Analysis
-
max time kernel
51s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 02:44
Static task
static1
Behavioral task
behavioral1
Sample
0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe
Resource
win10-20230220-en
General
-
Target
0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe
-
Size
689KB
-
MD5
54556c196facf71d949eb5d8eefa2d89
-
SHA1
3dd7ab05e9b0e349305c1a2450591e77b07efa37
-
SHA256
0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612
-
SHA512
3fdc3515b8b692a2d48f748376f440dc751608027d4010af695cfc7238d3ff0ecc7478a68e92c6fdf0c4138aa88878ac6f0b18725dc4bd511fc94327516aa0ee
-
SSDEEP
12288:xMrvy90/Lz+CAJIzHaEYOGyQ65hLu9ahpD2hMw4NDQ0RozvDFJIfig9d5I:qyq/+CioaETTvfaAgCYZJIag+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6696.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6696.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3532-180-0x00000000035B0000-0x00000000035F6000-memory.dmp family_redline behavioral1/memory/3532-181-0x00000000038B0000-0x00000000038F4000-memory.dmp family_redline behavioral1/memory/3532-182-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-183-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-185-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-187-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-189-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-191-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-193-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-195-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-197-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-199-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-201-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-203-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-207-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-211-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-213-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-215-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-217-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline behavioral1/memory/3532-219-0x00000000038B0000-0x00000000038EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un863673.exepro6696.exequ3112.exesi297109.exepid process 5028 un863673.exe 3560 pro6696.exe 3532 qu3112.exe 4464 si297109.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6696.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6696.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exeun863673.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un863673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un863673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6696.exequ3112.exesi297109.exepid process 3560 pro6696.exe 3560 pro6696.exe 3532 qu3112.exe 3532 qu3112.exe 4464 si297109.exe 4464 si297109.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6696.exequ3112.exesi297109.exedescription pid process Token: SeDebugPrivilege 3560 pro6696.exe Token: SeDebugPrivilege 3532 qu3112.exe Token: SeDebugPrivilege 4464 si297109.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exeun863673.exedescription pid process target process PID 3944 wrote to memory of 5028 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe un863673.exe PID 3944 wrote to memory of 5028 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe un863673.exe PID 3944 wrote to memory of 5028 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe un863673.exe PID 5028 wrote to memory of 3560 5028 un863673.exe pro6696.exe PID 5028 wrote to memory of 3560 5028 un863673.exe pro6696.exe PID 5028 wrote to memory of 3560 5028 un863673.exe pro6696.exe PID 5028 wrote to memory of 3532 5028 un863673.exe qu3112.exe PID 5028 wrote to memory of 3532 5028 un863673.exe qu3112.exe PID 5028 wrote to memory of 3532 5028 un863673.exe qu3112.exe PID 3944 wrote to memory of 4464 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe si297109.exe PID 3944 wrote to memory of 4464 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe si297109.exe PID 3944 wrote to memory of 4464 3944 0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe si297109.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe"C:\Users\Admin\AppData\Local\Temp\0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d9cdc529af14c01671b0f2b96898316
SHA11ff6d52f5e23260415a4f123b673fda3c981d9bf
SHA256a0b1a30b58b18cb49796e29f87e44af8598953b778f8315f73cccaf8c93eeba5
SHA51249c3b430dd7c8b3816c0efe19be4e74f833f12b57a6bdbec1959c196bfb7a6fbcb533b81cca84ddc7bb6ee37054aa8ebf64c768b6b5ae952203c7b6598efca8b
-
Filesize
175KB
MD50d9cdc529af14c01671b0f2b96898316
SHA11ff6d52f5e23260415a4f123b673fda3c981d9bf
SHA256a0b1a30b58b18cb49796e29f87e44af8598953b778f8315f73cccaf8c93eeba5
SHA51249c3b430dd7c8b3816c0efe19be4e74f833f12b57a6bdbec1959c196bfb7a6fbcb533b81cca84ddc7bb6ee37054aa8ebf64c768b6b5ae952203c7b6598efca8b
-
Filesize
547KB
MD57848e2e40343297995b079a1ea72c3b6
SHA1f102d6d47d6759f117dc4bb92fbcc38aaaa73895
SHA25642e71ae0dbc29b99d96d49c51c958aa2ca200eaf51ad517bd13fe26c28baef6e
SHA512d6d1d29cb752caab9ec24601056ab9d175c65934c2953127ba8f5db88f91548e107590befa573c4a1403dbd912e14a3b49d2d9aa4babe3d7040877c955d2be80
-
Filesize
547KB
MD57848e2e40343297995b079a1ea72c3b6
SHA1f102d6d47d6759f117dc4bb92fbcc38aaaa73895
SHA25642e71ae0dbc29b99d96d49c51c958aa2ca200eaf51ad517bd13fe26c28baef6e
SHA512d6d1d29cb752caab9ec24601056ab9d175c65934c2953127ba8f5db88f91548e107590befa573c4a1403dbd912e14a3b49d2d9aa4babe3d7040877c955d2be80
-
Filesize
291KB
MD545b9622bbf7b7c2bbccbb31a99c53483
SHA171d8dd01cfababacec80fdefbeb7c7262da427c3
SHA256304d747a673bc6022ce012712000c3bf1dc7249f8fb0b47c95110f5feaf076d9
SHA512103e25b5fd6276f4819fb5d2db65d0f7fe3f5aba4c004cbd332b23070f110bfe176547f90cdbc5a5aa3a74b9f41dfc5f9d0f28ff75a1abaf2f6ea46e15a363d6
-
Filesize
291KB
MD545b9622bbf7b7c2bbccbb31a99c53483
SHA171d8dd01cfababacec80fdefbeb7c7262da427c3
SHA256304d747a673bc6022ce012712000c3bf1dc7249f8fb0b47c95110f5feaf076d9
SHA512103e25b5fd6276f4819fb5d2db65d0f7fe3f5aba4c004cbd332b23070f110bfe176547f90cdbc5a5aa3a74b9f41dfc5f9d0f28ff75a1abaf2f6ea46e15a363d6
-
Filesize
345KB
MD5c20a0f614aed4c2334db7d2654b25364
SHA1b8537daa160ea96d4de74f776b61f7db5fab9b33
SHA2561911df8320c4bb7ce57758c1bce94c13a98e6a54d368da6c377a32bd298b9764
SHA5127ed0a18b62da9f52ff85a89ea2084db662ad94fdf968a2012ea4bcac43a75251ee626a5ecd13193ab190677e2a5dbc288165e98a933d7c21b6fd9614a99d6f0f
-
Filesize
345KB
MD5c20a0f614aed4c2334db7d2654b25364
SHA1b8537daa160ea96d4de74f776b61f7db5fab9b33
SHA2561911df8320c4bb7ce57758c1bce94c13a98e6a54d368da6c377a32bd298b9764
SHA5127ed0a18b62da9f52ff85a89ea2084db662ad94fdf968a2012ea4bcac43a75251ee626a5ecd13193ab190677e2a5dbc288165e98a933d7c21b6fd9614a99d6f0f