Analysis
-
max time kernel
45s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:06
Static task
static1
Behavioral task
behavioral1
Sample
c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe
Resource
win10-20230220-en
General
-
Target
c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe
-
Size
701KB
-
MD5
7d38d17940ec828b45402464e72be358
-
SHA1
7af8105765fc63351d323b1db7d42e65e0e06357
-
SHA256
c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c
-
SHA512
d4cc02121c8322d3706dca448613ced19a194c9026b77f189c62d1ff3d50140eb740022dd46d2571e0a4081e67c89f4e2fdeaeb337f3a325caf44273b521e366
-
SSDEEP
12288:sMrdy90ucVfY67fch34hB2sR9DANcAD4NkNBqIBFTQY6772nGLHj/:xyyQ6Lu34hB2hD4eqeBW7yn4z
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8942.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8942.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3664-181-0x00000000026C0000-0x0000000002706000-memory.dmp family_redline behavioral1/memory/3664-182-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/3664-183-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-184-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-186-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-188-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-190-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-192-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-194-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-196-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-198-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-200-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-202-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-204-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-206-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-208-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-210-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-212-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-214-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3664-216-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un208983.exepro8942.exequ9943.exesi836005.exepid process 3568 un208983.exe 4164 pro8942.exe 3664 qu9943.exe 3508 si836005.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8942.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8942.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exeun208983.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un208983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un208983.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8942.exequ9943.exesi836005.exepid process 4164 pro8942.exe 4164 pro8942.exe 3664 qu9943.exe 3664 qu9943.exe 3508 si836005.exe 3508 si836005.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8942.exequ9943.exesi836005.exedescription pid process Token: SeDebugPrivilege 4164 pro8942.exe Token: SeDebugPrivilege 3664 qu9943.exe Token: SeDebugPrivilege 3508 si836005.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exeun208983.exedescription pid process target process PID 3068 wrote to memory of 3568 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe un208983.exe PID 3068 wrote to memory of 3568 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe un208983.exe PID 3068 wrote to memory of 3568 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe un208983.exe PID 3568 wrote to memory of 4164 3568 un208983.exe pro8942.exe PID 3568 wrote to memory of 4164 3568 un208983.exe pro8942.exe PID 3568 wrote to memory of 4164 3568 un208983.exe pro8942.exe PID 3568 wrote to memory of 3664 3568 un208983.exe qu9943.exe PID 3568 wrote to memory of 3664 3568 un208983.exe qu9943.exe PID 3568 wrote to memory of 3664 3568 un208983.exe qu9943.exe PID 3068 wrote to memory of 3508 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe si836005.exe PID 3068 wrote to memory of 3508 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe si836005.exe PID 3068 wrote to memory of 3508 3068 c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe si836005.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe"C:\Users\Admin\AppData\Local\Temp\c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD500f3ad217fa576e2748cc4ed9ccab9ac
SHA13afd7de1068bf12c084ce72c1515a298042f0d28
SHA256e4ec4b51403635a2c2611463481f034bb8a3e2f166064c1c413d82ef811468bf
SHA512514406602b3fd29b2ebde550a6c70faccd89fca79b693526ab67ee909344da091c661e0156240ce554417b1c7a55c32a8370a8be4ed0f159864db8e1493b8328
-
Filesize
175KB
MD500f3ad217fa576e2748cc4ed9ccab9ac
SHA13afd7de1068bf12c084ce72c1515a298042f0d28
SHA256e4ec4b51403635a2c2611463481f034bb8a3e2f166064c1c413d82ef811468bf
SHA512514406602b3fd29b2ebde550a6c70faccd89fca79b693526ab67ee909344da091c661e0156240ce554417b1c7a55c32a8370a8be4ed0f159864db8e1493b8328
-
Filesize
558KB
MD5f19cf56e823825e52167af09bfac14d7
SHA1c17a703fb83bea5a6cd98de5222e594382a561eb
SHA256d2ba98812e9a3827fcffc75b5970c31d2e2ccef1da3d0eca45edeff776d9cea3
SHA512a9736bdeeb883abea3ef7cf584dedd1d92154000b80c04a69d9302e657b920df22c375c89bebfbf3eec738b495fda6d0005c9dfe10d8a2a0136de4fe5e1192b8
-
Filesize
558KB
MD5f19cf56e823825e52167af09bfac14d7
SHA1c17a703fb83bea5a6cd98de5222e594382a561eb
SHA256d2ba98812e9a3827fcffc75b5970c31d2e2ccef1da3d0eca45edeff776d9cea3
SHA512a9736bdeeb883abea3ef7cf584dedd1d92154000b80c04a69d9302e657b920df22c375c89bebfbf3eec738b495fda6d0005c9dfe10d8a2a0136de4fe5e1192b8
-
Filesize
307KB
MD5d363477c7ea4432957c71620d690809d
SHA119d9eb0329186b24ea6226c5e02ee1bd8590bb4f
SHA2569f87f09611ed1ce09d8e881332efd3e675a127a4077af2063b811e493f3b0111
SHA5127b0d6e5122132950408450e5d81405fa62cce4ba5b7b5fd51467a6180a25552ba8a95f73ac4a6cdabf409982819cf58fe36853dd5f0af028d0325579f3cb0f2e
-
Filesize
307KB
MD5d363477c7ea4432957c71620d690809d
SHA119d9eb0329186b24ea6226c5e02ee1bd8590bb4f
SHA2569f87f09611ed1ce09d8e881332efd3e675a127a4077af2063b811e493f3b0111
SHA5127b0d6e5122132950408450e5d81405fa62cce4ba5b7b5fd51467a6180a25552ba8a95f73ac4a6cdabf409982819cf58fe36853dd5f0af028d0325579f3cb0f2e
-
Filesize
365KB
MD5335ec85cf37a4f257935937dc4c3952c
SHA1810f41e5cd02f09460df8ffdebb03452ca290dfc
SHA2568de17f885c9ab72b6809889e0c69a81d0772a7e4d0d97a5be8e9b500212d0afd
SHA512075da49e25b3bd6f7c90828a0730b08316546a0f689927cd4cfd84fb47fc79b357d5fcf0ddcabb94d8fbfd7616ecf530b230b4cdc80b24d34b59514e63871ae0
-
Filesize
365KB
MD5335ec85cf37a4f257935937dc4c3952c
SHA1810f41e5cd02f09460df8ffdebb03452ca290dfc
SHA2568de17f885c9ab72b6809889e0c69a81d0772a7e4d0d97a5be8e9b500212d0afd
SHA512075da49e25b3bd6f7c90828a0730b08316546a0f689927cd4cfd84fb47fc79b357d5fcf0ddcabb94d8fbfd7616ecf530b230b4cdc80b24d34b59514e63871ae0