Analysis
-
max time kernel
57s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 01:55
Static task
static1
Behavioral task
behavioral1
Sample
e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe
Resource
win10-20230220-en
General
-
Target
e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe
-
Size
690KB
-
MD5
52c91da660906057602e522c57542c83
-
SHA1
8d319b0c7f200e051aaf283f00274c743095835c
-
SHA256
e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546
-
SHA512
124956129e4566653fc60b3cff4c2d8c7a95c7961b855f22c0bf1da1075d867f1c5554d135b98da77fd838ea8f3ac2fe99c9814e0d72c1221fed90b219e52c38
-
SSDEEP
12288:gMrwy90VdujV5qArPZshFyy65hLuDULoVfLfBPm2DmvIoF6kfigPKOSO27ks8Ha:gyEuyArPZnhfaeOZPtDmb6kagSO246
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2115.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4732-180-0x00000000036C0000-0x0000000003706000-memory.dmp family_redline behavioral1/memory/4732-181-0x0000000003A30000-0x0000000003A74000-memory.dmp family_redline behavioral1/memory/4732-182-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-183-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-185-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-187-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-189-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-191-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-193-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-195-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-197-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-199-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-201-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-203-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-206-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-208-0x0000000006230000-0x0000000006240000-memory.dmp family_redline behavioral1/memory/4732-211-0x0000000006230000-0x0000000006240000-memory.dmp family_redline behavioral1/memory/4732-210-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-213-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-215-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-217-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline behavioral1/memory/4732-219-0x0000000003A30000-0x0000000003A6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2872 un624483.exe 3364 pro2115.exe 4732 qu6789.exe 4980 si701059.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2115.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un624483.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un624483.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3364 pro2115.exe 3364 pro2115.exe 4732 qu6789.exe 4732 qu6789.exe 4980 si701059.exe 4980 si701059.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3364 pro2115.exe Token: SeDebugPrivilege 4732 qu6789.exe Token: SeDebugPrivilege 4980 si701059.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2872 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 66 PID 2456 wrote to memory of 2872 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 66 PID 2456 wrote to memory of 2872 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 66 PID 2872 wrote to memory of 3364 2872 un624483.exe 67 PID 2872 wrote to memory of 3364 2872 un624483.exe 67 PID 2872 wrote to memory of 3364 2872 un624483.exe 67 PID 2872 wrote to memory of 4732 2872 un624483.exe 68 PID 2872 wrote to memory of 4732 2872 un624483.exe 68 PID 2872 wrote to memory of 4732 2872 un624483.exe 68 PID 2456 wrote to memory of 4980 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 70 PID 2456 wrote to memory of 4980 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 70 PID 2456 wrote to memory of 4980 2456 e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe"C:\Users\Admin\AppData\Local\Temp\e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e50d6ac82b90dccc8f80bf546c69e980
SHA145e307ed530336401a2b8cb2b312d960217154af
SHA256699c46ec61632c84c6c13bac74a022da6a6e5e8a4749190dad4e58667e329245
SHA512623f4901e71c413ee3816c24429e6e4891f24b51184a51da1815bab71a84a83f7fa0c78ee74cea965e0ff5c2538ce63b7ef409943c87aa7a0373404765887538
-
Filesize
175KB
MD5e50d6ac82b90dccc8f80bf546c69e980
SHA145e307ed530336401a2b8cb2b312d960217154af
SHA256699c46ec61632c84c6c13bac74a022da6a6e5e8a4749190dad4e58667e329245
SHA512623f4901e71c413ee3816c24429e6e4891f24b51184a51da1815bab71a84a83f7fa0c78ee74cea965e0ff5c2538ce63b7ef409943c87aa7a0373404765887538
-
Filesize
548KB
MD5b77f18acf40e483e376d94180f079731
SHA1f4b8da579d7358dd49a155b0bd92ef18af10f897
SHA2569b8c23c8939d44f9a112691d09d00178ba2ee2e8ea4575457e3ad3721ed557b1
SHA51216ca5169104e4e1a8fc39aad435b42c81a68d8af5834549b5c0e08a6c32e9c600bd26fd3d059e0b1755d25a0d5dc3962902ea82e5eff37233710b74828ec20af
-
Filesize
548KB
MD5b77f18acf40e483e376d94180f079731
SHA1f4b8da579d7358dd49a155b0bd92ef18af10f897
SHA2569b8c23c8939d44f9a112691d09d00178ba2ee2e8ea4575457e3ad3721ed557b1
SHA51216ca5169104e4e1a8fc39aad435b42c81a68d8af5834549b5c0e08a6c32e9c600bd26fd3d059e0b1755d25a0d5dc3962902ea82e5eff37233710b74828ec20af
-
Filesize
291KB
MD5e48f311aa9be08ceb1928b583725902c
SHA10cca77f72562100bd896827cad31ce392dddf6ba
SHA2562c7ae2641c279593840ca6a8929ba195727658d5a15938cfc1d28f0d8c242fb2
SHA5124b62fac83294f734516c5abfb69e898ea2317bf2e1127c1ca6309fcaa36db1aaa2d0839225d5ab54f6c5dd6e9863a5f844f15f2ea5577f6113af1568cf973e3c
-
Filesize
291KB
MD5e48f311aa9be08ceb1928b583725902c
SHA10cca77f72562100bd896827cad31ce392dddf6ba
SHA2562c7ae2641c279593840ca6a8929ba195727658d5a15938cfc1d28f0d8c242fb2
SHA5124b62fac83294f734516c5abfb69e898ea2317bf2e1127c1ca6309fcaa36db1aaa2d0839225d5ab54f6c5dd6e9863a5f844f15f2ea5577f6113af1568cf973e3c
-
Filesize
345KB
MD520f6fb77d1514868461d47f9f53dc9a4
SHA13e2885bfe1a7c7bbfd3d473a730384c933a82922
SHA2560ec60c3ab6bf09055c03bd76b8bfc511565e678668aa8f5beda3e9dcb5fe5a38
SHA51228c7ca7b4a7ae20533d75b83941acf035939e58edcdc7ce3ee67c1787b9821e480a9c049b9e1de972c8be5c5fa5fab5e8d0b0b985da637ed1a074c23d393069f
-
Filesize
345KB
MD520f6fb77d1514868461d47f9f53dc9a4
SHA13e2885bfe1a7c7bbfd3d473a730384c933a82922
SHA2560ec60c3ab6bf09055c03bd76b8bfc511565e678668aa8f5beda3e9dcb5fe5a38
SHA51228c7ca7b4a7ae20533d75b83941acf035939e58edcdc7ce3ee67c1787b9821e480a9c049b9e1de972c8be5c5fa5fab5e8d0b0b985da637ed1a074c23d393069f