Analysis
-
max time kernel
53s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:37
Static task
static1
Behavioral task
behavioral1
Sample
80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe
Resource
win10-20230220-en
General
-
Target
80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe
-
Size
700KB
-
MD5
714253bb012b77ceb9ea902080498760
-
SHA1
d0464c5c39b42443de81fb1f78317ce794d76282
-
SHA256
80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e
-
SHA512
5d0b6792aab9ce81bcd2e2dc06da76663f29662be3975efdb75f1154aaa49b36b32799fd882da06d9d98a247e77f16b90dcded93a43866127a2531b529c2bef2
-
SSDEEP
12288:2Mr7y904Q6qeczmnoVXANKCp2+9DMpcAbr2fnFfNf1cuudyO6aasQ2:lyHQ/ecVVXAcCGv2fFf9+um/6aa+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5766.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5766.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-180-0x0000000000C10000-0x0000000000C56000-memory.dmp family_redline behavioral1/memory/3048-181-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline behavioral1/memory/3048-182-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-183-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-185-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-187-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-189-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-191-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-193-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-195-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-197-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-199-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-201-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-211-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-208-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-204-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-213-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-215-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-217-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-219-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/3048-1101-0x00000000009D0000-0x00000000009E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un413570.exepro5766.exequ7079.exesi726589.exepid process 1804 un413570.exe 3856 pro5766.exe 3048 qu7079.exe 4360 si726589.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5766.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5766.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exeun413570.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un413570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un413570.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5766.exequ7079.exesi726589.exepid process 3856 pro5766.exe 3856 pro5766.exe 3048 qu7079.exe 3048 qu7079.exe 4360 si726589.exe 4360 si726589.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5766.exequ7079.exesi726589.exedescription pid process Token: SeDebugPrivilege 3856 pro5766.exe Token: SeDebugPrivilege 3048 qu7079.exe Token: SeDebugPrivilege 4360 si726589.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exeun413570.exedescription pid process target process PID 2208 wrote to memory of 1804 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe un413570.exe PID 2208 wrote to memory of 1804 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe un413570.exe PID 2208 wrote to memory of 1804 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe un413570.exe PID 1804 wrote to memory of 3856 1804 un413570.exe pro5766.exe PID 1804 wrote to memory of 3856 1804 un413570.exe pro5766.exe PID 1804 wrote to memory of 3856 1804 un413570.exe pro5766.exe PID 1804 wrote to memory of 3048 1804 un413570.exe qu7079.exe PID 1804 wrote to memory of 3048 1804 un413570.exe qu7079.exe PID 1804 wrote to memory of 3048 1804 un413570.exe qu7079.exe PID 2208 wrote to memory of 4360 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe si726589.exe PID 2208 wrote to memory of 4360 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe si726589.exe PID 2208 wrote to memory of 4360 2208 80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe si726589.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe"C:\Users\Admin\AppData\Local\Temp\80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD516dda1c2e35573c53ce6ca6153aebc79
SHA13919c66e9e865eaf4e1fdd2aca123b28c82038f4
SHA2569f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8
SHA51279b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37
-
Filesize
175KB
MD516dda1c2e35573c53ce6ca6153aebc79
SHA13919c66e9e865eaf4e1fdd2aca123b28c82038f4
SHA2569f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8
SHA51279b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37
-
Filesize
558KB
MD58a9e068a607086915df7be1c00a2b46b
SHA19f1b188a3608666898a2084d474129ee1d1f318c
SHA2566573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b
SHA5126d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7
-
Filesize
558KB
MD58a9e068a607086915df7be1c00a2b46b
SHA19f1b188a3608666898a2084d474129ee1d1f318c
SHA2566573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b
SHA5126d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7
-
Filesize
307KB
MD5be252a8226b0618886d031a2fccb5a7b
SHA1527d39cf08e24f90cf23f6b638a1311d7f7597fa
SHA256658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5
SHA512c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85
-
Filesize
307KB
MD5be252a8226b0618886d031a2fccb5a7b
SHA1527d39cf08e24f90cf23f6b638a1311d7f7597fa
SHA256658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5
SHA512c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85
-
Filesize
365KB
MD5dbb4a1f51e12bb36ab7c7749810ad023
SHA15d93c9f423e1061c21bb08e4dbbc4f87782e697b
SHA25622d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3
SHA5122ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6
-
Filesize
365KB
MD5dbb4a1f51e12bb36ab7c7749810ad023
SHA15d93c9f423e1061c21bb08e4dbbc4f87782e697b
SHA25622d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3
SHA5122ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6