Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:19
Static task
static1
Behavioral task
behavioral1
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win10v2004-20230221-en
General
-
Target
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
-
Size
685KB
-
MD5
354c85a42efa4053b0dcaec9feb41be3
-
SHA1
4f05959c72e73ed28d40436010218f72b46ffdbe
-
SHA256
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926
-
SHA512
138b18137a879633b2bf4603e1b86005c2fa7b0b6f6dc70e57181b7f0ea32184480d0583e3e3bcf8c9a379e10f75c695c9f880d4aa25c30fd6ca7ac005846d8a
-
SSDEEP
12288:pMrSy90t6ss+VnNqL4GEjlX8eoNK6xR4O2UtcL:Tya6vmpFuDS
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
Processes:
pro6913.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6913.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6913.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/3084-193-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-194-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-196-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-198-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-200-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-204-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-208-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-212-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-214-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-216-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-218-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-220-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-224-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-226-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral2/memory/3084-222-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un367709.exepro6913.exequ8195.exesi747782.exepid process 1344 un367709.exe 2160 pro6913.exe 3084 qu8195.exe 4984 si747782.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6913.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6913.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exeun367709.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un367709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367709.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6913.exequ8195.exesi747782.exepid process 2160 pro6913.exe 2160 pro6913.exe 3084 qu8195.exe 3084 qu8195.exe 4984 si747782.exe 4984 si747782.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6913.exequ8195.exesi747782.exedescription pid process Token: SeDebugPrivilege 2160 pro6913.exe Token: SeDebugPrivilege 3084 qu8195.exe Token: SeDebugPrivilege 4984 si747782.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exeun367709.exedescription pid process target process PID 2324 wrote to memory of 1344 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe un367709.exe PID 2324 wrote to memory of 1344 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe un367709.exe PID 2324 wrote to memory of 1344 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe un367709.exe PID 1344 wrote to memory of 2160 1344 un367709.exe pro6913.exe PID 1344 wrote to memory of 2160 1344 un367709.exe pro6913.exe PID 1344 wrote to memory of 2160 1344 un367709.exe pro6913.exe PID 1344 wrote to memory of 3084 1344 un367709.exe qu8195.exe PID 1344 wrote to memory of 3084 1344 un367709.exe qu8195.exe PID 1344 wrote to memory of 3084 1344 un367709.exe qu8195.exe PID 2324 wrote to memory of 4984 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe si747782.exe PID 2324 wrote to memory of 4984 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe si747782.exe PID 2324 wrote to memory of 4984 2324 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe si747782.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1