Analysis
-
max time kernel
48s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe
Resource
win10-20230220-en
General
-
Target
24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe
-
Size
690KB
-
MD5
ea16de1b886de878deba1e7d05096283
-
SHA1
6eeeeb3b5b0e4d6febb9f3fbbbec13b812f7959d
-
SHA256
24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058
-
SHA512
ff433d89b8c751adf34caa2e704363a03759ef26e66d11efd558956f9757b779906814ec73ae9a7699e05e9d4ba450d304c30b2032f784733e52568a59d5b918
-
SSDEEP
12288:oMrcy905+4tQZgOur6PyX165M4+D22l5JhazvPFoCfigyzaWBrsl:UymcZkWd+D2E4zFoCagyzS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6635.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4260-182-0x00000000037C0000-0x0000000003806000-memory.dmp family_redline behavioral1/memory/4260-183-0x00000000064F0000-0x0000000006534000-memory.dmp family_redline behavioral1/memory/4260-184-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-185-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-187-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-189-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-191-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-193-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-195-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-197-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-199-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-201-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-203-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-205-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-207-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-209-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-213-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-217-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-219-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline behavioral1/memory/4260-221-0x00000000064F0000-0x000000000652F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2776 un010150.exe 3292 pro6635.exe 4260 qu4563.exe 4144 si500600.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6635.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un010150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un010150.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3292 pro6635.exe 3292 pro6635.exe 4260 qu4563.exe 4260 qu4563.exe 4144 si500600.exe 4144 si500600.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3292 pro6635.exe Token: SeDebugPrivilege 4260 qu4563.exe Token: SeDebugPrivilege 4144 si500600.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2776 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 66 PID 4032 wrote to memory of 2776 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 66 PID 4032 wrote to memory of 2776 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 66 PID 2776 wrote to memory of 3292 2776 un010150.exe 67 PID 2776 wrote to memory of 3292 2776 un010150.exe 67 PID 2776 wrote to memory of 3292 2776 un010150.exe 67 PID 2776 wrote to memory of 4260 2776 un010150.exe 68 PID 2776 wrote to memory of 4260 2776 un010150.exe 68 PID 2776 wrote to memory of 4260 2776 un010150.exe 68 PID 4032 wrote to memory of 4144 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 70 PID 4032 wrote to memory of 4144 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 70 PID 4032 wrote to memory of 4144 4032 24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe"C:\Users\Admin\AppData\Local\Temp\24b99488707fc1ebf1dd5cada5921609286f74fbb27a934f77fcd173232d2058.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4563.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si500600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si500600.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57bcd9c1a1320fb3abb50defc0f60b51a
SHA1e4a8c46282beef0286299fbf1776084413373151
SHA2562993058611afe64dcf2a669eda16a3d17a3bd720ceee1e057ca2552c88b5feb3
SHA512fd8cb49bdfa6b9b806bc5bc35dfab27a2078c0c0b5578aa49693ac8e92045e56c1f5158a4735e8611f51d174d1e6e44323fde05852ed8ae0d100e0c7dbecd75d
-
Filesize
175KB
MD57bcd9c1a1320fb3abb50defc0f60b51a
SHA1e4a8c46282beef0286299fbf1776084413373151
SHA2562993058611afe64dcf2a669eda16a3d17a3bd720ceee1e057ca2552c88b5feb3
SHA512fd8cb49bdfa6b9b806bc5bc35dfab27a2078c0c0b5578aa49693ac8e92045e56c1f5158a4735e8611f51d174d1e6e44323fde05852ed8ae0d100e0c7dbecd75d
-
Filesize
548KB
MD50e93655f0a3811f5b43f99c87b21d951
SHA1da3917fd9cbaee416443b3b51463134e13d47ff9
SHA25664679d3ec0b9cbb6db4aa6189c35e2ea3693dba0b79116c9ae2e39f875dcae53
SHA512b486553849fc1f4768953edae2aba4cd1ab1686388ea9a5d2191f28d0886c6bd6327985aa49ef5b6264351b7f2c2f3a52cd94572d6b6f28d1561a0be5e60c6fc
-
Filesize
548KB
MD50e93655f0a3811f5b43f99c87b21d951
SHA1da3917fd9cbaee416443b3b51463134e13d47ff9
SHA25664679d3ec0b9cbb6db4aa6189c35e2ea3693dba0b79116c9ae2e39f875dcae53
SHA512b486553849fc1f4768953edae2aba4cd1ab1686388ea9a5d2191f28d0886c6bd6327985aa49ef5b6264351b7f2c2f3a52cd94572d6b6f28d1561a0be5e60c6fc
-
Filesize
291KB
MD5ed6c915eadf0ebbc6a94b375e61c336e
SHA15a79e9af2532c7dc1e9e4a00240dc4e8b10f3107
SHA256eb8105f183f33ad320bfaeeb46dbc926c9e392a954e091aef2cb5c24b68eea0b
SHA512207e05c91a84d2d0870b88348d753127f1002833313c2403578e74edc66016bbe17df7d953d7b9c99818e54dee32f05de74b27dabb6ff7fdb246962cfc8a2b4f
-
Filesize
291KB
MD5ed6c915eadf0ebbc6a94b375e61c336e
SHA15a79e9af2532c7dc1e9e4a00240dc4e8b10f3107
SHA256eb8105f183f33ad320bfaeeb46dbc926c9e392a954e091aef2cb5c24b68eea0b
SHA512207e05c91a84d2d0870b88348d753127f1002833313c2403578e74edc66016bbe17df7d953d7b9c99818e54dee32f05de74b27dabb6ff7fdb246962cfc8a2b4f
-
Filesize
345KB
MD593bb6be447c008929efd1b84bf4de4bf
SHA1c35067cf0c6a3ee85c5ae12cae03cd4980ee56b3
SHA256b352e3504d3ba46caf027556be274342bed7264181fdca8a452153162e643bf5
SHA51278782a466e603d36f4a76c95ba29902a7f176ed0c5acbc19a45117c6c9127162a26f4d993388ad160ffbc5d318a9282e96952b3900b4a8eecd49a296bc2ec657
-
Filesize
345KB
MD593bb6be447c008929efd1b84bf4de4bf
SHA1c35067cf0c6a3ee85c5ae12cae03cd4980ee56b3
SHA256b352e3504d3ba46caf027556be274342bed7264181fdca8a452153162e643bf5
SHA51278782a466e603d36f4a76c95ba29902a7f176ed0c5acbc19a45117c6c9127162a26f4d993388ad160ffbc5d318a9282e96952b3900b4a8eecd49a296bc2ec657