Analysis
-
max time kernel
54s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 04:15
Static task
static1
Behavioral task
behavioral1
Sample
db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe
Resource
win10-20230220-en
General
-
Target
db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe
-
Size
689KB
-
MD5
cfd5d43d2d6289e4810c78d626c5346c
-
SHA1
e08ebce2c880a0e32408e79f7f776635223b96fa
-
SHA256
db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191
-
SHA512
9ce56fe663c2040e4a23e494352cb0525f9ce2def1a02abfd43d755fb10fab902c63ea230d1b6c2c8b97f0bd88f5880b75183782655d0a30d174e0a3dda940a7
-
SSDEEP
12288:fMrIy90KwPOdKe0XVv6yC65hLuVBK3ruSB/XhmJ8v3F/bfig8Wz5z7CZhj5F:PyESPSV/RfazK7uoPhmJ8N/bag8G5yZh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2011.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2011.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/3544-181-0x0000000003610000-0x0000000003656000-memory.dmp family_redline behavioral1/memory/3544-182-0x00000000037A0000-0x00000000037E4000-memory.dmp family_redline behavioral1/memory/3544-183-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-186-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-184-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-188-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-190-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-192-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-194-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-196-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-198-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-200-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-202-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-204-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-206-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-208-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-210-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-212-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-214-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-216-0x00000000037A0000-0x00000000037DF000-memory.dmp family_redline behavioral1/memory/3544-221-0x00000000062D0000-0x00000000062E0000-memory.dmp family_redline behavioral1/memory/3544-224-0x00000000062D0000-0x00000000062E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un621751.exepro2011.exequ9067.exesi949045.exepid process 5060 un621751.exe 356 pro2011.exe 3544 qu9067.exe 3720 si949045.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2011.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2011.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exeun621751.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un621751.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un621751.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2011.exequ9067.exesi949045.exepid process 356 pro2011.exe 356 pro2011.exe 3544 qu9067.exe 3544 qu9067.exe 3720 si949045.exe 3720 si949045.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2011.exequ9067.exesi949045.exedescription pid process Token: SeDebugPrivilege 356 pro2011.exe Token: SeDebugPrivilege 3544 qu9067.exe Token: SeDebugPrivilege 3720 si949045.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exeun621751.exedescription pid process target process PID 1616 wrote to memory of 5060 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe un621751.exe PID 1616 wrote to memory of 5060 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe un621751.exe PID 1616 wrote to memory of 5060 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe un621751.exe PID 5060 wrote to memory of 356 5060 un621751.exe pro2011.exe PID 5060 wrote to memory of 356 5060 un621751.exe pro2011.exe PID 5060 wrote to memory of 356 5060 un621751.exe pro2011.exe PID 5060 wrote to memory of 3544 5060 un621751.exe qu9067.exe PID 5060 wrote to memory of 3544 5060 un621751.exe qu9067.exe PID 5060 wrote to memory of 3544 5060 un621751.exe qu9067.exe PID 1616 wrote to memory of 3720 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe si949045.exe PID 1616 wrote to memory of 3720 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe si949045.exe PID 1616 wrote to memory of 3720 1616 db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe si949045.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe"C:\Users\Admin\AppData\Local\Temp\db65837b7e21c329ae2c245525f93f20eb0bce9bb5767b99f065e9331bc00191.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621751.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2011.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9067.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949045.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52430448385e80c7bd6f3a4c836d56589
SHA143eef6cf6d0dcf12e6f978924d86752cdf7ecf59
SHA2564bef2056486e62f775cf2f868aca3c764bc851d7ab3d009ba28fd808e10629e2
SHA5129f7f6dd75c2a0e18ef8f0ad1ae88a0ec2b1103bd075ea0c70425f2ae5197d45fbf2d21416bd7a4cc36f4c7553ab363d4e10d3246ef6564fd0bf6abbc811c7ec3
-
Filesize
175KB
MD52430448385e80c7bd6f3a4c836d56589
SHA143eef6cf6d0dcf12e6f978924d86752cdf7ecf59
SHA2564bef2056486e62f775cf2f868aca3c764bc851d7ab3d009ba28fd808e10629e2
SHA5129f7f6dd75c2a0e18ef8f0ad1ae88a0ec2b1103bd075ea0c70425f2ae5197d45fbf2d21416bd7a4cc36f4c7553ab363d4e10d3246ef6564fd0bf6abbc811c7ec3
-
Filesize
547KB
MD5cfa4dff2279ee6195932daf88de776af
SHA1ad71d153b6cb9894a66a5f6a7063bc81e500ed8f
SHA2563d8e1c580d2e9a0af09b31a7534c6ca91681c0ba764996a53a7512a5ae4d4754
SHA512a34c53cb9e5f1b1502eac3e2fc48a28dca4ca9a63d5cf4d64f945d6d0e3b57b89f3fa8242be7004837b183d6b5fc9d2aeaef909a2f8478b08e285cf52dd8f0d0
-
Filesize
547KB
MD5cfa4dff2279ee6195932daf88de776af
SHA1ad71d153b6cb9894a66a5f6a7063bc81e500ed8f
SHA2563d8e1c580d2e9a0af09b31a7534c6ca91681c0ba764996a53a7512a5ae4d4754
SHA512a34c53cb9e5f1b1502eac3e2fc48a28dca4ca9a63d5cf4d64f945d6d0e3b57b89f3fa8242be7004837b183d6b5fc9d2aeaef909a2f8478b08e285cf52dd8f0d0
-
Filesize
291KB
MD5bf5a3e483bd8df14a6a717533475ed83
SHA1a301217540082e9733da99de8bab11df6b92af17
SHA2569722177d90ddf995a0390e2c5e57b2bc2269a139b7e3065b43ad56bb42c1f3f1
SHA512776739961c8b510aa2a9a78b07d6700754c6d3e77450c7bfb913e40740fda5c02f5c30ad395cbd7be2ff2a54750e3f38a41e3a11af06e73d729d89b36e82d98a
-
Filesize
291KB
MD5bf5a3e483bd8df14a6a717533475ed83
SHA1a301217540082e9733da99de8bab11df6b92af17
SHA2569722177d90ddf995a0390e2c5e57b2bc2269a139b7e3065b43ad56bb42c1f3f1
SHA512776739961c8b510aa2a9a78b07d6700754c6d3e77450c7bfb913e40740fda5c02f5c30ad395cbd7be2ff2a54750e3f38a41e3a11af06e73d729d89b36e82d98a
-
Filesize
345KB
MD5791d13ff3990f628b9a46951d4c1390d
SHA1b6bb720e4dec7b2972b0b43058a4a3fabee8815d
SHA2562277d5b483a093a438d3f68f9a6c05ffc733da921fd6ff56bdf8f8d5cc694bef
SHA512fd60d254bbeeaa5edc400807de43578fd8331fcbb51a78d70e4cb43def6fd83d85a000cc0d9038f7444bee0e01238b04455a9bb9040c1bf9742fe26d815c137b
-
Filesize
345KB
MD5791d13ff3990f628b9a46951d4c1390d
SHA1b6bb720e4dec7b2972b0b43058a4a3fabee8815d
SHA2562277d5b483a093a438d3f68f9a6c05ffc733da921fd6ff56bdf8f8d5cc694bef
SHA512fd60d254bbeeaa5edc400807de43578fd8331fcbb51a78d70e4cb43def6fd83d85a000cc0d9038f7444bee0e01238b04455a9bb9040c1bf9742fe26d815c137b