Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:17
Static task
static1
Behavioral task
behavioral1
Sample
49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe
Resource
win10-20230220-en
General
-
Target
49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe
-
Size
700KB
-
MD5
176a8b9c937dc87859b0749306b16a4b
-
SHA1
523e022d0cdccac24b2d844bf74d2a489bb72956
-
SHA256
49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c
-
SHA512
5e6c16a07b4edde7127d4ce47e9441cd4ad8922dea287cccdf5fa945863f62dd0843afc956b6a441bf4a845d05569dadcbe75dfaefd54674fe7d47b746d3d0f3
-
SSDEEP
12288:KMrZy907GeBtKKHqyVqbCqpx9DM5cAtg0bzNTqCbrTQ/Zju60JOZLoMt:zywGIVH2/p0tgcqMyC+8Mt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9909.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9909.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-181-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/1348-183-0x0000000004CD0000-0x0000000004D14000-memory.dmp family_redline behavioral1/memory/1348-187-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-188-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-190-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-192-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-194-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-196-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-198-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-200-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-202-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-204-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-206-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-208-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-210-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-212-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-214-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-216-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-218-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/1348-220-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un437362.exepro9909.exequ0179.exesi261679.exepid process 2564 un437362.exe 428 pro9909.exe 1348 qu0179.exe 3636 si261679.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9909.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9909.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exeun437362.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un437362.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un437362.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9909.exequ0179.exesi261679.exepid process 428 pro9909.exe 428 pro9909.exe 1348 qu0179.exe 1348 qu0179.exe 3636 si261679.exe 3636 si261679.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9909.exequ0179.exesi261679.exedescription pid process Token: SeDebugPrivilege 428 pro9909.exe Token: SeDebugPrivilege 1348 qu0179.exe Token: SeDebugPrivilege 3636 si261679.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exeun437362.exedescription pid process target process PID 2476 wrote to memory of 2564 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe un437362.exe PID 2476 wrote to memory of 2564 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe un437362.exe PID 2476 wrote to memory of 2564 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe un437362.exe PID 2564 wrote to memory of 428 2564 un437362.exe pro9909.exe PID 2564 wrote to memory of 428 2564 un437362.exe pro9909.exe PID 2564 wrote to memory of 428 2564 un437362.exe pro9909.exe PID 2564 wrote to memory of 1348 2564 un437362.exe qu0179.exe PID 2564 wrote to memory of 1348 2564 un437362.exe qu0179.exe PID 2564 wrote to memory of 1348 2564 un437362.exe qu0179.exe PID 2476 wrote to memory of 3636 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe si261679.exe PID 2476 wrote to memory of 3636 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe si261679.exe PID 2476 wrote to memory of 3636 2476 49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe si261679.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe"C:\Users\Admin\AppData\Local\Temp\49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD542820be0de084384adf5709d2dc494ce
SHA1f86eb8999601d292aea5025787da8c6fe8f6af99
SHA2566891529239094a98fb1aeedf94a65deb68506e8965b683396e9610551569fd7c
SHA5121397db9c78e00592733f11751506e2a993efc3ed74b5ada5eb40a05f82b61d942aae49f268a4d627c26622634c08b67445cedc2a80e66fe2782c51db9576e3a5
-
Filesize
175KB
MD542820be0de084384adf5709d2dc494ce
SHA1f86eb8999601d292aea5025787da8c6fe8f6af99
SHA2566891529239094a98fb1aeedf94a65deb68506e8965b683396e9610551569fd7c
SHA5121397db9c78e00592733f11751506e2a993efc3ed74b5ada5eb40a05f82b61d942aae49f268a4d627c26622634c08b67445cedc2a80e66fe2782c51db9576e3a5
-
Filesize
558KB
MD57c2cf47304848694516ec1ec7cba7f53
SHA1b31acd3ea965cd84cb7154682356083cf66ffb68
SHA256c1d21c6e1baedf7354ba4e30e63c119fa5b4a146fe4c105ffa007ff7ac88660e
SHA512255934ec4a99603cbc8dda4e99e463eb53867028cbdac9ff9760a1a77c450b4cf73d683a0d335e14e05a02e2abf15d11688c8edbf1bf1f5d24b4e25827abc13d
-
Filesize
558KB
MD57c2cf47304848694516ec1ec7cba7f53
SHA1b31acd3ea965cd84cb7154682356083cf66ffb68
SHA256c1d21c6e1baedf7354ba4e30e63c119fa5b4a146fe4c105ffa007ff7ac88660e
SHA512255934ec4a99603cbc8dda4e99e463eb53867028cbdac9ff9760a1a77c450b4cf73d683a0d335e14e05a02e2abf15d11688c8edbf1bf1f5d24b4e25827abc13d
-
Filesize
307KB
MD57eca84a695e24c18070e99773e586b65
SHA1b182100087e8a3bca9b8c6fa8cce819c46f7963c
SHA256f3937350877020391506a35ce751a11ea9d4baee93c99ed37363e6cb365e6055
SHA5121c049070d4162f40f8cd2a13ae34c93c53d293bc7629f5f8c4b79c06b7abe64a6a0ac0564bee07746478361508cc76b6dbe934fec57dbbd19fcdcf3634d2e086
-
Filesize
307KB
MD57eca84a695e24c18070e99773e586b65
SHA1b182100087e8a3bca9b8c6fa8cce819c46f7963c
SHA256f3937350877020391506a35ce751a11ea9d4baee93c99ed37363e6cb365e6055
SHA5121c049070d4162f40f8cd2a13ae34c93c53d293bc7629f5f8c4b79c06b7abe64a6a0ac0564bee07746478361508cc76b6dbe934fec57dbbd19fcdcf3634d2e086
-
Filesize
365KB
MD5266c3741bb42fbeeaad2e991dc30d853
SHA10329c392928166daa7114504e5e1a99a82d17115
SHA2568e8d59236303eb249eac8feb24e24de6d490369bfbfbcbc7781ac6b250c761fd
SHA5121e730032f31791719e2ea80daf1f73132172e66a785aa719e89feed7ca4ed4275bf16a1269bcc82624ced277902ebc0097397a35a3db99273bdc26f0bda0e007
-
Filesize
365KB
MD5266c3741bb42fbeeaad2e991dc30d853
SHA10329c392928166daa7114504e5e1a99a82d17115
SHA2568e8d59236303eb249eac8feb24e24de6d490369bfbfbcbc7781ac6b250c761fd
SHA5121e730032f31791719e2ea80daf1f73132172e66a785aa719e89feed7ca4ed4275bf16a1269bcc82624ced277902ebc0097397a35a3db99273bdc26f0bda0e007