Analysis
-
max time kernel
71s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:38
Static task
static1
Behavioral task
behavioral1
Sample
36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe
Resource
win10-20230220-en
General
-
Target
36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe
-
Size
690KB
-
MD5
c1973b134fb734938c2f8ee91e77fe99
-
SHA1
9670116a8fff6561ff3bcafd51c7d94d88f861f1
-
SHA256
36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32
-
SHA512
b8acdda289c43494cd81daeb062a51deb588c270dc10230671180f2d51946fa4d670abd3ecdef7a2e57ec297477ba3f764e72a4881d2f4b1a1286fd2b2f0f1b2
-
SSDEEP
12288:qMrsy90O0GJ+vUp/IzshiC2dAXM7TPHhIzppz9u58VlLM/qcbKG7sdU:yyP0Y+S/vcJJPH6Xpu5Irc3Im
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1755.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1755.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4380-179-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/4380-180-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4380-182-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-181-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-184-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-186-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-188-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-190-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-192-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-194-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-196-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-198-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-200-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-202-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-204-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-206-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-210-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-208-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-212-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-214-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/4380-1100-0x00000000025C0000-0x00000000025D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un789291.exepro1755.exequ5482.exesi781965.exepid process 4172 un789291.exe 4196 pro1755.exe 4380 qu5482.exe 4924 si781965.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1755.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1755.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exeun789291.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un789291.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un789291.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1755.exequ5482.exesi781965.exepid process 4196 pro1755.exe 4196 pro1755.exe 4380 qu5482.exe 4380 qu5482.exe 4924 si781965.exe 4924 si781965.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1755.exequ5482.exesi781965.exedescription pid process Token: SeDebugPrivilege 4196 pro1755.exe Token: SeDebugPrivilege 4380 qu5482.exe Token: SeDebugPrivilege 4924 si781965.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exeun789291.exedescription pid process target process PID 4344 wrote to memory of 4172 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe un789291.exe PID 4344 wrote to memory of 4172 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe un789291.exe PID 4344 wrote to memory of 4172 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe un789291.exe PID 4172 wrote to memory of 4196 4172 un789291.exe pro1755.exe PID 4172 wrote to memory of 4196 4172 un789291.exe pro1755.exe PID 4172 wrote to memory of 4196 4172 un789291.exe pro1755.exe PID 4172 wrote to memory of 4380 4172 un789291.exe qu5482.exe PID 4172 wrote to memory of 4380 4172 un789291.exe qu5482.exe PID 4172 wrote to memory of 4380 4172 un789291.exe qu5482.exe PID 4344 wrote to memory of 4924 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe si781965.exe PID 4344 wrote to memory of 4924 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe si781965.exe PID 4344 wrote to memory of 4924 4344 36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe si781965.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe"C:\Users\Admin\AppData\Local\Temp\36d1a9a5c88ea882e5fbeba14dc2419a02381fdc90f2f37a2374cfb93b2e4e32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un789291.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un789291.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1755.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5482.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781965.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52653d5024a468ad15274469f743f674b
SHA1f1e5f1db661dc9c0846f2683d616ede9da6c8542
SHA2565b90dc393e62ddb931d5bbd88f90437b23021fd3d3396357ebea6951bac636b4
SHA512545ccf8661013d8f6cc3e2ff8584eccf6dcc447e72fce119b952c2eadcd923399f32fcbedf96c928320b355cb20f9348c3f1318365c42d4398c907aac8b028d5
-
Filesize
175KB
MD52653d5024a468ad15274469f743f674b
SHA1f1e5f1db661dc9c0846f2683d616ede9da6c8542
SHA2565b90dc393e62ddb931d5bbd88f90437b23021fd3d3396357ebea6951bac636b4
SHA512545ccf8661013d8f6cc3e2ff8584eccf6dcc447e72fce119b952c2eadcd923399f32fcbedf96c928320b355cb20f9348c3f1318365c42d4398c907aac8b028d5
-
Filesize
548KB
MD5a97f2e3d979c908a6f26e289def5d297
SHA1668701e51fbd15bd073062985110b876493b1ef5
SHA256c8d615595a73139e5d91563e0d4e371af6d1ad66f33ae4abb5795b9a7557baa0
SHA5120803ada80bae2975622882ecef77387083d38a53e61e8f8d0c35b97f27da2138dece5018549039543e7689104fe5516dcbbf496320ab1a7afde6965e852723cb
-
Filesize
548KB
MD5a97f2e3d979c908a6f26e289def5d297
SHA1668701e51fbd15bd073062985110b876493b1ef5
SHA256c8d615595a73139e5d91563e0d4e371af6d1ad66f33ae4abb5795b9a7557baa0
SHA5120803ada80bae2975622882ecef77387083d38a53e61e8f8d0c35b97f27da2138dece5018549039543e7689104fe5516dcbbf496320ab1a7afde6965e852723cb
-
Filesize
291KB
MD518fbbb6d74305804305a738ba212f0f3
SHA18a9aefa2674783139708e98154cf86ce6ce79e40
SHA2563afed9803139c9518a13b220addd0f5c702002de9618c22a856aa6960394597b
SHA512442db53e945a83cab5ac9e58dec9fbf1f8fc41131fb984524f81dc6ead2f9af40d6c2ca42c0afc72c0a9bf9521ea660f3b737ff70660529f9ead1c199d40ede3
-
Filesize
291KB
MD518fbbb6d74305804305a738ba212f0f3
SHA18a9aefa2674783139708e98154cf86ce6ce79e40
SHA2563afed9803139c9518a13b220addd0f5c702002de9618c22a856aa6960394597b
SHA512442db53e945a83cab5ac9e58dec9fbf1f8fc41131fb984524f81dc6ead2f9af40d6c2ca42c0afc72c0a9bf9521ea660f3b737ff70660529f9ead1c199d40ede3
-
Filesize
350KB
MD58b7d5a965e9bcbfe0b016d3711b18ef2
SHA1b6568b07437c811b111771c5056a49ccff1d94d3
SHA256865237949c80aa1f77b3b455f97054e7ecc4e4a4f668c29331e2f1ca2bb67db0
SHA512a61e0e83ff2f3bab78a3fa153a977b0b5c093f4a52666ef61b7ab5bdb0cd19dd84c7a4c7a8c1c93abb33cab78ccb91b2e12a9cdfdc48f723df0317bfd40d6099
-
Filesize
350KB
MD58b7d5a965e9bcbfe0b016d3711b18ef2
SHA1b6568b07437c811b111771c5056a49ccff1d94d3
SHA256865237949c80aa1f77b3b455f97054e7ecc4e4a4f668c29331e2f1ca2bb67db0
SHA512a61e0e83ff2f3bab78a3fa153a977b0b5c093f4a52666ef61b7ab5bdb0cd19dd84c7a4c7a8c1c93abb33cab78ccb91b2e12a9cdfdc48f723df0317bfd40d6099