Analysis
-
max time kernel
50s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 04:11
Static task
static1
Behavioral task
behavioral1
Sample
f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe
Resource
win10-20230220-en
General
-
Target
f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe
-
Size
689KB
-
MD5
bd61d67c5971669b6e43464eaeb56474
-
SHA1
87209a4cc493bff999ae64a6b42d5b2d176ab200
-
SHA256
f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039
-
SHA512
64ea3f620b44cff336c83ed6743f18957cf51c77997af10570018af9bcba38b51999d567627b6edea293e162f73eae073fe138006607be42b6ed7a50560643c0
-
SSDEEP
12288:HMr3y90VW//FbsOucuGWfXnG5hE1Xmon9X+DT4Tcd2PAYmHmJcvVFOffigjacw7g:0yrlsDcSfXGamA+DTyNmHmJcHOfagCU/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0684.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0684.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-181-0x00000000038D0000-0x0000000003916000-memory.dmp family_redline behavioral1/memory/2780-182-0x0000000003950000-0x0000000003994000-memory.dmp family_redline behavioral1/memory/2780-183-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-184-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-186-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-188-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-190-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-192-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-194-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-196-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-198-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-200-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-202-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-204-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-206-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-208-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-210-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-212-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-214-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-216-0x0000000003950000-0x000000000398F000-memory.dmp family_redline behavioral1/memory/2780-1100-0x0000000006160000-0x0000000006170000-memory.dmp family_redline behavioral1/memory/2780-1102-0x0000000006160000-0x0000000006170000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un402622.exepro0684.exequ1965.exesi776663.exepid process 2256 un402622.exe 2516 pro0684.exe 2780 qu1965.exe 1008 si776663.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0684.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0684.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un402622.exef643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un402622.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un402622.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0684.exequ1965.exesi776663.exepid process 2516 pro0684.exe 2516 pro0684.exe 2780 qu1965.exe 2780 qu1965.exe 1008 si776663.exe 1008 si776663.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0684.exequ1965.exesi776663.exedescription pid process Token: SeDebugPrivilege 2516 pro0684.exe Token: SeDebugPrivilege 2780 qu1965.exe Token: SeDebugPrivilege 1008 si776663.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exeun402622.exedescription pid process target process PID 2064 wrote to memory of 2256 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe un402622.exe PID 2064 wrote to memory of 2256 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe un402622.exe PID 2064 wrote to memory of 2256 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe un402622.exe PID 2256 wrote to memory of 2516 2256 un402622.exe pro0684.exe PID 2256 wrote to memory of 2516 2256 un402622.exe pro0684.exe PID 2256 wrote to memory of 2516 2256 un402622.exe pro0684.exe PID 2256 wrote to memory of 2780 2256 un402622.exe qu1965.exe PID 2256 wrote to memory of 2780 2256 un402622.exe qu1965.exe PID 2256 wrote to memory of 2780 2256 un402622.exe qu1965.exe PID 2064 wrote to memory of 1008 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe si776663.exe PID 2064 wrote to memory of 1008 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe si776663.exe PID 2064 wrote to memory of 1008 2064 f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe si776663.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe"C:\Users\Admin\AppData\Local\Temp\f643515a391c136c5e858c6bb06e2abe7b5c35a6321b754e882115bbdccf2039.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402622.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402622.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0684.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1965.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si776663.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si776663.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c7d49bce04aaabea6f55b0dbb94c6476
SHA12ef33d47cc9ee12ca395f16bc4e9dac5260de8ca
SHA2563241901b2500c5b051e8f15ae00ffba786e62b48897757709bb682f4280e78b6
SHA512b3c0a093f8b2bde359456946068ada349bc72d06d1fda814d28c9d2efd5fab28a7aadc10b90f9a87c06f03caf0b6948072982707c84715fde69eb63fd331bc4d
-
Filesize
175KB
MD5c7d49bce04aaabea6f55b0dbb94c6476
SHA12ef33d47cc9ee12ca395f16bc4e9dac5260de8ca
SHA2563241901b2500c5b051e8f15ae00ffba786e62b48897757709bb682f4280e78b6
SHA512b3c0a093f8b2bde359456946068ada349bc72d06d1fda814d28c9d2efd5fab28a7aadc10b90f9a87c06f03caf0b6948072982707c84715fde69eb63fd331bc4d
-
Filesize
547KB
MD5cd9b6c2acb8735a6cc9c14b1278b636e
SHA11e2fd1b3650c6d700056db2a709cc911a1422097
SHA2562e49d8ddbfb97135cefcda73d276b6a843f8920ed74995f325f00a05478e436c
SHA512d3e2156fa22a2103179006c3db7cdf487d1ec783a8f4b6d018df61bbee15e25f7c870e06253496cd95fab6e899853960084180b75ba356ccc56798e112278d9f
-
Filesize
547KB
MD5cd9b6c2acb8735a6cc9c14b1278b636e
SHA11e2fd1b3650c6d700056db2a709cc911a1422097
SHA2562e49d8ddbfb97135cefcda73d276b6a843f8920ed74995f325f00a05478e436c
SHA512d3e2156fa22a2103179006c3db7cdf487d1ec783a8f4b6d018df61bbee15e25f7c870e06253496cd95fab6e899853960084180b75ba356ccc56798e112278d9f
-
Filesize
291KB
MD5a882bbb5088b1e6cff0ce65510e6dbdf
SHA12760a0df597857fff686083bed16fd2b97d100e9
SHA256180bbd56a0349c4a37504d9ad3e61e650b2b250d242f809d927f049d703ecf82
SHA512ec5d78ecdaa22ca8c080d83980bc9f82df88762773449f1baf74686d741444a1c26d190968170281fc41854c8baf8f2e1fff1fa463c4ab02c3ed65ed17da3c00
-
Filesize
291KB
MD5a882bbb5088b1e6cff0ce65510e6dbdf
SHA12760a0df597857fff686083bed16fd2b97d100e9
SHA256180bbd56a0349c4a37504d9ad3e61e650b2b250d242f809d927f049d703ecf82
SHA512ec5d78ecdaa22ca8c080d83980bc9f82df88762773449f1baf74686d741444a1c26d190968170281fc41854c8baf8f2e1fff1fa463c4ab02c3ed65ed17da3c00
-
Filesize
345KB
MD5d70543e0dd581936bb441c5e8a9f42c0
SHA19e71e2eee7ebee67acd798b4e5617f7cc553219c
SHA256f467f8b09afa36d6ec1f0462f585aea8b34c13b805a01c7bc36215d799ff7da8
SHA5121aac3414678ef6298c466bf612b96c9b77cfff0879d4bdfd7da5fe474a8b08ac6dfb0f920b9c25519472e467391c6c9ce1cd56ae745749081d182d08f8948dcb
-
Filesize
345KB
MD5d70543e0dd581936bb441c5e8a9f42c0
SHA19e71e2eee7ebee67acd798b4e5617f7cc553219c
SHA256f467f8b09afa36d6ec1f0462f585aea8b34c13b805a01c7bc36215d799ff7da8
SHA5121aac3414678ef6298c466bf612b96c9b77cfff0879d4bdfd7da5fe474a8b08ac6dfb0f920b9c25519472e467391c6c9ce1cd56ae745749081d182d08f8948dcb