Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe
Resource
win10-20230220-en
General
-
Target
63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe
-
Size
690KB
-
MD5
f97ba0e181e85ea0adeebacbd9eb881b
-
SHA1
0b076a56ea3f490816c9a15083d102705dd959b9
-
SHA256
63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b
-
SHA512
1429ee7a073aa921dc2fdc0c12e539085f57deee8dab000158c550f10d6a8b2c38e5b69b989984debb9521d27cafacd7fd809964029c17173b1e91fd5f68724d
-
SSDEEP
12288:SMrey90BS69S+vJs5LyK65hLuk7MSKE3ZDXtDTpvmFgtfigvwt/tBI+guGn:gySScS+vp5fak7Lt3ZLtDlSgtagvci
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0229.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0229.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/4480-176-0x0000000003870000-0x00000000038B6000-memory.dmp family_redline behavioral1/memory/4480-177-0x0000000006520000-0x0000000006564000-memory.dmp family_redline behavioral1/memory/4480-178-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-179-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-181-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-183-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-185-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-187-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-189-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-191-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-193-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-195-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-197-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-199-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-201-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-203-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-205-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-207-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-209-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-211-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4480-252-0x0000000006010000-0x0000000006020000-memory.dmp family_redline behavioral1/memory/4480-1103-0x0000000006010000-0x0000000006020000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un514474.exepro0229.exequ2837.exesi116083.exepid process 3528 un514474.exe 1600 pro0229.exe 4480 qu2837.exe 4164 si116083.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0229.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0229.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un514474.exe63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un514474.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un514474.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0229.exequ2837.exesi116083.exepid process 1600 pro0229.exe 1600 pro0229.exe 4480 qu2837.exe 4480 qu2837.exe 4164 si116083.exe 4164 si116083.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0229.exequ2837.exesi116083.exedescription pid process Token: SeDebugPrivilege 1600 pro0229.exe Token: SeDebugPrivilege 4480 qu2837.exe Token: SeDebugPrivilege 4164 si116083.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exeun514474.exedescription pid process target process PID 4224 wrote to memory of 3528 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe un514474.exe PID 4224 wrote to memory of 3528 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe un514474.exe PID 4224 wrote to memory of 3528 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe un514474.exe PID 3528 wrote to memory of 1600 3528 un514474.exe pro0229.exe PID 3528 wrote to memory of 1600 3528 un514474.exe pro0229.exe PID 3528 wrote to memory of 1600 3528 un514474.exe pro0229.exe PID 3528 wrote to memory of 4480 3528 un514474.exe qu2837.exe PID 3528 wrote to memory of 4480 3528 un514474.exe qu2837.exe PID 3528 wrote to memory of 4480 3528 un514474.exe qu2837.exe PID 4224 wrote to memory of 4164 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe si116083.exe PID 4224 wrote to memory of 4164 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe si116083.exe PID 4224 wrote to memory of 4164 4224 63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe si116083.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe"C:\Users\Admin\AppData\Local\Temp\63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ba51e7854322ba37ce8e21415b144b65
SHA138682eb771a40e2dff69a2e368a08eebbf16834f
SHA256960170e1b04f174877b364e9a473dd7aaa339be7ae32a19ea8c62472c1ba7079
SHA5120ea0753ca86f9ab9e4413cf9862c97535eb1cee7e2bf1651313379c1224762a0bfb50d172a507b0f36a9a2e316e766ee9dab18151efd70b0d74b10629cc54b1c
-
Filesize
175KB
MD5ba51e7854322ba37ce8e21415b144b65
SHA138682eb771a40e2dff69a2e368a08eebbf16834f
SHA256960170e1b04f174877b364e9a473dd7aaa339be7ae32a19ea8c62472c1ba7079
SHA5120ea0753ca86f9ab9e4413cf9862c97535eb1cee7e2bf1651313379c1224762a0bfb50d172a507b0f36a9a2e316e766ee9dab18151efd70b0d74b10629cc54b1c
-
Filesize
548KB
MD5a4d5bc4d0d0b2a17510373fccb071eb5
SHA1ad0aa7d75e3ef418d0430f1e70b35b7be0c2594e
SHA256845f1145e359e8e08bcd7cc14e1ca599630b5e2b08a6e124da715c753b737ace
SHA51287dadcb782ddf3b45af8af5a1fb29b8e0938d84747f975eddca369c64fc432812d35270b36379ecba4c7a7943b2bfad7330be067511a3f1d3aeb21a19d375a12
-
Filesize
548KB
MD5a4d5bc4d0d0b2a17510373fccb071eb5
SHA1ad0aa7d75e3ef418d0430f1e70b35b7be0c2594e
SHA256845f1145e359e8e08bcd7cc14e1ca599630b5e2b08a6e124da715c753b737ace
SHA51287dadcb782ddf3b45af8af5a1fb29b8e0938d84747f975eddca369c64fc432812d35270b36379ecba4c7a7943b2bfad7330be067511a3f1d3aeb21a19d375a12
-
Filesize
291KB
MD5bada2e9688ef2f1e09e4839ecac6b4d0
SHA11f3c1f5213fd320c8a573c0ccf0a7238d0d61465
SHA256b894b9a0e0a8090f643b841be8b0bc1cc389cd0e262e23a66495db4cc26d9bc2
SHA5126c4f023a0b13244137fb06d58cf9540e4605cf20b85924224f7031b45f67d1bd4e275f21c909072901a1421f7b0eeff3197e95a762402e218d03a0b9649c63af
-
Filesize
291KB
MD5bada2e9688ef2f1e09e4839ecac6b4d0
SHA11f3c1f5213fd320c8a573c0ccf0a7238d0d61465
SHA256b894b9a0e0a8090f643b841be8b0bc1cc389cd0e262e23a66495db4cc26d9bc2
SHA5126c4f023a0b13244137fb06d58cf9540e4605cf20b85924224f7031b45f67d1bd4e275f21c909072901a1421f7b0eeff3197e95a762402e218d03a0b9649c63af
-
Filesize
345KB
MD5aed8c92b2745a652e4455986744b866d
SHA13940c8120b050c645e1a0f67f3e2d3da8d3dc470
SHA256dfbf4ef2ffe104547a546aa6bb0d5bcb32cbdb0864b7f4b1dd41cf311cc565e0
SHA512053468c58edc36dcb196d0dc2c80bd5e0b6e84c4e2f5903d0fe67b68a1de82f35c29c79c9e1ba51c01fc24489730e2bcd9702474a66d0e15add311e4f904987b
-
Filesize
345KB
MD5aed8c92b2745a652e4455986744b866d
SHA13940c8120b050c645e1a0f67f3e2d3da8d3dc470
SHA256dfbf4ef2ffe104547a546aa6bb0d5bcb32cbdb0864b7f4b1dd41cf311cc565e0
SHA512053468c58edc36dcb196d0dc2c80bd5e0b6e84c4e2f5903d0fe67b68a1de82f35c29c79c9e1ba51c01fc24489730e2bcd9702474a66d0e15add311e4f904987b