Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:10
Static task
static1
Behavioral task
behavioral1
Sample
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe
Resource
win10-20230220-en
General
-
Target
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe
-
Size
700KB
-
MD5
534dd6d182950f2c33dd6a4b95c8ba5f
-
SHA1
49537e779c94e07b73b3df96e5ae25537e78ee8b
-
SHA256
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096
-
SHA512
b2e223bf3666eccb230e44b754afd7fa4ded0a1107e5d49c202be1c149d3d261bffd2d3bb4f707b9a8113ca8e7ca725e43e57a89c44cc5e0c971f62b260af334
-
SSDEEP
12288:kMrly905HCX5MgCcaisl2LA9D/scAQDNTqKadHM7PHB2+V7Zdwc:hywH4PaiSEcqTi7pFfec
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6369.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6369.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/4228-179-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/4228-180-0x0000000004CB0000-0x0000000004CF4000-memory.dmp family_redline behavioral1/memory/4228-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-182-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-184-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-186-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-188-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-190-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-192-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-194-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-196-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-198-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-200-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-202-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-204-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-206-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-208-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-210-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-212-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-214-0x0000000004CB0000-0x0000000004CEF000-memory.dmp family_redline behavioral1/memory/4228-305-0x0000000004D70000-0x0000000004D80000-memory.dmp family_redline behavioral1/memory/4228-1098-0x0000000004D70000-0x0000000004D80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un627165.exepro6369.exequ9398.exesi508124.exepid process 1172 un627165.exe 1384 pro6369.exe 4228 qu9398.exe 3780 si508124.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6369.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6369.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un627165.exead742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un627165.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un627165.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6369.exequ9398.exesi508124.exepid process 1384 pro6369.exe 1384 pro6369.exe 4228 qu9398.exe 4228 qu9398.exe 3780 si508124.exe 3780 si508124.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6369.exequ9398.exesi508124.exedescription pid process Token: SeDebugPrivilege 1384 pro6369.exe Token: SeDebugPrivilege 4228 qu9398.exe Token: SeDebugPrivilege 3780 si508124.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exeun627165.exedescription pid process target process PID 368 wrote to memory of 1172 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe un627165.exe PID 368 wrote to memory of 1172 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe un627165.exe PID 368 wrote to memory of 1172 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe un627165.exe PID 1172 wrote to memory of 1384 1172 un627165.exe pro6369.exe PID 1172 wrote to memory of 1384 1172 un627165.exe pro6369.exe PID 1172 wrote to memory of 1384 1172 un627165.exe pro6369.exe PID 1172 wrote to memory of 4228 1172 un627165.exe qu9398.exe PID 1172 wrote to memory of 4228 1172 un627165.exe qu9398.exe PID 1172 wrote to memory of 4228 1172 un627165.exe qu9398.exe PID 368 wrote to memory of 3780 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe si508124.exe PID 368 wrote to memory of 3780 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe si508124.exe PID 368 wrote to memory of 3780 368 ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe si508124.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe"C:\Users\Admin\AppData\Local\Temp\ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53d634df736615c0cf8b72449b5c82900
SHA1c289c4ec638a8d67c04d15a1c166198cf51bdeca
SHA256b3e2a50e88889e45b3276bca82d7a8a5ec2b9a463c91212a3528a734bb566837
SHA512f5abb6450fb41957a3195e632aee7a36ba56252e79bd2a573288796d1b90ad9e029f63e1a0afa82b7cb3276d17942b9440d5f2069ce0ce1338eb18cd97209a53
-
Filesize
175KB
MD53d634df736615c0cf8b72449b5c82900
SHA1c289c4ec638a8d67c04d15a1c166198cf51bdeca
SHA256b3e2a50e88889e45b3276bca82d7a8a5ec2b9a463c91212a3528a734bb566837
SHA512f5abb6450fb41957a3195e632aee7a36ba56252e79bd2a573288796d1b90ad9e029f63e1a0afa82b7cb3276d17942b9440d5f2069ce0ce1338eb18cd97209a53
-
Filesize
558KB
MD56b5e31b3572b71944792c2af26843fab
SHA1a06d62b84969810bbd42ea2cfc0adb999bea78fb
SHA256df1abe5235a07790284e2ec9e10dc1e86124aca085296c9e66c0a0bdd657af79
SHA5125160a151100f1a0c60a89949e55c43a6b3eeee51f9bbc2051ad0c5c51291d37e35bfc5a6f373b15c6a388f3bf6d1a56352670b318309fc268c7258650b181592
-
Filesize
558KB
MD56b5e31b3572b71944792c2af26843fab
SHA1a06d62b84969810bbd42ea2cfc0adb999bea78fb
SHA256df1abe5235a07790284e2ec9e10dc1e86124aca085296c9e66c0a0bdd657af79
SHA5125160a151100f1a0c60a89949e55c43a6b3eeee51f9bbc2051ad0c5c51291d37e35bfc5a6f373b15c6a388f3bf6d1a56352670b318309fc268c7258650b181592
-
Filesize
307KB
MD53ec460e72d4ceb97a82f5e48be0855dd
SHA1dccf7f9cf406e3ffcae4af9dfa448be8d6961b51
SHA256d05b7327c20f61b671e45f88000f68cb7c29a0a1cf4106c11f61ea7ed6186f73
SHA5125724fc0e4c4ca8c74685167a19a365ff1b8e75eff2c02e0733fea7772d5d179033cdf8f001521e6edf28ce461d56fd332e72e1caed94863f1f368dc84adfd714
-
Filesize
307KB
MD53ec460e72d4ceb97a82f5e48be0855dd
SHA1dccf7f9cf406e3ffcae4af9dfa448be8d6961b51
SHA256d05b7327c20f61b671e45f88000f68cb7c29a0a1cf4106c11f61ea7ed6186f73
SHA5125724fc0e4c4ca8c74685167a19a365ff1b8e75eff2c02e0733fea7772d5d179033cdf8f001521e6edf28ce461d56fd332e72e1caed94863f1f368dc84adfd714
-
Filesize
365KB
MD5b8f7a39fc7ba067ae17ec5fee7b1ab6e
SHA18e2b3649d8ec7fb554b6f482f0e9f5a1544d2122
SHA256bc6e27d19f8ed17bf418f257f5e254087a6eb4f678db120f14ea39e9ff451b5c
SHA512cf4e9183432e1f5493b96fea5e5b6ce1d1060d335322330934a11f1bbdfa052d3039d4578742ba96a285fe5e2b88b56086a834cf076d56c1e21913ccc01c9e88
-
Filesize
365KB
MD5b8f7a39fc7ba067ae17ec5fee7b1ab6e
SHA18e2b3649d8ec7fb554b6f482f0e9f5a1544d2122
SHA256bc6e27d19f8ed17bf418f257f5e254087a6eb4f678db120f14ea39e9ff451b5c
SHA512cf4e9183432e1f5493b96fea5e5b6ce1d1060d335322330934a11f1bbdfa052d3039d4578742ba96a285fe5e2b88b56086a834cf076d56c1e21913ccc01c9e88