Analysis
-
max time kernel
51s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 03:28
Static task
static1
Behavioral task
behavioral1
Sample
e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe
Resource
win10-20230220-en
General
-
Target
e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe
-
Size
689KB
-
MD5
09c9ba308332f8a07cc3fd0b1838c8d4
-
SHA1
46363edda5dc30e2e0e416ad310bab4df8847389
-
SHA256
e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180
-
SHA512
47e6bf12128909ac225d5d48a7c656d50c14ba2a064dbc6e74298c1e914c03bd209fce4fcd63f01f1cc1a9848f3fb18397b103582d2e8bae78f27da15300af89
-
SSDEEP
12288:mMrty901dugz5bOk05U0XLxya65hLurlVYalP5UnvRmJov3FmyfigfP2/N1ZfJ7n:3ygbscpfarleap4ZmJoNmyagfQX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8513.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8513.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/1796-181-0x0000000003850000-0x0000000003896000-memory.dmp family_redline behavioral1/memory/1796-182-0x0000000006510000-0x0000000006554000-memory.dmp family_redline behavioral1/memory/1796-183-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-184-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-186-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-188-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-190-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-192-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-194-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-196-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-198-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-200-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-202-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-204-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-206-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-208-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-210-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-212-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-214-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-216-0x0000000006510000-0x000000000654F000-memory.dmp family_redline behavioral1/memory/1796-1102-0x0000000003890000-0x00000000038A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un962586.exepro8513.exequ5711.exesi084137.exepid process 2264 un962586.exe 2504 pro8513.exe 1796 qu5711.exe 4348 si084137.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8513.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8513.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un962586.exee9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un962586.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un962586.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8513.exequ5711.exesi084137.exepid process 2504 pro8513.exe 2504 pro8513.exe 1796 qu5711.exe 1796 qu5711.exe 4348 si084137.exe 4348 si084137.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8513.exequ5711.exesi084137.exedescription pid process Token: SeDebugPrivilege 2504 pro8513.exe Token: SeDebugPrivilege 1796 qu5711.exe Token: SeDebugPrivilege 4348 si084137.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exeun962586.exedescription pid process target process PID 2064 wrote to memory of 2264 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe un962586.exe PID 2064 wrote to memory of 2264 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe un962586.exe PID 2064 wrote to memory of 2264 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe un962586.exe PID 2264 wrote to memory of 2504 2264 un962586.exe pro8513.exe PID 2264 wrote to memory of 2504 2264 un962586.exe pro8513.exe PID 2264 wrote to memory of 2504 2264 un962586.exe pro8513.exe PID 2264 wrote to memory of 1796 2264 un962586.exe qu5711.exe PID 2264 wrote to memory of 1796 2264 un962586.exe qu5711.exe PID 2264 wrote to memory of 1796 2264 un962586.exe qu5711.exe PID 2064 wrote to memory of 4348 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe si084137.exe PID 2064 wrote to memory of 4348 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe si084137.exe PID 2064 wrote to memory of 4348 2064 e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe si084137.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe"C:\Users\Admin\AppData\Local\Temp\e9a9886ab2342ded8b9def4e2223fc50ec7d734403ecbbc4f101f86dcdf55180.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un962586.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un962586.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8513.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8513.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5711.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5711.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084137.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084137.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5310129a3844b6fa1c66d9be776742141
SHA17b29eb9e52a189fb0ae68d0f9b0a2f61878b7859
SHA256195c43727c4c3fd545c4e7ded5509d35fe06b6ae7b8f78df4d7baeca1970e976
SHA512ec90259504a728a001383b2185b644872ba4f1d27436fc87a350754825d95496fe820c2a5fab68dbbc6b59dcad2295cbcec590182a7ed9376eb36c9d516ea283
-
Filesize
175KB
MD5310129a3844b6fa1c66d9be776742141
SHA17b29eb9e52a189fb0ae68d0f9b0a2f61878b7859
SHA256195c43727c4c3fd545c4e7ded5509d35fe06b6ae7b8f78df4d7baeca1970e976
SHA512ec90259504a728a001383b2185b644872ba4f1d27436fc87a350754825d95496fe820c2a5fab68dbbc6b59dcad2295cbcec590182a7ed9376eb36c9d516ea283
-
Filesize
547KB
MD5ab8eec2262079106d158be0f814ecbbd
SHA18243a5597a3c15029f33f3d113be278ed7344e96
SHA256dd99ead9dff22437bda2c35ea4cb715b8052856904215a348fd98c598842baf6
SHA512e980db8c0a758cbfc09cb8dfb232a946c3881e074aa9c445fa4e2e1daec47db659353e6916bd9fa2fb0d44bd51374a1253d2b952fa2417e5ac99dd68969ac368
-
Filesize
547KB
MD5ab8eec2262079106d158be0f814ecbbd
SHA18243a5597a3c15029f33f3d113be278ed7344e96
SHA256dd99ead9dff22437bda2c35ea4cb715b8052856904215a348fd98c598842baf6
SHA512e980db8c0a758cbfc09cb8dfb232a946c3881e074aa9c445fa4e2e1daec47db659353e6916bd9fa2fb0d44bd51374a1253d2b952fa2417e5ac99dd68969ac368
-
Filesize
291KB
MD5fce4cff32c28f557abcf5e3d40dc5109
SHA1ce798034238e627504f8aed5de5e11ef8fd89e1a
SHA256819154695ef3d71ef4e802e5d72839b05c77004353e3744f8a9febbaf003c981
SHA512c776794d3afc3b4d79bad58127b381be2e546021b1595204c09191de66c4a4bb017b89a433a4e04511073493e46fcaedf77ad5504d1d56349e968ea6ee0e2838
-
Filesize
291KB
MD5fce4cff32c28f557abcf5e3d40dc5109
SHA1ce798034238e627504f8aed5de5e11ef8fd89e1a
SHA256819154695ef3d71ef4e802e5d72839b05c77004353e3744f8a9febbaf003c981
SHA512c776794d3afc3b4d79bad58127b381be2e546021b1595204c09191de66c4a4bb017b89a433a4e04511073493e46fcaedf77ad5504d1d56349e968ea6ee0e2838
-
Filesize
345KB
MD57673ee7d694a7c5534e805f41416ae1d
SHA154869ba1e11c8c51c0b8581b8bcfd34c6758fad1
SHA25602b9352bebe7eb74e6598ef9979db800f3f79f57024b5c04c125bf54f32ce577
SHA5124fa697c247a0968d75c1c3f204d0c477827f1fdaaf180da4159c2c787013bb58c0193015da7c37a065f2e992bb80ae6bb3e059f6b337769828b70e6fc302fad6
-
Filesize
345KB
MD57673ee7d694a7c5534e805f41416ae1d
SHA154869ba1e11c8c51c0b8581b8bcfd34c6758fad1
SHA25602b9352bebe7eb74e6598ef9979db800f3f79f57024b5c04c125bf54f32ce577
SHA5124fa697c247a0968d75c1c3f204d0c477827f1fdaaf180da4159c2c787013bb58c0193015da7c37a065f2e992bb80ae6bb3e059f6b337769828b70e6fc302fad6