Analysis
-
max time kernel
51s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe
Resource
win10-20230220-en
General
-
Target
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe
-
Size
689KB
-
MD5
c0aceddf89d3ba0abf338d56897a270b
-
SHA1
275feac0c253c8e0f2aa094c032986ae5c12c6e4
-
SHA256
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c
-
SHA512
3430884e185cfbed7131fbf8a2ec69f7fdca55cc05c667887e6fb4889e507b3cf69f273cf987097df1676de8a9ae444bfa8d9e37b6b57e05ede4e3fdeb98b7af
-
SSDEEP
12288:AMroy90VrD5AlUzU4xaAFWZy065hLuCqMSKx31LamdtoiOcgYivmFq/figuTnljO:YyKhwExyQ7faCqLw31PtoiOaiCq/agcS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1949.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3676-181-0x00000000037A0000-0x00000000037E6000-memory.dmp family_redline behavioral1/memory/3676-182-0x00000000064E0000-0x0000000006524000-memory.dmp family_redline behavioral1/memory/3676-183-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-186-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-188-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-184-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-190-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-192-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-196-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-194-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-198-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-200-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-202-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-204-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-206-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-208-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-210-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-212-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-214-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/3676-216-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2512 un360642.exe 2592 pro1949.exe 3676 qu1642.exe 4956 si504613.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1949.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un360642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un360642.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 pro1949.exe 2592 pro1949.exe 3676 qu1642.exe 3676 qu1642.exe 4956 si504613.exe 4956 si504613.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2592 pro1949.exe Token: SeDebugPrivilege 3676 qu1642.exe Token: SeDebugPrivilege 4956 si504613.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2512 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 66 PID 2264 wrote to memory of 2512 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 66 PID 2264 wrote to memory of 2512 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 66 PID 2512 wrote to memory of 2592 2512 un360642.exe 67 PID 2512 wrote to memory of 2592 2512 un360642.exe 67 PID 2512 wrote to memory of 2592 2512 un360642.exe 67 PID 2512 wrote to memory of 3676 2512 un360642.exe 68 PID 2512 wrote to memory of 3676 2512 un360642.exe 68 PID 2512 wrote to memory of 3676 2512 un360642.exe 68 PID 2264 wrote to memory of 4956 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 70 PID 2264 wrote to memory of 4956 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 70 PID 2264 wrote to memory of 4956 2264 d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe"C:\Users\Admin\AppData\Local\Temp\d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ab75d87ece7f849f9b0ec83aa964a7e8
SHA15f4421f9f4978823c6f54c364d938ba97980c638
SHA2562ce637adc07123b8d93cf609d2980811ed82a6a633001256211015ea933fb960
SHA5120b7d232d903d5b295aeadc91b1f7daf715cf0e815d14b1a0bf1e627cdd1391284e99c677fbe4441bbe4bf8a0346b15f48e6ac3cab5c3ee935d381a29182c2bc9
-
Filesize
175KB
MD5ab75d87ece7f849f9b0ec83aa964a7e8
SHA15f4421f9f4978823c6f54c364d938ba97980c638
SHA2562ce637adc07123b8d93cf609d2980811ed82a6a633001256211015ea933fb960
SHA5120b7d232d903d5b295aeadc91b1f7daf715cf0e815d14b1a0bf1e627cdd1391284e99c677fbe4441bbe4bf8a0346b15f48e6ac3cab5c3ee935d381a29182c2bc9
-
Filesize
548KB
MD51f17342a067efe50bf13eedb7f5c7b52
SHA116e7b64f6cdca68a079e158fe7a6e435bf61dbe9
SHA256729705fe6485a5ff961a7f6c27a65008eff99609cb296b7daa5f9e9162b35945
SHA5121ecade226ea432532df269e9a07b4d9e2b583258ce265d36871faa95faf3c1752be20ac5ced6ff8f9756a36fd331a43f2de5ad2a95ea67adc00d21237627eaa3
-
Filesize
548KB
MD51f17342a067efe50bf13eedb7f5c7b52
SHA116e7b64f6cdca68a079e158fe7a6e435bf61dbe9
SHA256729705fe6485a5ff961a7f6c27a65008eff99609cb296b7daa5f9e9162b35945
SHA5121ecade226ea432532df269e9a07b4d9e2b583258ce265d36871faa95faf3c1752be20ac5ced6ff8f9756a36fd331a43f2de5ad2a95ea67adc00d21237627eaa3
-
Filesize
291KB
MD582aba3a52b3483dfd4d172627a470f46
SHA13d1da50b8dfce7db9db8f1953eb0e136d4980b15
SHA2569111981308ce1b80a73232b37d9f7143051e47fd8f81ae4921c4a22555a83443
SHA5121f7e33591157ca5854c13def90d403775239705e8901f7609c858d4ff0f8a3c51becffea8d4a858a008dbb3ba268a5182c8847359e501b69a032794145bb62c9
-
Filesize
291KB
MD582aba3a52b3483dfd4d172627a470f46
SHA13d1da50b8dfce7db9db8f1953eb0e136d4980b15
SHA2569111981308ce1b80a73232b37d9f7143051e47fd8f81ae4921c4a22555a83443
SHA5121f7e33591157ca5854c13def90d403775239705e8901f7609c858d4ff0f8a3c51becffea8d4a858a008dbb3ba268a5182c8847359e501b69a032794145bb62c9
-
Filesize
345KB
MD5b627d96a2b956f6463aa94a3d6779f6b
SHA1ac175eed9b6406172cbeb52fd9f7c6b2f5b24296
SHA256ddef246a1c90139d9c6c85983a438b0b0444d0eb7c8da2938cb66effa4ea9504
SHA512fde2ee7c53be88f7dd20ebdc408bf731826b7b0d2b46c25ff23738ccda0a5e6febabc28298392ce7953d3a804a5fd2efd288abc2abd045368c86f434874706d5
-
Filesize
345KB
MD5b627d96a2b956f6463aa94a3d6779f6b
SHA1ac175eed9b6406172cbeb52fd9f7c6b2f5b24296
SHA256ddef246a1c90139d9c6c85983a438b0b0444d0eb7c8da2938cb66effa4ea9504
SHA512fde2ee7c53be88f7dd20ebdc408bf731826b7b0d2b46c25ff23738ccda0a5e6febabc28298392ce7953d3a804a5fd2efd288abc2abd045368c86f434874706d5