Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 04:04
Static task
static1
Behavioral task
behavioral1
Sample
db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe
Resource
win10-20230220-en
General
-
Target
db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe
-
Size
690KB
-
MD5
debb5c08af9a7d0debcac4a7c9e9f9ae
-
SHA1
1ac93686603cb2955c849903b7523bffb62099dd
-
SHA256
db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854
-
SHA512
7ff9ff6ba984809d0f9cab98a64555aeb485cd6156aba7e9433bbfbc470b22b1cb1718ed456a1b24c20a3a0965c905202423fc10e546f17ce5fd86fa42fa0a55
-
SSDEEP
12288:oMray90WylFne3zMW7X6VeyP65hLuj+hJjNvl5cXmevQF4Efig0zk2AFcj:yySeQE6dCfajGR95cWeI4EagkkI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5401.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2092-179-0x00000000038A0000-0x00000000038E6000-memory.dmp family_redline behavioral1/memory/2092-180-0x0000000003970000-0x00000000039B4000-memory.dmp family_redline behavioral1/memory/2092-185-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-186-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-188-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-190-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-192-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-194-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-196-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-198-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-200-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-202-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-204-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-206-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-208-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-210-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-212-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-214-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-216-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/2092-218-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un422743.exepro5401.exequ6636.exesi183017.exepid process 1116 un422743.exe 1340 pro5401.exe 2092 qu6636.exe 3048 si183017.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5401.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5401.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exeun422743.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un422743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un422743.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5401.exequ6636.exesi183017.exepid process 1340 pro5401.exe 1340 pro5401.exe 2092 qu6636.exe 2092 qu6636.exe 3048 si183017.exe 3048 si183017.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5401.exequ6636.exesi183017.exedescription pid process Token: SeDebugPrivilege 1340 pro5401.exe Token: SeDebugPrivilege 2092 qu6636.exe Token: SeDebugPrivilege 3048 si183017.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exeun422743.exedescription pid process target process PID 1012 wrote to memory of 1116 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe un422743.exe PID 1012 wrote to memory of 1116 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe un422743.exe PID 1012 wrote to memory of 1116 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe un422743.exe PID 1116 wrote to memory of 1340 1116 un422743.exe pro5401.exe PID 1116 wrote to memory of 1340 1116 un422743.exe pro5401.exe PID 1116 wrote to memory of 1340 1116 un422743.exe pro5401.exe PID 1116 wrote to memory of 2092 1116 un422743.exe qu6636.exe PID 1116 wrote to memory of 2092 1116 un422743.exe qu6636.exe PID 1116 wrote to memory of 2092 1116 un422743.exe qu6636.exe PID 1012 wrote to memory of 3048 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe si183017.exe PID 1012 wrote to memory of 3048 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe si183017.exe PID 1012 wrote to memory of 3048 1012 db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe si183017.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe"C:\Users\Admin\AppData\Local\Temp\db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD531494ba44659677a725ff898039e484c
SHA108b2790e12ce9f0ff5f503870cb0fd9d4d472d4e
SHA2563065cfd1b166f6baceeb42224b8767df119b3e5a61c5048bbee60c2f5e833850
SHA5126afc568d61dae67bd576d7812463eba80559acc6224db0b323da2c0625d51a1be5a8e42345e13035a626574023348ebc9ac5d00f7b4d9adb4123bd8c5d036998
-
Filesize
175KB
MD531494ba44659677a725ff898039e484c
SHA108b2790e12ce9f0ff5f503870cb0fd9d4d472d4e
SHA2563065cfd1b166f6baceeb42224b8767df119b3e5a61c5048bbee60c2f5e833850
SHA5126afc568d61dae67bd576d7812463eba80559acc6224db0b323da2c0625d51a1be5a8e42345e13035a626574023348ebc9ac5d00f7b4d9adb4123bd8c5d036998
-
Filesize
548KB
MD5e0a5bb5cd78e82417364100a63627726
SHA17e15ed46ca49a310c1af18429819177cf9a1cada
SHA2561aef4fc34cd40fea5547ad98ffb17dea2c29f4bd0c4036550b0d4d5d9bbf1545
SHA512a96d4183f8c578945b0308f54c696a92753d54adeee1c7f450b924f54896b53ebe8473d9fe6a171eb26540d94e4fde8a013c1671fc31d81fa8dd5dc63cd0ff63
-
Filesize
548KB
MD5e0a5bb5cd78e82417364100a63627726
SHA17e15ed46ca49a310c1af18429819177cf9a1cada
SHA2561aef4fc34cd40fea5547ad98ffb17dea2c29f4bd0c4036550b0d4d5d9bbf1545
SHA512a96d4183f8c578945b0308f54c696a92753d54adeee1c7f450b924f54896b53ebe8473d9fe6a171eb26540d94e4fde8a013c1671fc31d81fa8dd5dc63cd0ff63
-
Filesize
291KB
MD5e23e7a4272470b86552e35843de0ee4c
SHA1956a9102c883fdb0d5442df193362794d0b31ae4
SHA2562dfa9453ae096836a408771c7fd6c3242581e521fbbbbb685dd7bf02ced5fa86
SHA51248f108328d1b72ca3f003d182cc71fa8ed791e3cb7fe05f3eab881925cc3bb7677c3c039021968ee20d8efb61d1705d51f945a89c8c1169740421ce5ff74f041
-
Filesize
291KB
MD5e23e7a4272470b86552e35843de0ee4c
SHA1956a9102c883fdb0d5442df193362794d0b31ae4
SHA2562dfa9453ae096836a408771c7fd6c3242581e521fbbbbb685dd7bf02ced5fa86
SHA51248f108328d1b72ca3f003d182cc71fa8ed791e3cb7fe05f3eab881925cc3bb7677c3c039021968ee20d8efb61d1705d51f945a89c8c1169740421ce5ff74f041
-
Filesize
345KB
MD5dcc3d40315338b7694b686c154fa96b6
SHA11d2ba1c41e5f433e15372878e8bd90ff893a1847
SHA256d4070ba47124228944b823827a39cd821b480fe06fd4a8860f8bd48320cde14a
SHA512975637d12d8ade7131f5624858bb09e0616f375ea7a1a1eb9d80aa2b4f5c586da38ee21c45dcd2a72873b622bf8afa4607c2f038f428d9529cd6a133482c6027
-
Filesize
345KB
MD5dcc3d40315338b7694b686c154fa96b6
SHA11d2ba1c41e5f433e15372878e8bd90ff893a1847
SHA256d4070ba47124228944b823827a39cd821b480fe06fd4a8860f8bd48320cde14a
SHA512975637d12d8ade7131f5624858bb09e0616f375ea7a1a1eb9d80aa2b4f5c586da38ee21c45dcd2a72873b622bf8afa4607c2f038f428d9529cd6a133482c6027