Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:29
Static task
static1
Behavioral task
behavioral1
Sample
e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe
Resource
win10-20230220-en
General
-
Target
e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe
-
Size
700KB
-
MD5
46bb816f2eb057bc22dfdb150f0096a1
-
SHA1
2c217de2fa38be8a972243deb9740f25230fdc37
-
SHA256
e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55
-
SHA512
09ff178de3020403190c966a3615eec900308fc08e58343aca9ce855f6f75190418159cee17183c7b82f30e20780bae61bb389af1389e681db7e9685f27c121f
-
SSDEEP
12288:4Mrsy90DDZHhi4chLit/SQ9D/HcAqSJMOpBfvyEzp:0yADBhi4c5I3qS6GBfdN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2553.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2553.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2553.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2553.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2553.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2553.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1388-180-0x0000000004C70000-0x0000000004CB6000-memory.dmp family_redline behavioral1/memory/1388-181-0x0000000004CF0000-0x0000000004D34000-memory.dmp family_redline behavioral1/memory/1388-182-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-183-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-185-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-187-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-189-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1388-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un630810.exepro2553.exequ0172.exesi556963.exepid process 4684 un630810.exe 4376 pro2553.exe 1388 qu0172.exe 4412 si556963.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2553.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2553.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2553.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exeun630810.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un630810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un630810.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2553.exequ0172.exesi556963.exepid process 4376 pro2553.exe 4376 pro2553.exe 1388 qu0172.exe 1388 qu0172.exe 4412 si556963.exe 4412 si556963.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2553.exequ0172.exesi556963.exedescription pid process Token: SeDebugPrivilege 4376 pro2553.exe Token: SeDebugPrivilege 1388 qu0172.exe Token: SeDebugPrivilege 4412 si556963.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exeun630810.exedescription pid process target process PID 4160 wrote to memory of 4684 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe un630810.exe PID 4160 wrote to memory of 4684 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe un630810.exe PID 4160 wrote to memory of 4684 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe un630810.exe PID 4684 wrote to memory of 4376 4684 un630810.exe pro2553.exe PID 4684 wrote to memory of 4376 4684 un630810.exe pro2553.exe PID 4684 wrote to memory of 4376 4684 un630810.exe pro2553.exe PID 4684 wrote to memory of 1388 4684 un630810.exe qu0172.exe PID 4684 wrote to memory of 1388 4684 un630810.exe qu0172.exe PID 4684 wrote to memory of 1388 4684 un630810.exe qu0172.exe PID 4160 wrote to memory of 4412 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe si556963.exe PID 4160 wrote to memory of 4412 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe si556963.exe PID 4160 wrote to memory of 4412 4160 e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe si556963.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe"C:\Users\Admin\AppData\Local\Temp\e6c7dc07c8b99256f1f4ae9532f8cd046a6d776021fb50ea9e9108c3f206ca55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un630810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un630810.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2553.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0172.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si556963.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si556963.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b4e5d86668934022b1d391c00322a547
SHA107bea310f334169ba6d0647504b3ff5530f064e3
SHA256aeac1ae29d97fbca8aad20560caa8cf45eaf5c04f96f4a040d939cf6ef8c4a1b
SHA5122f8f5643af73832a9c7691af2f97f27d7819998c5ebb7a4fc79865655a692022dd4b412003724833c23b1e11f52ef01c076668e595e6b661d179770a104939af
-
Filesize
175KB
MD5b4e5d86668934022b1d391c00322a547
SHA107bea310f334169ba6d0647504b3ff5530f064e3
SHA256aeac1ae29d97fbca8aad20560caa8cf45eaf5c04f96f4a040d939cf6ef8c4a1b
SHA5122f8f5643af73832a9c7691af2f97f27d7819998c5ebb7a4fc79865655a692022dd4b412003724833c23b1e11f52ef01c076668e595e6b661d179770a104939af
-
Filesize
558KB
MD54b6e3e718889f6c14a1c2bd5da13425f
SHA16c2b83ba136160b8474123ea15e9c652c9948725
SHA2567afca33f40a44431fcbe34d00c3aa71f8c311078ed6ad44af20c4ecf609a3360
SHA5125671bced68f974f01640bed349bd33dffedab9e98b4d79b51d385fc8f55e448d69242f38cca0d6b9eb0bf506cb53283b49bf2c2d64a832110ea713d1b04dada7
-
Filesize
558KB
MD54b6e3e718889f6c14a1c2bd5da13425f
SHA16c2b83ba136160b8474123ea15e9c652c9948725
SHA2567afca33f40a44431fcbe34d00c3aa71f8c311078ed6ad44af20c4ecf609a3360
SHA5125671bced68f974f01640bed349bd33dffedab9e98b4d79b51d385fc8f55e448d69242f38cca0d6b9eb0bf506cb53283b49bf2c2d64a832110ea713d1b04dada7
-
Filesize
307KB
MD5c0ea91bc55c2211b502a409adebc5252
SHA18e3d4198dd9985f088e3b7f2d153b5283e7e592b
SHA256e22e77988ba900e5027828c2193f575967fe656b5530d91b33ee90084d738cf1
SHA512fc12696114cc8fcf33681744a4046b4edc5f70c888e5e8a90bc35302ca00e78cb2fee0c163f7773437fb66e8287d7a628978059fb05374bfbba3285decf54a41
-
Filesize
307KB
MD5c0ea91bc55c2211b502a409adebc5252
SHA18e3d4198dd9985f088e3b7f2d153b5283e7e592b
SHA256e22e77988ba900e5027828c2193f575967fe656b5530d91b33ee90084d738cf1
SHA512fc12696114cc8fcf33681744a4046b4edc5f70c888e5e8a90bc35302ca00e78cb2fee0c163f7773437fb66e8287d7a628978059fb05374bfbba3285decf54a41
-
Filesize
365KB
MD5707a3b3f642ccbb1a8a0f2da5a4ce182
SHA1335c26b7d10bad9dff0875724e3f685257541d4c
SHA256b4ecf0938283a33fad0fc65abb3b70c9217fc033ec64d06eabb3bba7ce9a2fe2
SHA512078987590e166636d0b733b10d98c341a994a5e68704f9953b8dcd8ea32af2de697545753209b35461ad9fbb404210cba3c4f15927bbb7a8540f5d1a153ce9f1
-
Filesize
365KB
MD5707a3b3f642ccbb1a8a0f2da5a4ce182
SHA1335c26b7d10bad9dff0875724e3f685257541d4c
SHA256b4ecf0938283a33fad0fc65abb3b70c9217fc033ec64d06eabb3bba7ce9a2fe2
SHA512078987590e166636d0b733b10d98c341a994a5e68704f9953b8dcd8ea32af2de697545753209b35461ad9fbb404210cba3c4f15927bbb7a8540f5d1a153ce9f1