Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:18
Static task
static1
Behavioral task
behavioral1
Sample
20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe
Resource
win10-20230220-en
General
-
Target
20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe
-
Size
699KB
-
MD5
428b136f6c2f7cac893d1b08e36651a2
-
SHA1
681461648d6ebd29b6ad0fa2c8fb18148b304a23
-
SHA256
20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512
-
SHA512
11a8d1fb8f9d5b58c8354b750be59de30e619d724e727c12104dc00d90da762174c25468edfaf23918bccc0df30678c926e2bfa590b5d83e09fd467cba535929
-
SSDEEP
12288:EMrDy90JW7/U4FK7/irdxgXuh4CjSrGMFqfej7cxor7ic:fykAr+iTMtBrlCeHcxor7P
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2072.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2072.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/376-176-0x0000000002550000-0x0000000002596000-memory.dmp family_redline behavioral1/memory/376-177-0x00000000027E0000-0x0000000002824000-memory.dmp family_redline behavioral1/memory/376-178-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-179-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-182-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-186-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-189-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-191-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-193-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-195-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-197-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-199-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-201-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-203-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-205-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-207-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-209-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-211-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-213-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/376-215-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un901488.exepro2072.exequ7650.exesi658509.exepid process 2264 un901488.exe 2504 pro2072.exe 376 qu7650.exe 3880 si658509.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2072.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2072.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exeun901488.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un901488.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un901488.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2072.exequ7650.exesi658509.exepid process 2504 pro2072.exe 2504 pro2072.exe 376 qu7650.exe 376 qu7650.exe 3880 si658509.exe 3880 si658509.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2072.exequ7650.exesi658509.exedescription pid process Token: SeDebugPrivilege 2504 pro2072.exe Token: SeDebugPrivilege 376 qu7650.exe Token: SeDebugPrivilege 3880 si658509.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exeun901488.exedescription pid process target process PID 2064 wrote to memory of 2264 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe un901488.exe PID 2064 wrote to memory of 2264 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe un901488.exe PID 2064 wrote to memory of 2264 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe un901488.exe PID 2264 wrote to memory of 2504 2264 un901488.exe pro2072.exe PID 2264 wrote to memory of 2504 2264 un901488.exe pro2072.exe PID 2264 wrote to memory of 2504 2264 un901488.exe pro2072.exe PID 2264 wrote to memory of 376 2264 un901488.exe qu7650.exe PID 2264 wrote to memory of 376 2264 un901488.exe qu7650.exe PID 2264 wrote to memory of 376 2264 un901488.exe qu7650.exe PID 2064 wrote to memory of 3880 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe si658509.exe PID 2064 wrote to memory of 3880 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe si658509.exe PID 2064 wrote to memory of 3880 2064 20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe si658509.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe"C:\Users\Admin\AppData\Local\Temp\20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d290a8179e666e9c40fafb2d9e632281
SHA18c5a8c429ca56f90f674d5309455115e2f012ad5
SHA256d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2
SHA51276a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c
-
Filesize
175KB
MD5d290a8179e666e9c40fafb2d9e632281
SHA18c5a8c429ca56f90f674d5309455115e2f012ad5
SHA256d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2
SHA51276a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c
-
Filesize
557KB
MD5255de320d6cad4722e0eabb2f92047b8
SHA18a277f54ba36dd907e81d513f2033090a42edf88
SHA256cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e
SHA512a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581
-
Filesize
557KB
MD5255de320d6cad4722e0eabb2f92047b8
SHA18a277f54ba36dd907e81d513f2033090a42edf88
SHA256cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e
SHA512a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581
-
Filesize
307KB
MD5d7540529573170feb26fe106cc723e12
SHA10ef542a6c05aa4f49034b21b172f787383a610fe
SHA2567803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887
SHA512035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d
-
Filesize
307KB
MD5d7540529573170feb26fe106cc723e12
SHA10ef542a6c05aa4f49034b21b172f787383a610fe
SHA2567803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887
SHA512035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d
-
Filesize
365KB
MD512415a60c751a10ec84b1d3c256eecdb
SHA1120ea9985ca8c9c844254c37e014836263ea8f79
SHA2566788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010
SHA51297d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae
-
Filesize
365KB
MD512415a60c751a10ec84b1d3c256eecdb
SHA1120ea9985ca8c9c844254c37e014836263ea8f79
SHA2566788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010
SHA51297d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae