Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 02:16
Static task
static1
Behavioral task
behavioral1
Sample
55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe
Resource
win10-20230220-en
General
-
Target
55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe
-
Size
689KB
-
MD5
10cdfe061daaa43b3eef3266cfcd8c43
-
SHA1
a8fdbee84c99ca77268df811c922d5b85a3f017a
-
SHA256
55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b
-
SHA512
5e3eee0c69680329039d32be4d6bfd96c6e7b0e517c2ca22133a7ebaf72187f50fd17a549eeca8687588f5c365979a50caa9063a174881dd03413cec78eb21c5
-
SSDEEP
12288:SMroy908m0k7O9gaDaTD5724DbyD65hLu0KIwTobmVezhPOSK5mJfvqF2XfigJf3:2y9kzT44iOfa0hBhPO35mJfW2XagJfrz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8297.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3032-180-0x0000000003800000-0x0000000003846000-memory.dmp family_redline behavioral1/memory/3032-181-0x0000000003A80000-0x0000000003AC4000-memory.dmp family_redline behavioral1/memory/3032-182-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-183-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-185-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-187-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-189-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-191-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-193-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-195-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-197-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-199-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-201-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-203-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-205-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-207-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-209-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-211-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-213-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3032-215-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2004 un500711.exe 3436 pro8297.exe 3032 qu1762.exe 3044 si252894.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8297.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un500711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un500711.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3436 pro8297.exe 3436 pro8297.exe 3032 qu1762.exe 3032 qu1762.exe 3044 si252894.exe 3044 si252894.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3436 pro8297.exe Token: SeDebugPrivilege 3032 qu1762.exe Token: SeDebugPrivilege 3044 si252894.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2004 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 66 PID 2540 wrote to memory of 2004 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 66 PID 2540 wrote to memory of 2004 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 66 PID 2004 wrote to memory of 3436 2004 un500711.exe 67 PID 2004 wrote to memory of 3436 2004 un500711.exe 67 PID 2004 wrote to memory of 3436 2004 un500711.exe 67 PID 2004 wrote to memory of 3032 2004 un500711.exe 68 PID 2004 wrote to memory of 3032 2004 un500711.exe 68 PID 2004 wrote to memory of 3032 2004 un500711.exe 68 PID 2540 wrote to memory of 3044 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 70 PID 2540 wrote to memory of 3044 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 70 PID 2540 wrote to memory of 3044 2540 55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe"C:\Users\Admin\AppData\Local\Temp\55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b1cd491d0cd7216942522e24f4dfc1fe
SHA1a0f9a39f166d11f15c98c2c21095cc7ac38d3a89
SHA256e918d8fac1c7f77133c483c2c2ebdb2a175e8f9e18d21efffedd6d7801a70216
SHA5128691561663e38408ed4df722612f06d6bf9e3e3ead47bbc82739bda0512d4329d642f915d2b22e6bd133a180dcdb654e551b5534fc10f095e3eb72a33ed78654
-
Filesize
175KB
MD5b1cd491d0cd7216942522e24f4dfc1fe
SHA1a0f9a39f166d11f15c98c2c21095cc7ac38d3a89
SHA256e918d8fac1c7f77133c483c2c2ebdb2a175e8f9e18d21efffedd6d7801a70216
SHA5128691561663e38408ed4df722612f06d6bf9e3e3ead47bbc82739bda0512d4329d642f915d2b22e6bd133a180dcdb654e551b5534fc10f095e3eb72a33ed78654
-
Filesize
547KB
MD5d8c30ad94535a60879cda16bf3732573
SHA1182c71c5ced7134bc9742f59e6e25bf6ede6fa49
SHA2563876861375f089067d359940fd7760a2f5370bcbffcd14b8116ca9960f79978f
SHA51205d850b19137b4cdf8c0c73df0f7d79374c8831239a9188066e784d182293faad86b2fca0270d192f2b54f55cf78e697d4260013eff3c4841db0beb2091bc10b
-
Filesize
547KB
MD5d8c30ad94535a60879cda16bf3732573
SHA1182c71c5ced7134bc9742f59e6e25bf6ede6fa49
SHA2563876861375f089067d359940fd7760a2f5370bcbffcd14b8116ca9960f79978f
SHA51205d850b19137b4cdf8c0c73df0f7d79374c8831239a9188066e784d182293faad86b2fca0270d192f2b54f55cf78e697d4260013eff3c4841db0beb2091bc10b
-
Filesize
291KB
MD54b007703bcb69263f0c6448b1ce0063f
SHA1a99dded4bfb61327535940065af65627c8db4349
SHA25670669b1055af70b16d11a765150058a79072df6540b926883429f47d0d7e454c
SHA51261177cebeb155169e106c3ab5138ccd3bb0d0282fc55a2fcf57773af0bba84351dcc12b4e955e23415a52c773abca5de51ae0bbba2618dc9082cf2eda472f1fd
-
Filesize
291KB
MD54b007703bcb69263f0c6448b1ce0063f
SHA1a99dded4bfb61327535940065af65627c8db4349
SHA25670669b1055af70b16d11a765150058a79072df6540b926883429f47d0d7e454c
SHA51261177cebeb155169e106c3ab5138ccd3bb0d0282fc55a2fcf57773af0bba84351dcc12b4e955e23415a52c773abca5de51ae0bbba2618dc9082cf2eda472f1fd
-
Filesize
345KB
MD5adc592d3d7abab50674d0d85bce29d00
SHA14b0963ae29a8ac9cbf19892608e84045ea6bafc4
SHA2562db1e8b37450eb698da4cf26ee0df45fbf213be01931612976011489291ece0e
SHA51260b925ed4da5c830673e766637ddf79e5b52a3e0c8b3d40a73e2aceffdd71e2cfb5611f780fbcc60602b1df9f367d14fd261d41932f69274b12fd3f90bad6004
-
Filesize
345KB
MD5adc592d3d7abab50674d0d85bce29d00
SHA14b0963ae29a8ac9cbf19892608e84045ea6bafc4
SHA2562db1e8b37450eb698da4cf26ee0df45fbf213be01931612976011489291ece0e
SHA51260b925ed4da5c830673e766637ddf79e5b52a3e0c8b3d40a73e2aceffdd71e2cfb5611f780fbcc60602b1df9f367d14fd261d41932f69274b12fd3f90bad6004