Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:15
Static task
static1
Behavioral task
behavioral1
Sample
7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe
Resource
win10-20230220-en
General
-
Target
7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe
-
Size
700KB
-
MD5
8a1ac0d300121c13b091a940c98c42ad
-
SHA1
1306e7b0b5f041dfaa524327cbbf78f37f42069d
-
SHA256
7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6
-
SHA512
99ee8e0f06f45f9c1b3d061d918b3b91a4144d4e58bf7f66d6359bb821d216dbf511750aede30aad89d9ca321c8b39cada67a779aa2a801032736165936be6ae
-
SSDEEP
12288:xMroy9092ZQ7hCmnZ9JQRdnh9Dq1cAyPCuG4ZZ+BU5z7Yj7X2zjduyxUPda:pyAJ7YWuR0vWcKz7YHX2zfcA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9239.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4192-179-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/4192-180-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/4192-184-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-182-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-181-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-186-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-188-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-190-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-192-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-194-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-196-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-198-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-200-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-202-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-204-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-208-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-210-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-212-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-214-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4192-1104-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3120 un942580.exe 3088 pro9239.exe 4192 qu0760.exe 1372 si647933.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9239.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un942580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un942580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3088 pro9239.exe 3088 pro9239.exe 4192 qu0760.exe 4192 qu0760.exe 1372 si647933.exe 1372 si647933.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3088 pro9239.exe Token: SeDebugPrivilege 4192 qu0760.exe Token: SeDebugPrivilege 1372 si647933.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3120 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 66 PID 2624 wrote to memory of 3120 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 66 PID 2624 wrote to memory of 3120 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 66 PID 3120 wrote to memory of 3088 3120 un942580.exe 67 PID 3120 wrote to memory of 3088 3120 un942580.exe 67 PID 3120 wrote to memory of 3088 3120 un942580.exe 67 PID 3120 wrote to memory of 4192 3120 un942580.exe 68 PID 3120 wrote to memory of 4192 3120 un942580.exe 68 PID 3120 wrote to memory of 4192 3120 un942580.exe 68 PID 2624 wrote to memory of 1372 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 70 PID 2624 wrote to memory of 1372 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 70 PID 2624 wrote to memory of 1372 2624 7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe"C:\Users\Admin\AppData\Local\Temp\7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55206c0ac124efbd5c0c0548131c81f44
SHA1a22fc19a29f23475191054cd139becc049e9e4dc
SHA2561c0a349354547bd9ed41e222a2160f2a76591ef9125251c493e908793f77a525
SHA51215522490e3ce51aedc96114160de509c7a7c119eb5f93c974c1e2af7b8110273b8034df9184cfc3b836e37b02c9d7f134ea26afd823775bcaf3eb259a6622474
-
Filesize
175KB
MD55206c0ac124efbd5c0c0548131c81f44
SHA1a22fc19a29f23475191054cd139becc049e9e4dc
SHA2561c0a349354547bd9ed41e222a2160f2a76591ef9125251c493e908793f77a525
SHA51215522490e3ce51aedc96114160de509c7a7c119eb5f93c974c1e2af7b8110273b8034df9184cfc3b836e37b02c9d7f134ea26afd823775bcaf3eb259a6622474
-
Filesize
557KB
MD5a6a35f0c06195227713588fdac63f76a
SHA1cd124f0674d9311a8a70ac727bacec6780d541db
SHA2569e76f2fd09d453fec8e4e08473b5f1f3e6101602b84119d40f20c753cc8910cd
SHA512ebd17a5583422e4e12a01c58781906d6c5ac7c1e5f3c175d4b3d37e8e7ec149d5b94b832f68da8299d0660936142cdeb72fccfad028ddd73c9523387c7a71997
-
Filesize
557KB
MD5a6a35f0c06195227713588fdac63f76a
SHA1cd124f0674d9311a8a70ac727bacec6780d541db
SHA2569e76f2fd09d453fec8e4e08473b5f1f3e6101602b84119d40f20c753cc8910cd
SHA512ebd17a5583422e4e12a01c58781906d6c5ac7c1e5f3c175d4b3d37e8e7ec149d5b94b832f68da8299d0660936142cdeb72fccfad028ddd73c9523387c7a71997
-
Filesize
307KB
MD5a20e8e57f7a5513211a18aa70ff27635
SHA134f9ca1b4fa5a35e078787b625cb1e8b5c2c2cfe
SHA256da6ef67383d00ec7e76288ed145ea5fe3c4044906a7eaa2142bf2e314fcd0b0b
SHA5125b78abdbee528313974df560e54fc41503274b393d8207aee7c126c971bb5ae4d300a0bf5b4387fc8c6bc8b4ad60eb02538450324d3298322d396f4a7f4fd427
-
Filesize
307KB
MD5a20e8e57f7a5513211a18aa70ff27635
SHA134f9ca1b4fa5a35e078787b625cb1e8b5c2c2cfe
SHA256da6ef67383d00ec7e76288ed145ea5fe3c4044906a7eaa2142bf2e314fcd0b0b
SHA5125b78abdbee528313974df560e54fc41503274b393d8207aee7c126c971bb5ae4d300a0bf5b4387fc8c6bc8b4ad60eb02538450324d3298322d396f4a7f4fd427
-
Filesize
365KB
MD5f51c5df302f9b8535480bb9cf3db0218
SHA1854b257deff01c0328853f2e1d09821338f2d9e6
SHA25658d821748048c9e19f3a0d5a462a345dcd1eb82277281f36a60d801c8065146c
SHA5122d476dc1ee901f273654640a82786fa931ddb50cc16c47eaa05ee7ca63449c94a2106e75dd9d21b77429febd4882cfbb18cae4f55fc66edfb303a2fc2852d90c
-
Filesize
365KB
MD5f51c5df302f9b8535480bb9cf3db0218
SHA1854b257deff01c0328853f2e1d09821338f2d9e6
SHA25658d821748048c9e19f3a0d5a462a345dcd1eb82277281f36a60d801c8065146c
SHA5122d476dc1ee901f273654640a82786fa931ddb50cc16c47eaa05ee7ca63449c94a2106e75dd9d21b77429febd4882cfbb18cae4f55fc66edfb303a2fc2852d90c