Analysis
-
max time kernel
55s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:52
Static task
static1
Behavioral task
behavioral1
Sample
831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe
Resource
win10-20230220-en
General
-
Target
831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe
-
Size
689KB
-
MD5
ca56ca550e513964e03ef596d5950489
-
SHA1
a0ea50e9b174ae93f47e1c87aee863007339f8ae
-
SHA256
831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939
-
SHA512
55aa6e38ac033f0cb04019dca86dc40878a766b6aec3784e58b236b8d68a458817620278be14cc4bce89cf2e827f0b6e5330a98c52dad64376ecc4814e3b3111
-
SSDEEP
12288:tMrjy90t08anRVtL2lQ53KQKIaDPoxpC5gYDGyIjLDwC50Q/D:Ky/hzt1tajoZmg9ZD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1800.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1800.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1800.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1800.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1800.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1800.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2164-179-0x0000000004C60000-0x0000000004CA6000-memory.dmp family_redline behavioral1/memory/2164-180-0x00000000051E0000-0x0000000005224000-memory.dmp family_redline behavioral1/memory/2164-182-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-181-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-184-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-187-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-192-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-194-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-196-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-198-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-200-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-202-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-204-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-206-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-208-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-210-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-212-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-214-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-216-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline behavioral1/memory/2164-218-0x00000000051E0000-0x000000000521F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un399988.exepro1800.exequ3726.exesi505447.exepid process 2392 un399988.exe 2656 pro1800.exe 2164 qu3726.exe 4468 si505447.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1800.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1800.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1800.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exeun399988.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un399988.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un399988.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1800.exequ3726.exesi505447.exepid process 2656 pro1800.exe 2656 pro1800.exe 2164 qu3726.exe 2164 qu3726.exe 4468 si505447.exe 4468 si505447.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1800.exequ3726.exesi505447.exedescription pid process Token: SeDebugPrivilege 2656 pro1800.exe Token: SeDebugPrivilege 2164 qu3726.exe Token: SeDebugPrivilege 4468 si505447.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exeun399988.exedescription pid process target process PID 2320 wrote to memory of 2392 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe un399988.exe PID 2320 wrote to memory of 2392 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe un399988.exe PID 2320 wrote to memory of 2392 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe un399988.exe PID 2392 wrote to memory of 2656 2392 un399988.exe pro1800.exe PID 2392 wrote to memory of 2656 2392 un399988.exe pro1800.exe PID 2392 wrote to memory of 2656 2392 un399988.exe pro1800.exe PID 2392 wrote to memory of 2164 2392 un399988.exe qu3726.exe PID 2392 wrote to memory of 2164 2392 un399988.exe qu3726.exe PID 2392 wrote to memory of 2164 2392 un399988.exe qu3726.exe PID 2320 wrote to memory of 4468 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe si505447.exe PID 2320 wrote to memory of 4468 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe si505447.exe PID 2320 wrote to memory of 4468 2320 831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe si505447.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe"C:\Users\Admin\AppData\Local\Temp\831419e4a544e2560800a78d17e8ca1e36d2b7c708c7e60c32dbdf0332806939.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399988.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399988.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1800.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3726.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505447.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57b826156f2154f3ddafb2e9b5119b41f
SHA1e534eee0d655debe791ac14667205627b6647db5
SHA2563fd9ae667ce12c94b8577897f6b3a3a0e31b0197330fda30ae7ec50acb42a94c
SHA51243a05815a451e8e99d04fb5c251c3f238df2cfaa92bef6bf076bd9935f65506832da11e0565a860de07fb9e7b61825c809068cffb7797b8bbd62373373ac0e74
-
Filesize
175KB
MD57b826156f2154f3ddafb2e9b5119b41f
SHA1e534eee0d655debe791ac14667205627b6647db5
SHA2563fd9ae667ce12c94b8577897f6b3a3a0e31b0197330fda30ae7ec50acb42a94c
SHA51243a05815a451e8e99d04fb5c251c3f238df2cfaa92bef6bf076bd9935f65506832da11e0565a860de07fb9e7b61825c809068cffb7797b8bbd62373373ac0e74
-
Filesize
548KB
MD5183af51ee1ea0f65d3ced22665f93d55
SHA14d1a1b5179d78320ae78ab559d6fd8fc7f069e06
SHA25651a96cb3d067cde65b256b20abeb90bf2d6362019c14472ccb8151ea7dad350d
SHA512339d31f1d77298f06ef4e1c5cb32fdb1b85bc1d97b1849dc763826637e43b0a2afe81e5271c1b4fb7659d91972ea8d5e8772c01aec2435727b6a00b3a618cb91
-
Filesize
548KB
MD5183af51ee1ea0f65d3ced22665f93d55
SHA14d1a1b5179d78320ae78ab559d6fd8fc7f069e06
SHA25651a96cb3d067cde65b256b20abeb90bf2d6362019c14472ccb8151ea7dad350d
SHA512339d31f1d77298f06ef4e1c5cb32fdb1b85bc1d97b1849dc763826637e43b0a2afe81e5271c1b4fb7659d91972ea8d5e8772c01aec2435727b6a00b3a618cb91
-
Filesize
291KB
MD5df1bffb14be6c2fbfe78c7336e817688
SHA1fe87014dd143e608ce8c17d7f46443c5be729e04
SHA25637efe2fe90e1dc7ef9be0e7813cb16c872eb3dc4d9d23fbd4d26a0567f3f17f7
SHA512b1cdfa41f12f745d35d3ce348b4e4d4618089fabe14fe24bc97707355f2122e511a05f95f3adc591f990b0106fa3e13324c06cff65fedcb8bf0adb400e347429
-
Filesize
291KB
MD5df1bffb14be6c2fbfe78c7336e817688
SHA1fe87014dd143e608ce8c17d7f46443c5be729e04
SHA25637efe2fe90e1dc7ef9be0e7813cb16c872eb3dc4d9d23fbd4d26a0567f3f17f7
SHA512b1cdfa41f12f745d35d3ce348b4e4d4618089fabe14fe24bc97707355f2122e511a05f95f3adc591f990b0106fa3e13324c06cff65fedcb8bf0adb400e347429
-
Filesize
350KB
MD54346144288a93f965954c94a2e451cd4
SHA1c9e82dae6e222f60aec8eb0e25590493119ef08e
SHA256db279b25a60c4485d9e0387685ddd67f6cc1da05231972721557b4e0afa69d31
SHA5126a69b3c8402b18ccceb2afad571dde8efa4df2861cdc86b01e5751ae61177843561cab92d3fd49afe67ae66e98adccb2b8fd39dcf08ba09a7f4c6af0ae97cfc0
-
Filesize
350KB
MD54346144288a93f965954c94a2e451cd4
SHA1c9e82dae6e222f60aec8eb0e25590493119ef08e
SHA256db279b25a60c4485d9e0387685ddd67f6cc1da05231972721557b4e0afa69d31
SHA5126a69b3c8402b18ccceb2afad571dde8efa4df2861cdc86b01e5751ae61177843561cab92d3fd49afe67ae66e98adccb2b8fd39dcf08ba09a7f4c6af0ae97cfc0