Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 04:19
Static task
static1
Behavioral task
behavioral1
Sample
b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe
Resource
win10-20230220-en
General
-
Target
b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe
-
Size
689KB
-
MD5
07ed681afdd63b403a239a9b39415c42
-
SHA1
7c650691c8fc3ebd7b00ba49b98133a65b7f069a
-
SHA256
b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe
-
SHA512
52c7b12e8d5dd3bc8a3a261055d0cc9ccfc9a946403a19831fc2e68411a05f39c72510fc44c1cb6515c6deb3425efbddad5c36fe13b78e88f8d3d694d278cf74
-
SSDEEP
12288:TMrMy90+5kfIk22ok1vg+XkwI+yf65hLuGjDeMSKI3V2ZSL7kmJGvVF/ofig3g9Z:PyNkm2v1C7yfaG3eLZ3V2KkmJGH/oag8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5160.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5160.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4744-177-0x0000000003AA0000-0x0000000003AE6000-memory.dmp family_redline behavioral1/memory/4744-178-0x0000000006520000-0x0000000006564000-memory.dmp family_redline behavioral1/memory/4744-180-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-179-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-182-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-184-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-186-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-188-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-190-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-192-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-194-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-196-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-198-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-200-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-202-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-204-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-206-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-208-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-210-0x0000000006520000-0x000000000655F000-memory.dmp family_redline behavioral1/memory/4744-212-0x0000000006520000-0x000000000655F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un020711.exepro5160.exequ0651.exesi557988.exepid process 712 un020711.exe 4544 pro5160.exe 4744 qu0651.exe 1544 si557988.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5160.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5160.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un020711.exeb1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un020711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un020711.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5160.exequ0651.exesi557988.exepid process 4544 pro5160.exe 4544 pro5160.exe 4744 qu0651.exe 4744 qu0651.exe 1544 si557988.exe 1544 si557988.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5160.exequ0651.exesi557988.exedescription pid process Token: SeDebugPrivilege 4544 pro5160.exe Token: SeDebugPrivilege 4744 qu0651.exe Token: SeDebugPrivilege 1544 si557988.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exeun020711.exedescription pid process target process PID 420 wrote to memory of 712 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe un020711.exe PID 420 wrote to memory of 712 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe un020711.exe PID 420 wrote to memory of 712 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe un020711.exe PID 712 wrote to memory of 4544 712 un020711.exe pro5160.exe PID 712 wrote to memory of 4544 712 un020711.exe pro5160.exe PID 712 wrote to memory of 4544 712 un020711.exe pro5160.exe PID 712 wrote to memory of 4744 712 un020711.exe qu0651.exe PID 712 wrote to memory of 4744 712 un020711.exe qu0651.exe PID 712 wrote to memory of 4744 712 un020711.exe qu0651.exe PID 420 wrote to memory of 1544 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe si557988.exe PID 420 wrote to memory of 1544 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe si557988.exe PID 420 wrote to memory of 1544 420 b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe si557988.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe"C:\Users\Admin\AppData\Local\Temp\b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5250c6cc146a12511d6722781fabfd4d5
SHA137408f4ef5901da14321e5622da7523d8cf2bc70
SHA2564466f018f57d774d4439a46f1123c95c344a28b67556722ce296a963e49756e6
SHA5125fd741e22de984f553f8cf8403f4a9df41893fbe5476698517d809b600738c30eb29fd5df2a425325a18e360529fbcfdc8622e9c2b2f73b3a92bf294c63b38f1
-
Filesize
175KB
MD5250c6cc146a12511d6722781fabfd4d5
SHA137408f4ef5901da14321e5622da7523d8cf2bc70
SHA2564466f018f57d774d4439a46f1123c95c344a28b67556722ce296a963e49756e6
SHA5125fd741e22de984f553f8cf8403f4a9df41893fbe5476698517d809b600738c30eb29fd5df2a425325a18e360529fbcfdc8622e9c2b2f73b3a92bf294c63b38f1
-
Filesize
547KB
MD586c9bc4692fe8857cc0fe6dc383d6bfb
SHA1b740558806975dd598095669369a48c5b01d9645
SHA256ee006a3ec52ae2b79d4ceac9a1412b6ebb36e25467027036e950c5fbddca2ae9
SHA51230d4b662f26c7823b82fabef9b46fb3763a36a3ced0beb4e320528de4c2eb93d92cb33769fc43820f0a250ca0f09b32bfb3cc194d3ebd236e00ba8b7b0c8d712
-
Filesize
547KB
MD586c9bc4692fe8857cc0fe6dc383d6bfb
SHA1b740558806975dd598095669369a48c5b01d9645
SHA256ee006a3ec52ae2b79d4ceac9a1412b6ebb36e25467027036e950c5fbddca2ae9
SHA51230d4b662f26c7823b82fabef9b46fb3763a36a3ced0beb4e320528de4c2eb93d92cb33769fc43820f0a250ca0f09b32bfb3cc194d3ebd236e00ba8b7b0c8d712
-
Filesize
291KB
MD5fed4381093b5849e3bb649d2c86044ec
SHA1c13ed560a57d173afc61d5140c7f569d82b24b38
SHA256aa9570851342dd6f9dfc4babee9cf3b2807f39624cf74028727bd51239acecc4
SHA5126598aa08b458e1b45ac4e732ff4d898161e8e8df6713f087f44c7dd7d36767566b0b42d98624a3ba92f4b39ad109ced4cef637e1a781534b03cfd00052de99d8
-
Filesize
291KB
MD5fed4381093b5849e3bb649d2c86044ec
SHA1c13ed560a57d173afc61d5140c7f569d82b24b38
SHA256aa9570851342dd6f9dfc4babee9cf3b2807f39624cf74028727bd51239acecc4
SHA5126598aa08b458e1b45ac4e732ff4d898161e8e8df6713f087f44c7dd7d36767566b0b42d98624a3ba92f4b39ad109ced4cef637e1a781534b03cfd00052de99d8
-
Filesize
345KB
MD59b4d8a0bed812441f6093431f711637e
SHA1baf49c07a613149a699005cebd9606eaef9e795f
SHA256a5b2b367cf0892e42b1e29f76667fdd77585d8d6530a048dfa666ea0380f9682
SHA51282468fe9f8d9600f7b2b5fe9834f61da47b63bcb392678682678c43130f5fca1b00a7cf1129e940597a5788202c77b72664792b92144885d8c3dd345f58c6f2a
-
Filesize
345KB
MD59b4d8a0bed812441f6093431f711637e
SHA1baf49c07a613149a699005cebd9606eaef9e795f
SHA256a5b2b367cf0892e42b1e29f76667fdd77585d8d6530a048dfa666ea0380f9682
SHA51282468fe9f8d9600f7b2b5fe9834f61da47b63bcb392678682678c43130f5fca1b00a7cf1129e940597a5788202c77b72664792b92144885d8c3dd345f58c6f2a