Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:31
Static task
static1
Behavioral task
behavioral1
Sample
3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe
Resource
win10-20230220-en
General
-
Target
3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe
-
Size
700KB
-
MD5
390353878989c08b4e68406572f0914f
-
SHA1
81bb75c476a38bc191ed62b86b015d8bec10142e
-
SHA256
3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209
-
SHA512
5d51c5f8830e0a497f1a77d862af183fa9b0fec4c2c5609e176f5c739152c4d6cb414f692aad7e34093d6122fdc12ac64b8d258fd147f13ace39e9126ebc0796
-
SSDEEP
12288:KMrNy909uoPmynsWYKHjfajnDcvYRW3XpjJappxyGWt7lik8xgK:/ywPlnVYKzajnAYRIX9J2WbikTK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9315.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4920-180-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/4920-181-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/4920-183-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-182-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-185-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-187-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-189-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-193-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-195-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-197-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-199-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-201-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-209-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-211-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-213-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-215-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-217-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4920-219-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4556 un370785.exe 4720 pro9315.exe 4920 qu1034.exe 3652 si956069.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9315.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un370785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un370785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4720 pro9315.exe 4720 pro9315.exe 4920 qu1034.exe 4920 qu1034.exe 3652 si956069.exe 3652 si956069.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4720 pro9315.exe Token: SeDebugPrivilege 4920 qu1034.exe Token: SeDebugPrivilege 3652 si956069.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4556 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 66 PID 4188 wrote to memory of 4556 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 66 PID 4188 wrote to memory of 4556 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 66 PID 4556 wrote to memory of 4720 4556 un370785.exe 67 PID 4556 wrote to memory of 4720 4556 un370785.exe 67 PID 4556 wrote to memory of 4720 4556 un370785.exe 67 PID 4556 wrote to memory of 4920 4556 un370785.exe 68 PID 4556 wrote to memory of 4920 4556 un370785.exe 68 PID 4556 wrote to memory of 4920 4556 un370785.exe 68 PID 4188 wrote to memory of 3652 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 70 PID 4188 wrote to memory of 3652 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 70 PID 4188 wrote to memory of 3652 4188 3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe"C:\Users\Admin\AppData\Local\Temp\3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
175KB
MD5ee65757289bd7d2d1000ed01503a2fec
SHA1bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279
SHA256e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb
SHA512ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
558KB
MD5efb83e5ddb6d897eeacdba07bb102103
SHA1a8502b9a4b890c99e0110afd4cb75d43bad474e5
SHA256ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327
SHA512e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
307KB
MD5464a0acd4058920dcc9e052838fa0ccd
SHA1ca1418fd02965b6e50dfdd4d61b734a3e92afe25
SHA256659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce
SHA51231fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770
-
Filesize
365KB
MD5c6b751e8142ca2963e629efb2ca736ae
SHA14ca988ddfd8f28c9d154f6361f45cb41e52d9a67
SHA2564f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10
SHA5127047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770