Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 03:07
Static task
static1
Behavioral task
behavioral1
Sample
a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe
Resource
win10-20230220-en
General
-
Target
a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe
-
Size
689KB
-
MD5
5e275dbd5feb12562bbb2654fb74ba32
-
SHA1
de6dd5afb536f2faec6d9766cbd9759ad607d6f7
-
SHA256
a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3
-
SHA512
66e9964b2feb4e17eb50616e36b73e18ec5fb2b0307497185dd1a5ecf07a1535e5d61d0e15994085822fad122ca4444487142a1616f80e9edaf5d256f467c256
-
SSDEEP
12288:MMrly90TC9W15ov84QQmYfyI65hLu3hK3muSvRExAmJMvvFbifig4EQvjM4dYEv:Ryu91ezf6nfa3hK2uqhmJMVbiagcvjMM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8713.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8713.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4400-177-0x0000000001DE0000-0x0000000001E26000-memory.dmp family_redline behavioral1/memory/4400-178-0x00000000064E0000-0x0000000006524000-memory.dmp family_redline behavioral1/memory/4400-179-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-180-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-182-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-184-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-186-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-188-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-190-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-192-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-194-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-197-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-201-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-204-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-206-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-208-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-210-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-212-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-214-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-216-0x00000000064E0000-0x000000000651F000-memory.dmp family_redline behavioral1/memory/4400-1101-0x0000000003750000-0x0000000003760000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un031814.exepro8713.exequ0393.exesi970860.exepid process 3912 un031814.exe 5100 pro8713.exe 4400 qu0393.exe 1128 si970860.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8713.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8713.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exeun031814.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un031814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un031814.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8713.exequ0393.exesi970860.exepid process 5100 pro8713.exe 5100 pro8713.exe 4400 qu0393.exe 4400 qu0393.exe 1128 si970860.exe 1128 si970860.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8713.exequ0393.exesi970860.exedescription pid process Token: SeDebugPrivilege 5100 pro8713.exe Token: SeDebugPrivilege 4400 qu0393.exe Token: SeDebugPrivilege 1128 si970860.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exeun031814.exedescription pid process target process PID 3900 wrote to memory of 3912 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe un031814.exe PID 3900 wrote to memory of 3912 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe un031814.exe PID 3900 wrote to memory of 3912 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe un031814.exe PID 3912 wrote to memory of 5100 3912 un031814.exe pro8713.exe PID 3912 wrote to memory of 5100 3912 un031814.exe pro8713.exe PID 3912 wrote to memory of 5100 3912 un031814.exe pro8713.exe PID 3912 wrote to memory of 4400 3912 un031814.exe qu0393.exe PID 3912 wrote to memory of 4400 3912 un031814.exe qu0393.exe PID 3912 wrote to memory of 4400 3912 un031814.exe qu0393.exe PID 3900 wrote to memory of 1128 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe si970860.exe PID 3900 wrote to memory of 1128 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe si970860.exe PID 3900 wrote to memory of 1128 3900 a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe si970860.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe"C:\Users\Admin\AppData\Local\Temp\a800e73e45de5e6412ef4b3c42c1e492626086f8c0cbd706eb7a1898aca8fdf3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un031814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un031814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8713.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0393.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si970860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si970860.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b72347f43681c975a925e7c6e44c74ae
SHA1a1542edcfa8bb8695b5ddf485aab4d28b738f62c
SHA256cbe88135bfb2581d4c45e8664cf051a7362158d30430c32599b9905596c89bde
SHA512e601f1b7a5b0125fd9605a035b88432eb36080638d5e91056c1883123a093de5db8d6b75213518cb37c2aa611fbaa8549bd16dedcdd07666105b8b70fba40a32
-
Filesize
175KB
MD5b72347f43681c975a925e7c6e44c74ae
SHA1a1542edcfa8bb8695b5ddf485aab4d28b738f62c
SHA256cbe88135bfb2581d4c45e8664cf051a7362158d30430c32599b9905596c89bde
SHA512e601f1b7a5b0125fd9605a035b88432eb36080638d5e91056c1883123a093de5db8d6b75213518cb37c2aa611fbaa8549bd16dedcdd07666105b8b70fba40a32
-
Filesize
547KB
MD5bc2fa712e2a410ed8e09cbde95da1aa5
SHA162d1ebee08a176fae5057952b1e0af710498d190
SHA256ebd762cf542d0502a74e6d6170a57a044ab77a7fe9d7eba9084f4bc73d700092
SHA512890d47750dc0cebc76d4a011264dc04426a64c186f6c1048583e02e168be54890274e51ec6b59d7d2722e6f2785acc051ceff0ab3469f015d752de97100aba37
-
Filesize
547KB
MD5bc2fa712e2a410ed8e09cbde95da1aa5
SHA162d1ebee08a176fae5057952b1e0af710498d190
SHA256ebd762cf542d0502a74e6d6170a57a044ab77a7fe9d7eba9084f4bc73d700092
SHA512890d47750dc0cebc76d4a011264dc04426a64c186f6c1048583e02e168be54890274e51ec6b59d7d2722e6f2785acc051ceff0ab3469f015d752de97100aba37
-
Filesize
291KB
MD5fde38ed97fad9585954e57014390e0aa
SHA13c3b0b161c1e06de735015d0fe31d0437fb471a5
SHA2561204de52b57cb6a7895b339910b7d1411561184ec7f1bc1ae368c992aa939c69
SHA512f47cb60c1856a317068706200b7980a87482321d519f9e3f6e8deaaa4420aec0b134645749ab8c10de5b287c3b9e8f02dbfd2ab734c8b19239c587597e72fe2c
-
Filesize
291KB
MD5fde38ed97fad9585954e57014390e0aa
SHA13c3b0b161c1e06de735015d0fe31d0437fb471a5
SHA2561204de52b57cb6a7895b339910b7d1411561184ec7f1bc1ae368c992aa939c69
SHA512f47cb60c1856a317068706200b7980a87482321d519f9e3f6e8deaaa4420aec0b134645749ab8c10de5b287c3b9e8f02dbfd2ab734c8b19239c587597e72fe2c
-
Filesize
345KB
MD55e3f736b31607e16aeb62d5b9564085c
SHA1a5e147e16111072721d2f70ea3a7fba13a514156
SHA256eb818b433c2600fd2b3a73ea49067f87f5d7105b711a4fc47d0222fc47a0201e
SHA51200784e9703ed5e97f3dc8f6684d8a6fb55ab22ac5ccc663d21cc8b4c26860fd4c0d16e0915f423565e403ea0ae1862d13f16dc95d339e51e8a466fdd767781e0
-
Filesize
345KB
MD55e3f736b31607e16aeb62d5b9564085c
SHA1a5e147e16111072721d2f70ea3a7fba13a514156
SHA256eb818b433c2600fd2b3a73ea49067f87f5d7105b711a4fc47d0222fc47a0201e
SHA51200784e9703ed5e97f3dc8f6684d8a6fb55ab22ac5ccc663d21cc8b4c26860fd4c0d16e0915f423565e403ea0ae1862d13f16dc95d339e51e8a466fdd767781e0