Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 03:09
Static task
static1
Behavioral task
behavioral1
Sample
125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe
Resource
win10-20230220-en
General
-
Target
125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe
-
Size
689KB
-
MD5
0769dbcf5b9abd1f18bbbae6d08b67c1
-
SHA1
52f3db562211dd09d8855d0b497b37fe86ba014f
-
SHA256
125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775
-
SHA512
9ee3a20523aa17e3beb04b2520f9ebc151b08045483b819e224e4e1ed70a4eb5fb99a2df4899d6e507001a1a0b2cb6266d07fe6da37bc6b185c85a05c69b460d
-
SSDEEP
12288:hMrBy90XmEpRGplQR1Fhyn1pUa9f+DT4Tid2G5ecQ6mJuvZFfffigMk9fikAF:Yyf8EUE+DTyP6mJu7ffagZaxF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1550.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1550.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4752-179-0x00000000037E0000-0x0000000003826000-memory.dmp family_redline behavioral1/memory/4752-180-0x0000000006560000-0x00000000065A4000-memory.dmp family_redline behavioral1/memory/4752-181-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-182-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-184-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-186-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-188-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-190-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-192-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-194-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-196-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-198-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-200-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-202-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-204-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-206-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-208-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-210-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-212-0x0000000006560000-0x000000000659F000-memory.dmp family_redline behavioral1/memory/4752-214-0x0000000006560000-0x000000000659F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un017755.exepro1550.exequ9630.exesi676747.exepid process 3648 un017755.exe 3660 pro1550.exe 4752 qu9630.exe 1320 si676747.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1550.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1550.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exeun017755.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un017755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un017755.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1550.exequ9630.exesi676747.exepid process 3660 pro1550.exe 3660 pro1550.exe 4752 qu9630.exe 4752 qu9630.exe 1320 si676747.exe 1320 si676747.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1550.exequ9630.exesi676747.exedescription pid process Token: SeDebugPrivilege 3660 pro1550.exe Token: SeDebugPrivilege 4752 qu9630.exe Token: SeDebugPrivilege 1320 si676747.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exeun017755.exedescription pid process target process PID 3752 wrote to memory of 3648 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe un017755.exe PID 3752 wrote to memory of 3648 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe un017755.exe PID 3752 wrote to memory of 3648 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe un017755.exe PID 3648 wrote to memory of 3660 3648 un017755.exe pro1550.exe PID 3648 wrote to memory of 3660 3648 un017755.exe pro1550.exe PID 3648 wrote to memory of 3660 3648 un017755.exe pro1550.exe PID 3648 wrote to memory of 4752 3648 un017755.exe qu9630.exe PID 3648 wrote to memory of 4752 3648 un017755.exe qu9630.exe PID 3648 wrote to memory of 4752 3648 un017755.exe qu9630.exe PID 3752 wrote to memory of 1320 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe si676747.exe PID 3752 wrote to memory of 1320 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe si676747.exe PID 3752 wrote to memory of 1320 3752 125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe si676747.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe"C:\Users\Admin\AppData\Local\Temp\125432f4d706b24a8fbd868c4631df32c0d21c8f55e2e648b044ec0531542775.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un017755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un017755.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1550.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1550.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9630.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676747.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a32cc2369c1dd6ede8ab257b7f9cb1a6
SHA11c8a6adc0bd7fa71c2a0a04d786ba71947b90cc7
SHA256dc2df5d85dd847489088ab5aa3e00af0a9f6c5327ca2fcbd88996af55a1fb661
SHA512fd7a015e8c369937311fba91889786d427547b6fc67a71db5bb30ce7d13ca4d5a78d6efc91f8470c8fce4780034dd3ec6ed1e607709f4dc4d0d58c32eb2c4f90
-
Filesize
175KB
MD5a32cc2369c1dd6ede8ab257b7f9cb1a6
SHA11c8a6adc0bd7fa71c2a0a04d786ba71947b90cc7
SHA256dc2df5d85dd847489088ab5aa3e00af0a9f6c5327ca2fcbd88996af55a1fb661
SHA512fd7a015e8c369937311fba91889786d427547b6fc67a71db5bb30ce7d13ca4d5a78d6efc91f8470c8fce4780034dd3ec6ed1e607709f4dc4d0d58c32eb2c4f90
-
Filesize
547KB
MD541eb6ddf7cad2bdc7ce058faea7d9ef1
SHA1509cd275a948c78d3fa34dddf55670cc1cc921b4
SHA256e517f08e645419081c5f2769e2975ddd4eb3764d1db7a73ee701daa4e746812f
SHA51268a4de80a5752075130a3f58c296c31dd21cb778c5169c3c03db9de210a0b39191d88873a99308f46e572977a97293c4e826b89179cbc78dc949e334901d03a2
-
Filesize
547KB
MD541eb6ddf7cad2bdc7ce058faea7d9ef1
SHA1509cd275a948c78d3fa34dddf55670cc1cc921b4
SHA256e517f08e645419081c5f2769e2975ddd4eb3764d1db7a73ee701daa4e746812f
SHA51268a4de80a5752075130a3f58c296c31dd21cb778c5169c3c03db9de210a0b39191d88873a99308f46e572977a97293c4e826b89179cbc78dc949e334901d03a2
-
Filesize
291KB
MD524859be290952c35476d31fd07517966
SHA10021e16e73befbdf03638bc587538a0557bb0e63
SHA256abae4b89d6225a0d519651663e0ac56247f56b5eec6ad6a113f562c9f5712498
SHA5126dc893ab3d224961dc4b8586c5de755b390a7e7bb2b3a165e7f8c599bc022cbc33903e81862401002d42c43132ce860162b54e27dbc603217fcbe0e5f45abdc8
-
Filesize
291KB
MD524859be290952c35476d31fd07517966
SHA10021e16e73befbdf03638bc587538a0557bb0e63
SHA256abae4b89d6225a0d519651663e0ac56247f56b5eec6ad6a113f562c9f5712498
SHA5126dc893ab3d224961dc4b8586c5de755b390a7e7bb2b3a165e7f8c599bc022cbc33903e81862401002d42c43132ce860162b54e27dbc603217fcbe0e5f45abdc8
-
Filesize
345KB
MD5412d945ab2eac7d0268bfafbcf06eabe
SHA189b3adc9c147ac8ae54725546d8580ca2efac1da
SHA256de5ec2736cdb5d678d8e2e042aa6bfe16e453ba9e04e8aab73da813cedb2f636
SHA512da904a4e4bd554f5ad697a0f754727869ae1134b76d791fd417d624918185b01aa7177d29f9a9861e5c7cec0893fcf6b5d1acf5ea270e4061a99d39d5342f24a
-
Filesize
345KB
MD5412d945ab2eac7d0268bfafbcf06eabe
SHA189b3adc9c147ac8ae54725546d8580ca2efac1da
SHA256de5ec2736cdb5d678d8e2e042aa6bfe16e453ba9e04e8aab73da813cedb2f636
SHA512da904a4e4bd554f5ad697a0f754727869ae1134b76d791fd417d624918185b01aa7177d29f9a9861e5c7cec0893fcf6b5d1acf5ea270e4061a99d39d5342f24a