Analysis
-
max time kernel
52s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:12
Static task
static1
Behavioral task
behavioral1
Sample
4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe
Resource
win10-20230220-en
General
-
Target
4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe
-
Size
700KB
-
MD5
89af4f67653f2867d4f1bcf216f2a0f4
-
SHA1
ea4940b6ad10a85fe6159b8d20917a22c5a89a6b
-
SHA256
4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd
-
SHA512
3ddadc3ea634dbb463e1e79632aea5af1051aac249765a83189aa625a994451e0fca4d57c58be519ea15f9d2dc2fda60530bd88cc74201af6a73a21661c0f13e
-
SSDEEP
12288:nMrJy90rEqaG+FfFmmI09kc+1VpFQHm/5ovNMj5X4rWs5FNj7xvg1IvM4DKZG7:OyEnV+xAnnBZ5XoFNHxY1IvM4DKZs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5528.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4616-178-0x0000000004C20000-0x0000000004C66000-memory.dmp family_redline behavioral1/memory/4616-179-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/4616-183-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-185-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-187-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-189-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-191-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-193-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-195-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-197-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-199-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-203-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-205-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-207-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-209-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-211-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-213-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-215-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/4616-217-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2176 un724873.exe 2300 pro5528.exe 4616 qu9037.exe 8 si460152.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5528.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un724873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un724873.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2300 pro5528.exe 2300 pro5528.exe 4616 qu9037.exe 4616 qu9037.exe 8 si460152.exe 8 si460152.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2300 pro5528.exe Token: SeDebugPrivilege 4616 qu9037.exe Token: SeDebugPrivilege 8 si460152.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2176 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 66 PID 1884 wrote to memory of 2176 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 66 PID 1884 wrote to memory of 2176 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 66 PID 2176 wrote to memory of 2300 2176 un724873.exe 67 PID 2176 wrote to memory of 2300 2176 un724873.exe 67 PID 2176 wrote to memory of 2300 2176 un724873.exe 67 PID 2176 wrote to memory of 4616 2176 un724873.exe 68 PID 2176 wrote to memory of 4616 2176 un724873.exe 68 PID 2176 wrote to memory of 4616 2176 un724873.exe 68 PID 1884 wrote to memory of 8 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 70 PID 1884 wrote to memory of 8 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 70 PID 1884 wrote to memory of 8 1884 4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe"C:\Users\Admin\AppData\Local\Temp\4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5249315c73fdd81a741ba8dd80a428a78
SHA1c3ee37f4cab3908bf5f64481a7a89f272e6f7e9c
SHA25654dedd2264f042040634189ad7b8b63e8d7029306961dd129aa15de03004e935
SHA512ad0115ef359ffdfcbd92a7086d0922df8ae81c11034106a0533698ca1db6dc99bf4e0e5b461b5db675c5f079ef264fdbdebebb84923b5256d86a0c1fe2a4c38f
-
Filesize
175KB
MD5249315c73fdd81a741ba8dd80a428a78
SHA1c3ee37f4cab3908bf5f64481a7a89f272e6f7e9c
SHA25654dedd2264f042040634189ad7b8b63e8d7029306961dd129aa15de03004e935
SHA512ad0115ef359ffdfcbd92a7086d0922df8ae81c11034106a0533698ca1db6dc99bf4e0e5b461b5db675c5f079ef264fdbdebebb84923b5256d86a0c1fe2a4c38f
-
Filesize
558KB
MD5b712c367b060e4e4351ed37ee0e60d88
SHA1bc8d0ceffa0e20bd4c0582ef276e3b9f9f1a55c3
SHA2564dc36e10e7a846c2bf543e969fbba3cc325ce38d0a8babde3be21876c540c544
SHA5122575421994a33b65fe2484d9c0233128e9d7dedbaffba0e8104b35d6e954d259eebcc976588c1ed68f1cbdf8a3913bd300f04e3983d256f690ece51dce9a4462
-
Filesize
558KB
MD5b712c367b060e4e4351ed37ee0e60d88
SHA1bc8d0ceffa0e20bd4c0582ef276e3b9f9f1a55c3
SHA2564dc36e10e7a846c2bf543e969fbba3cc325ce38d0a8babde3be21876c540c544
SHA5122575421994a33b65fe2484d9c0233128e9d7dedbaffba0e8104b35d6e954d259eebcc976588c1ed68f1cbdf8a3913bd300f04e3983d256f690ece51dce9a4462
-
Filesize
307KB
MD55ac88b976a128a596d95279d9e2595d6
SHA11461f4cd830ae52521eddffed63d99ed82e4c454
SHA2565da2f36920ec97f722020620090c8e6d6a3a1bf5fc2aa513075e21843c321ac3
SHA512dfab94c8ef0fe9ed7ecabd68fe2c12ac041af025d1afde8d43b3d7c6dabab4eabc4c2b14684f3f41bc39db65b086a67367c1c69f3f2e691b00860a3c230961b0
-
Filesize
307KB
MD55ac88b976a128a596d95279d9e2595d6
SHA11461f4cd830ae52521eddffed63d99ed82e4c454
SHA2565da2f36920ec97f722020620090c8e6d6a3a1bf5fc2aa513075e21843c321ac3
SHA512dfab94c8ef0fe9ed7ecabd68fe2c12ac041af025d1afde8d43b3d7c6dabab4eabc4c2b14684f3f41bc39db65b086a67367c1c69f3f2e691b00860a3c230961b0
-
Filesize
365KB
MD540024788432e28f02c3b7efa396f5c31
SHA14b3e748f0fe2c07edbad033fe92e5e03eaff0a2a
SHA2569da5f88066a9b100099b0ff7ecb8e3ac0e65014a46a441c1eb4c4d59eaf12e67
SHA5123793782328c6a1c8a3ac88b4acc272c9d1b7675590307f71bb0cb81c09f8da8d9921cb39c2cf6d85588b0d16f281d49318fd5464373cedd5da41a38dbc75eef4
-
Filesize
365KB
MD540024788432e28f02c3b7efa396f5c31
SHA14b3e748f0fe2c07edbad033fe92e5e03eaff0a2a
SHA2569da5f88066a9b100099b0ff7ecb8e3ac0e65014a46a441c1eb4c4d59eaf12e67
SHA5123793782328c6a1c8a3ac88b4acc272c9d1b7675590307f71bb0cb81c09f8da8d9921cb39c2cf6d85588b0d16f281d49318fd5464373cedd5da41a38dbc75eef4