Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 03:39
Static task
static1
Behavioral task
behavioral1
Sample
bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe
Resource
win10-20230220-en
General
-
Target
bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe
-
Size
690KB
-
MD5
59199d5fff9d92987061f08ce72a57cc
-
SHA1
3a51db8485af16b027d89a2513787c05ad28bf5e
-
SHA256
bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0
-
SHA512
975bb66da1f60fae0185dd293364955f8ece9158f213016139d5070f6f35b97f600118fe905fb40fe4a3bcee43ec485fa3148502598f25590537e6c10baa39a6
-
SSDEEP
12288:AMruy90sa6Tg3hYlrHIam2gyK65hLuTgyK3ZuSHP3somVzF/6tvqFC0figq7ad/Y:eyva6PRHIwx5facyKpuuLmC0agQZvz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3078.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3078.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4868-176-0x00000000038B0000-0x00000000038F6000-memory.dmp family_redline behavioral1/memory/4868-177-0x0000000003940000-0x0000000003984000-memory.dmp family_redline behavioral1/memory/4868-178-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-179-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-181-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-183-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-185-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-187-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-189-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-191-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-193-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-195-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-197-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-199-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-201-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-203-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-205-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-207-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-210-0x0000000003B30000-0x0000000003B40000-memory.dmp family_redline behavioral1/memory/4868-212-0x0000000003940000-0x000000000397F000-memory.dmp family_redline behavioral1/memory/4868-215-0x0000000003940000-0x000000000397F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un944913.exepro3078.exequ1436.exesi460234.exepid process 3924 un944913.exe 4960 pro3078.exe 4868 qu1436.exe 2748 si460234.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3078.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3078.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un944913.exebc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un944913.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un944913.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3078.exequ1436.exesi460234.exepid process 4960 pro3078.exe 4960 pro3078.exe 4868 qu1436.exe 4868 qu1436.exe 2748 si460234.exe 2748 si460234.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3078.exequ1436.exesi460234.exedescription pid process Token: SeDebugPrivilege 4960 pro3078.exe Token: SeDebugPrivilege 4868 qu1436.exe Token: SeDebugPrivilege 2748 si460234.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exeun944913.exedescription pid process target process PID 4124 wrote to memory of 3924 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe un944913.exe PID 4124 wrote to memory of 3924 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe un944913.exe PID 4124 wrote to memory of 3924 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe un944913.exe PID 3924 wrote to memory of 4960 3924 un944913.exe pro3078.exe PID 3924 wrote to memory of 4960 3924 un944913.exe pro3078.exe PID 3924 wrote to memory of 4960 3924 un944913.exe pro3078.exe PID 3924 wrote to memory of 4868 3924 un944913.exe qu1436.exe PID 3924 wrote to memory of 4868 3924 un944913.exe qu1436.exe PID 3924 wrote to memory of 4868 3924 un944913.exe qu1436.exe PID 4124 wrote to memory of 2748 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe si460234.exe PID 4124 wrote to memory of 2748 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe si460234.exe PID 4124 wrote to memory of 2748 4124 bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe si460234.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe"C:\Users\Admin\AppData\Local\Temp\bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59efb3429fae1d87429751fb6952ad924
SHA1a6366061ac96b8fdeaed4852aa9434e638a6c0db
SHA256eeca8fde2910aa2002e52549fff72f9e6f53e4dbbd9c400ab3afbfc5347b285f
SHA512f0ff82a716aba8a7d965b7b5794a6950db7230a39ce3634550251d90e62fa26455639a74436ab506f8be1397597397b2920cc30bed0351d35aa2b9e9b3ce5199
-
Filesize
175KB
MD59efb3429fae1d87429751fb6952ad924
SHA1a6366061ac96b8fdeaed4852aa9434e638a6c0db
SHA256eeca8fde2910aa2002e52549fff72f9e6f53e4dbbd9c400ab3afbfc5347b285f
SHA512f0ff82a716aba8a7d965b7b5794a6950db7230a39ce3634550251d90e62fa26455639a74436ab506f8be1397597397b2920cc30bed0351d35aa2b9e9b3ce5199
-
Filesize
548KB
MD53bba1099d1372fef51a99b090d71a276
SHA199d2cc3b319a164b7621c0350018b312fd552bb9
SHA25655b5a2eb6d0c4a4895a676f93283b39a86557aacf654268ae59907a4365753ea
SHA5121873a21bc4bc45c9df50639582e2539acb1176f078634881125f31aec72e7669ac371d5166a6cc7526513b020e63c85ce3a685831912e889ebf2dacabf2a8ece
-
Filesize
548KB
MD53bba1099d1372fef51a99b090d71a276
SHA199d2cc3b319a164b7621c0350018b312fd552bb9
SHA25655b5a2eb6d0c4a4895a676f93283b39a86557aacf654268ae59907a4365753ea
SHA5121873a21bc4bc45c9df50639582e2539acb1176f078634881125f31aec72e7669ac371d5166a6cc7526513b020e63c85ce3a685831912e889ebf2dacabf2a8ece
-
Filesize
291KB
MD5feb007b9af183ed759996ec4ad32ead4
SHA15970d2b9d34af2ca6b226bc145020740aa8ef91a
SHA256b61270cdabf81fbf9e39ea468acaf0e2d39897d06edb1f998fde3eb697743b53
SHA5123510063d21e49bc266a51830d0180a98ee5a00a21b89b8d59719dedd4b0037f7d8c736947653fa81225deb70bcfccae1d064024dd504e1563ab24b5ac4561287
-
Filesize
291KB
MD5feb007b9af183ed759996ec4ad32ead4
SHA15970d2b9d34af2ca6b226bc145020740aa8ef91a
SHA256b61270cdabf81fbf9e39ea468acaf0e2d39897d06edb1f998fde3eb697743b53
SHA5123510063d21e49bc266a51830d0180a98ee5a00a21b89b8d59719dedd4b0037f7d8c736947653fa81225deb70bcfccae1d064024dd504e1563ab24b5ac4561287
-
Filesize
345KB
MD514e68cd86972fcb3b99414941658969c
SHA1196e99abefbb6fb0025800fa895975158d4eca3f
SHA256b8198401833b7f91bd8955fcfb3c98b7dd8488be7de6b748094375adabc6306e
SHA51274d350eb3e979d42636e89581570314d3f0fad53eb497d586dfbe216184b4aedd9524e8b5e5a7a44a40eaeb5415523458352551b2a5e2195edf03c1ab8d1fa27
-
Filesize
345KB
MD514e68cd86972fcb3b99414941658969c
SHA1196e99abefbb6fb0025800fa895975158d4eca3f
SHA256b8198401833b7f91bd8955fcfb3c98b7dd8488be7de6b748094375adabc6306e
SHA51274d350eb3e979d42636e89581570314d3f0fad53eb497d586dfbe216184b4aedd9524e8b5e5a7a44a40eaeb5415523458352551b2a5e2195edf03c1ab8d1fa27