Analysis
-
max time kernel
86s -
max time network
88s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:46
Static task
static1
Behavioral task
behavioral1
Sample
a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe
Resource
win10-20230220-en
General
-
Target
a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe
-
Size
689KB
-
MD5
19d777330aae9f2f70e83668e130f460
-
SHA1
3519b6d1dea28a3543c42f09a06080c0469d1810
-
SHA256
a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730
-
SHA512
887c97dc33f5d1efa4a19396d8428dbd743f72e19415f10624cc59d9edc8068e1a4cfb1485f0c74c158ca8048e20d3837f721ed3294a4263f0768d16604b6e72
-
SSDEEP
12288:cMr/y90ehwqG8pPIx8rRdxoaB5mgHrlmJfvxF6WfigjG6Plekyv:zyVhwqGS4aB5pmJfT6Wag66Pyv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7247.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/2120-179-0x0000000005F40000-0x0000000005F86000-memory.dmp family_redline behavioral1/memory/2120-180-0x0000000006500000-0x0000000006544000-memory.dmp family_redline behavioral1/memory/2120-181-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-182-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-184-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-186-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-188-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-190-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-192-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-194-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-196-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-198-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-200-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-202-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-204-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-206-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-208-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-210-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-212-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-214-0x0000000006500000-0x000000000653F000-memory.dmp family_redline behavioral1/memory/2120-245-0x0000000005FF0000-0x0000000006000000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2092 un433326.exe 4256 pro7247.exe 2120 qu1924.exe 4624 si141615.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7247.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un433326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un433326.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4256 pro7247.exe 4256 pro7247.exe 2120 qu1924.exe 2120 qu1924.exe 4624 si141615.exe 4624 si141615.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4256 pro7247.exe Token: SeDebugPrivilege 2120 qu1924.exe Token: SeDebugPrivilege 4624 si141615.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2092 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 66 PID 3956 wrote to memory of 2092 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 66 PID 3956 wrote to memory of 2092 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 66 PID 2092 wrote to memory of 4256 2092 un433326.exe 67 PID 2092 wrote to memory of 4256 2092 un433326.exe 67 PID 2092 wrote to memory of 4256 2092 un433326.exe 67 PID 2092 wrote to memory of 2120 2092 un433326.exe 68 PID 2092 wrote to memory of 2120 2092 un433326.exe 68 PID 2092 wrote to memory of 2120 2092 un433326.exe 68 PID 3956 wrote to memory of 4624 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 70 PID 3956 wrote to memory of 4624 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 70 PID 3956 wrote to memory of 4624 3956 a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe"C:\Users\Admin\AppData\Local\Temp\a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ffe05c4b7e826ae26b8ce85199c5d803
SHA1acd80d441144784e7fb7dd8aa349245e8d9b272c
SHA2564907b54ecba644a1f8a525aecc7faa27ecff33f355590ba9896fb369fd4d3481
SHA512cb0218335ec0cb5e110844e84f16a7bcbf648a887ca519f86ae91acccce18524e662c584afcebf8aff518d9a776309f1148bad00f8c63994db429c9beb8dc756
-
Filesize
175KB
MD5ffe05c4b7e826ae26b8ce85199c5d803
SHA1acd80d441144784e7fb7dd8aa349245e8d9b272c
SHA2564907b54ecba644a1f8a525aecc7faa27ecff33f355590ba9896fb369fd4d3481
SHA512cb0218335ec0cb5e110844e84f16a7bcbf648a887ca519f86ae91acccce18524e662c584afcebf8aff518d9a776309f1148bad00f8c63994db429c9beb8dc756
-
Filesize
547KB
MD5bd0d420f4d2ce4ad759468c68721db2d
SHA101d205c2f0af38e20ebe0abe169e3e735bf9bcbf
SHA25695fa01c33a231099ea5eb8f42017ddaccb7b703aaba961a191b18a1ee5a1d37a
SHA5121470d7ba6573c248ee8e9cc7428ebcb7c360a385a5416732fb6cf33df23b111ce0a7680bbc759acd77015afaf0d977dfdca77bc07d32c8c1e38dda08a8a89309
-
Filesize
547KB
MD5bd0d420f4d2ce4ad759468c68721db2d
SHA101d205c2f0af38e20ebe0abe169e3e735bf9bcbf
SHA25695fa01c33a231099ea5eb8f42017ddaccb7b703aaba961a191b18a1ee5a1d37a
SHA5121470d7ba6573c248ee8e9cc7428ebcb7c360a385a5416732fb6cf33df23b111ce0a7680bbc759acd77015afaf0d977dfdca77bc07d32c8c1e38dda08a8a89309
-
Filesize
291KB
MD538e6752b8a5de5acd210fdd5d7e5cb09
SHA12f50b1ae525d863377069ae4ed8b2cfaa6130266
SHA2566588953e822e35ab1897666bc50a499f3c0a2959c3ff43b4b1ced0d0a0679088
SHA5122d0587227716078b6c0dc0e260ddd1deee7856b84f96f719c14b712532414cd6f38f38627709a2be6b8056bed7e1d3658a8a52c2cd35be856c84cd39596131db
-
Filesize
291KB
MD538e6752b8a5de5acd210fdd5d7e5cb09
SHA12f50b1ae525d863377069ae4ed8b2cfaa6130266
SHA2566588953e822e35ab1897666bc50a499f3c0a2959c3ff43b4b1ced0d0a0679088
SHA5122d0587227716078b6c0dc0e260ddd1deee7856b84f96f719c14b712532414cd6f38f38627709a2be6b8056bed7e1d3658a8a52c2cd35be856c84cd39596131db
-
Filesize
345KB
MD5f51f955485a075e3e4eea931ec9caab3
SHA1b263b55d1b32046c6a470e6994fe86dd8be7afa0
SHA2567694b2ff939fd77fb7c941b0c50789f56d529968e7f278ab9e91737db20667d5
SHA5124cd5ac7038f9ca9c2aaa20fc1cf663f98acada6729513f50a1f01fca1b204388b200918f86bc58050d674b0514a9f65dfbfa43df994c5074093aaa03ce563170
-
Filesize
345KB
MD5f51f955485a075e3e4eea931ec9caab3
SHA1b263b55d1b32046c6a470e6994fe86dd8be7afa0
SHA2567694b2ff939fd77fb7c941b0c50789f56d529968e7f278ab9e91737db20667d5
SHA5124cd5ac7038f9ca9c2aaa20fc1cf663f98acada6729513f50a1f01fca1b204388b200918f86bc58050d674b0514a9f65dfbfa43df994c5074093aaa03ce563170