Analysis
-
max time kernel
86s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe
Resource
win10-20230220-en
General
-
Target
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe
-
Size
689KB
-
MD5
26c5c0abbce77ef0afa5f1776e4fda96
-
SHA1
8b3fad5eef0b9c5528350a89c9b539aad3e693a5
-
SHA256
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da
-
SHA512
6cd7bd971e732eeffcefbf62e49efb2badd6296fe5797e7f1fb5921f2f7942fcc6efb1cc57620677ea320374a1df7bb932930a6c316487d81370cc98925ad892
-
SSDEEP
12288:dMr2y90O0aneuTkGrelLb14vD5K5Hr8eyVH+FT7mJbvGFLZfigs/3l4qjT15M:/ydveuiL0kL0VHiPmJbyLZaglqjZq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2863.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3520-178-0x0000000005EF0000-0x0000000005F36000-memory.dmp family_redline behavioral1/memory/3520-179-0x00000000064B0000-0x00000000064F4000-memory.dmp family_redline behavioral1/memory/3520-180-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-181-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-183-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-187-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-191-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-193-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-195-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-197-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-199-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-201-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-203-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-205-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-207-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-209-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-211-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-213-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-215-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline behavioral1/memory/3520-217-0x00000000064B0000-0x00000000064EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2804 un704143.exe 2988 pro2863.exe 3520 qu5294.exe 3524 si154437.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2863.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2863.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un704143.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un704143.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 pro2863.exe 2988 pro2863.exe 3520 qu5294.exe 3520 qu5294.exe 3524 si154437.exe 3524 si154437.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 pro2863.exe Token: SeDebugPrivilege 3520 qu5294.exe Token: SeDebugPrivilege 3524 si154437.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2804 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 66 PID 2476 wrote to memory of 2804 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 66 PID 2476 wrote to memory of 2804 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 66 PID 2804 wrote to memory of 2988 2804 un704143.exe 67 PID 2804 wrote to memory of 2988 2804 un704143.exe 67 PID 2804 wrote to memory of 2988 2804 un704143.exe 67 PID 2804 wrote to memory of 3520 2804 un704143.exe 68 PID 2804 wrote to memory of 3520 2804 un704143.exe 68 PID 2804 wrote to memory of 3520 2804 un704143.exe 68 PID 2476 wrote to memory of 3524 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 70 PID 2476 wrote to memory of 3524 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 70 PID 2476 wrote to memory of 3524 2476 d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe"C:\Users\Admin\AppData\Local\Temp\d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un704143.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un704143.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2863.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5294.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si154437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si154437.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dc47173c9738158a2dae651e8e2f8348
SHA1bc54c501cd3733de0248232c0c768171d5f74dc8
SHA2568809b98265a846a1c38a0e1bafeef67028bd56c8f2ef193d226ca4b865fa5232
SHA51255c96a470ecfea89408316b96a398f4682448d19ecd25c5c441b99e55ffb6e81d10680570b7ae871d63e66de59808524ab3031b85cb0b6c76c8d1c84653918c1
-
Filesize
175KB
MD5dc47173c9738158a2dae651e8e2f8348
SHA1bc54c501cd3733de0248232c0c768171d5f74dc8
SHA2568809b98265a846a1c38a0e1bafeef67028bd56c8f2ef193d226ca4b865fa5232
SHA51255c96a470ecfea89408316b96a398f4682448d19ecd25c5c441b99e55ffb6e81d10680570b7ae871d63e66de59808524ab3031b85cb0b6c76c8d1c84653918c1
-
Filesize
547KB
MD52c0c735d8445cd57c4f01d688c5130fd
SHA10fb5e8b175e1af2dbbae1b97e61cff8ea74aa7b0
SHA25613ae83009afcfe34f62671ad2267de350e33332485522d45c2e3d8f1a4468797
SHA51288f6d901c2e4418b008659a30738299dec744ebbf559d06bdf00010a1617e70fd6bf4472177100fed4afb714918060f09943fe17c8906619b6376e4a5ab5a6fe
-
Filesize
547KB
MD52c0c735d8445cd57c4f01d688c5130fd
SHA10fb5e8b175e1af2dbbae1b97e61cff8ea74aa7b0
SHA25613ae83009afcfe34f62671ad2267de350e33332485522d45c2e3d8f1a4468797
SHA51288f6d901c2e4418b008659a30738299dec744ebbf559d06bdf00010a1617e70fd6bf4472177100fed4afb714918060f09943fe17c8906619b6376e4a5ab5a6fe
-
Filesize
291KB
MD5e2beb5454f9b20587ef42d8d9b4b1311
SHA1d17eacac358020af287b95727720a06f4038459a
SHA25653f76afb639a834ab4cee96a95e6f44ed40f5aa5466c62d3e270e71f8fd0c4f4
SHA51257677d2aec4078c5c10fad689d956a2aaeeda22e714d891ed0f05f3b6379abc1c80da5a70eb075e01e4c4f38c7c364dd23c4bf0ae4d82e734d5d333ccffa92f4
-
Filesize
291KB
MD5e2beb5454f9b20587ef42d8d9b4b1311
SHA1d17eacac358020af287b95727720a06f4038459a
SHA25653f76afb639a834ab4cee96a95e6f44ed40f5aa5466c62d3e270e71f8fd0c4f4
SHA51257677d2aec4078c5c10fad689d956a2aaeeda22e714d891ed0f05f3b6379abc1c80da5a70eb075e01e4c4f38c7c364dd23c4bf0ae4d82e734d5d333ccffa92f4
-
Filesize
345KB
MD563e5d6ddf2e1b5a490c77f6a5a36c557
SHA13c25042f05cf7303cd171c2c9950bd7e16a5d67d
SHA256b88366f68d04794f3b4e3649a8874a4340f664efd431a671e7c6b4a919b8aa88
SHA512beff4b06b946fa8781efbf50d64dfa77a2f7ce4beeb4533ea4ae9679af99e6acf44a271ec90898262228c0901287f803efe2f805110769319559398ed3f51626
-
Filesize
345KB
MD563e5d6ddf2e1b5a490c77f6a5a36c557
SHA13c25042f05cf7303cd171c2c9950bd7e16a5d67d
SHA256b88366f68d04794f3b4e3649a8874a4340f664efd431a671e7c6b4a919b8aa88
SHA512beff4b06b946fa8781efbf50d64dfa77a2f7ce4beeb4533ea4ae9679af99e6acf44a271ec90898262228c0901287f803efe2f805110769319559398ed3f51626