Analysis
-
max time kernel
53s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:07
Static task
static1
Behavioral task
behavioral1
Sample
8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe
Resource
win10-20230220-en
General
-
Target
8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe
-
Size
700KB
-
MD5
016bc34dcb7c32da11b6a937950ec552
-
SHA1
eac4e3284fbb84edb51e96588bfd2b4fb2aa70e8
-
SHA256
8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08
-
SHA512
b657fdfabf2ad1969de3600588f396d89792fc82c30eecc28933c30605759b4bae65a0110554c342aa8e168201c5dd43cee93b4615485f78c8b1d4ed5fe41cfa
-
SSDEEP
12288:0Mrly90YiIy7z0k2GLEgoDGTa9DGjcAy8F/D7ebft+Her1AtrM0tSt:Ry7pgseEgoDGTPy8hDb+ZARM0tSt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2484.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2484.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3160-180-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/3160-181-0x0000000002860000-0x00000000028A4000-memory.dmp family_redline behavioral1/memory/3160-183-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-182-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-185-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-187-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-189-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-191-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-193-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-195-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-197-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-200-0x00000000028A0000-0x00000000028B0000-memory.dmp family_redline behavioral1/memory/3160-201-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-205-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-207-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-209-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-211-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-213-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-215-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-217-0x0000000002860000-0x000000000289F000-memory.dmp family_redline behavioral1/memory/3160-219-0x0000000002860000-0x000000000289F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un011773.exepro2484.exequ0430.exesi694202.exepid process 3276 un011773.exe 3748 pro2484.exe 3160 qu0430.exe 4612 si694202.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2484.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2484.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exeun011773.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011773.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011773.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2484.exequ0430.exesi694202.exepid process 3748 pro2484.exe 3748 pro2484.exe 3160 qu0430.exe 3160 qu0430.exe 4612 si694202.exe 4612 si694202.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2484.exequ0430.exesi694202.exedescription pid process Token: SeDebugPrivilege 3748 pro2484.exe Token: SeDebugPrivilege 3160 qu0430.exe Token: SeDebugPrivilege 4612 si694202.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exeun011773.exedescription pid process target process PID 3240 wrote to memory of 3276 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe un011773.exe PID 3240 wrote to memory of 3276 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe un011773.exe PID 3240 wrote to memory of 3276 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe un011773.exe PID 3276 wrote to memory of 3748 3276 un011773.exe pro2484.exe PID 3276 wrote to memory of 3748 3276 un011773.exe pro2484.exe PID 3276 wrote to memory of 3748 3276 un011773.exe pro2484.exe PID 3276 wrote to memory of 3160 3276 un011773.exe qu0430.exe PID 3276 wrote to memory of 3160 3276 un011773.exe qu0430.exe PID 3276 wrote to memory of 3160 3276 un011773.exe qu0430.exe PID 3240 wrote to memory of 4612 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe si694202.exe PID 3240 wrote to memory of 4612 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe si694202.exe PID 3240 wrote to memory of 4612 3240 8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe si694202.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe"C:\Users\Admin\AppData\Local\Temp\8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD511a8be6616a70ea6e50e6d3952ac4543
SHA1c2f62334ce20e206c6face162801f1ba0af3b877
SHA25622c09933249ebca44b3b01a7ae97ad79386bc9e6a3b1ed2c2342d4facf4d90ac
SHA512782f26ffbe2f288b952e95078f98a694eef59b473729ac47fb99708618544d316f165e4fafbe4779f0ba58bf06aae9a7c9eec8e7f44f14dc094612b383a62e49
-
Filesize
175KB
MD511a8be6616a70ea6e50e6d3952ac4543
SHA1c2f62334ce20e206c6face162801f1ba0af3b877
SHA25622c09933249ebca44b3b01a7ae97ad79386bc9e6a3b1ed2c2342d4facf4d90ac
SHA512782f26ffbe2f288b952e95078f98a694eef59b473729ac47fb99708618544d316f165e4fafbe4779f0ba58bf06aae9a7c9eec8e7f44f14dc094612b383a62e49
-
Filesize
558KB
MD5896981a830a7630dd6dc99032cd10766
SHA17c15fa05fdb8287b267c24d675810505d4999555
SHA2568f614565bbc5bbd9828e7b8a22dde88f5f55a7cd5c69a3bc12d5dd396428a8a5
SHA5128fd663c4c7ea737b0b70ca635dc0d07ccb8e2c5d394ec34ffbb8fa05acd0045adca80799f6fbf02db7f64397aa06f6d6c4ccf00749595604778cf8d3308e51ec
-
Filesize
558KB
MD5896981a830a7630dd6dc99032cd10766
SHA17c15fa05fdb8287b267c24d675810505d4999555
SHA2568f614565bbc5bbd9828e7b8a22dde88f5f55a7cd5c69a3bc12d5dd396428a8a5
SHA5128fd663c4c7ea737b0b70ca635dc0d07ccb8e2c5d394ec34ffbb8fa05acd0045adca80799f6fbf02db7f64397aa06f6d6c4ccf00749595604778cf8d3308e51ec
-
Filesize
307KB
MD55a5eecb5af458209ac84133e44a777d8
SHA1d7531342abdfe9f6091b0af18c0085f0797cfe19
SHA256a59f884f3e3b1fb00c799c58dd1e20838b6cadb62155135ddba68f92d70e6fff
SHA512a559b1846a1538ec89012a6281d4e2ac58ad1c42cd94c98dc8fb17af7f100d2a6bf3f28996bbe5b9acaa8e2cc08317ef138f590e15870bc7bb06b6c10be202ee
-
Filesize
307KB
MD55a5eecb5af458209ac84133e44a777d8
SHA1d7531342abdfe9f6091b0af18c0085f0797cfe19
SHA256a59f884f3e3b1fb00c799c58dd1e20838b6cadb62155135ddba68f92d70e6fff
SHA512a559b1846a1538ec89012a6281d4e2ac58ad1c42cd94c98dc8fb17af7f100d2a6bf3f28996bbe5b9acaa8e2cc08317ef138f590e15870bc7bb06b6c10be202ee
-
Filesize
365KB
MD5896337b92a65507b8e8c79cffcb743ac
SHA1b652ea48e61384a7d356da3695bc60dd16a84bef
SHA25693f53d37328cf520d57b18d071bd165ebf5701a480c2b1df7f5f4a045afa01ef
SHA512ebcd84ad491edaf2712ed606a9f49b68bcb436603502d5253d8f762eda7e4a8d366a832028799f79ace6e0b6f0509282ee07f6f4bdec24380afaf29a75b1d821
-
Filesize
365KB
MD5896337b92a65507b8e8c79cffcb743ac
SHA1b652ea48e61384a7d356da3695bc60dd16a84bef
SHA25693f53d37328cf520d57b18d071bd165ebf5701a480c2b1df7f5f4a045afa01ef
SHA512ebcd84ad491edaf2712ed606a9f49b68bcb436603502d5253d8f762eda7e4a8d366a832028799f79ace6e0b6f0509282ee07f6f4bdec24380afaf29a75b1d821