f9c53e6c2b3d7a3b978e
SHA11e5932682cd957a590b9316796f51745a077e8f9
SHA2563d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d
SHA512960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99
-
Filesize
175KB
MD5fa52d4790dd6c0b52d36161f70fe2152
SHA1c723449883ff847e69b9e00e90d1dd1994c439a8
SHA2564ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2
SHA512fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f
-
Filesize
175KB
MD5fa52d4790dd6c0b52d36161f70fe2152
SHA1c723449883ff847e69b9e00e90d1dd1994c439a8
SHA2564ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2
SHA512fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f
-
Filesize
558KB
MD5f714a682a4e5f9c53e6c2b3d7a3b978e
SHA11e5932682cd957a590b9316796f51745a077e8f9
SHA2563d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d
SHA512960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d
-
Filesize
558KB
MD5f714a682a4e5f9c53e6c2b3d7a3b978e
SHA11e5932682cd957a590b9316796f51745a077e8f9
SHA2563d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d
SHA512960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
307KB
MD5f18c6b8db70568744924d51ae2849a71
SHA1df11b10e0c96fe98703d78b607b8019fbb06a8af
SHA2567022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d
SHA5120679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99
-
Filesize
365KB
MD53d9d6a5b41346391155be7d69dccb5a5
SHA1c4a888e11cca99e4877b9579a295a9476a7be4db
SHA256713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65
SHA512a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99