Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 05:31
Static task
static1
Behavioral task
behavioral1
Sample
9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe
Resource
win10-20230220-en
General
-
Target
9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe
-
Size
689KB
-
MD5
25e014b563258ffe04660d6d35cdc20b
-
SHA1
06c8645472983ae6ea54169e47e1241b8e025cf3
-
SHA256
9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af
-
SHA512
44159ce0847c66eb1ea5094e79fc9cb73331737fc923535cfdd5d4da987bd7b2055578dea8035fabe5ed165ff86a2855fa4d23c9e1cfadfeb2401dee1d73f2a7
-
SSDEEP
12288:CMr8y904Bz+CgYkNnMzyG1YDZH9Nyw65hLumrTTwDoay9Hzz3pHmJgvqFI7figlm:SyrByCgYGHGKEPfam4y9RmJgWI7aglBE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1885.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1885.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3932-179-0x0000000003790000-0x00000000037D6000-memory.dmp family_redline behavioral1/memory/3932-180-0x0000000003A80000-0x0000000003AC4000-memory.dmp family_redline behavioral1/memory/3932-181-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-182-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-184-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-186-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-188-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-190-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-192-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-194-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-196-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-198-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-200-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-202-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-204-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-206-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-208-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-210-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-214-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-218-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3932-1100-0x0000000006070000-0x0000000006080000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un565342.exepro1885.exequ8325.exesi557998.exepid process 2328 un565342.exe 2572 pro1885.exe 3932 qu8325.exe 3552 si557998.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1885.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1885.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exeun565342.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un565342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un565342.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1885.exequ8325.exesi557998.exepid process 2572 pro1885.exe 2572 pro1885.exe 3932 qu8325.exe 3932 qu8325.exe 3552 si557998.exe 3552 si557998.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1885.exequ8325.exesi557998.exedescription pid process Token: SeDebugPrivilege 2572 pro1885.exe Token: SeDebugPrivilege 3932 qu8325.exe Token: SeDebugPrivilege 3552 si557998.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exeun565342.exedescription pid process target process PID 2076 wrote to memory of 2328 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe un565342.exe PID 2076 wrote to memory of 2328 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe un565342.exe PID 2076 wrote to memory of 2328 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe un565342.exe PID 2328 wrote to memory of 2572 2328 un565342.exe pro1885.exe PID 2328 wrote to memory of 2572 2328 un565342.exe pro1885.exe PID 2328 wrote to memory of 2572 2328 un565342.exe pro1885.exe PID 2328 wrote to memory of 3932 2328 un565342.exe qu8325.exe PID 2328 wrote to memory of 3932 2328 un565342.exe qu8325.exe PID 2328 wrote to memory of 3932 2328 un565342.exe qu8325.exe PID 2076 wrote to memory of 3552 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe si557998.exe PID 2076 wrote to memory of 3552 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe si557998.exe PID 2076 wrote to memory of 3552 2076 9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe si557998.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe"C:\Users\Admin\AppData\Local\Temp\9fc3e40dd03947cb37635927e9e17e01f6106d41bba92c4216c088f0050902af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un565342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un565342.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1885.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8325.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8325.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557998.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5844d4c73195897dc967ad96b5f2418f4
SHA17b6884843f5aa40c3b38509d9edf4674d215c87a
SHA256995c26cfd2dc2dd495e8552b885ccd4dcde06da346d2b23806e5e598de4fe574
SHA512084c49b66747325fbe0c515ee190767810e5320c4723b999d58a43a85a4fb37e52a17d53b85e81eb9025972326dab5b6d51226c731517a37b2243662a83034c7
-
Filesize
175KB
MD5844d4c73195897dc967ad96b5f2418f4
SHA17b6884843f5aa40c3b38509d9edf4674d215c87a
SHA256995c26cfd2dc2dd495e8552b885ccd4dcde06da346d2b23806e5e598de4fe574
SHA512084c49b66747325fbe0c515ee190767810e5320c4723b999d58a43a85a4fb37e52a17d53b85e81eb9025972326dab5b6d51226c731517a37b2243662a83034c7
-
Filesize
547KB
MD575dbc5ec2ec27b808d43569815b601c3
SHA1e7b1f55f7df41514eb41d014cd69da7913a41264
SHA2564bcd2fb27c47434946882e5403bb5010e0fa7fa5024528f139128f145e556311
SHA5122c47679e9d56d221a8bc4a8f2795593c5ad004d176e0ecb81685b536e8231b8aecb9216d8d23735b4c0397964cf560a1fd2d46fcc90a7bb60e9a048a996716dd
-
Filesize
547KB
MD575dbc5ec2ec27b808d43569815b601c3
SHA1e7b1f55f7df41514eb41d014cd69da7913a41264
SHA2564bcd2fb27c47434946882e5403bb5010e0fa7fa5024528f139128f145e556311
SHA5122c47679e9d56d221a8bc4a8f2795593c5ad004d176e0ecb81685b536e8231b8aecb9216d8d23735b4c0397964cf560a1fd2d46fcc90a7bb60e9a048a996716dd
-
Filesize
291KB
MD59c35c5e553cf7b14cb5e5feb113abe07
SHA1896cdcff57c16fd4bb461be96c551561696f568c
SHA2567ef656a6c7bed065dec63b1b55d9bcf8874d39aaac03c94e1b405ad69a8a982a
SHA5120d4b91420529027d12d84fda13f16981b7a2ce122a8f176b783051c4ee44c4ff3ead6967b2f9331481369c3482a5386759d403ef6a3ab03736c93c34afee0abf
-
Filesize
291KB
MD59c35c5e553cf7b14cb5e5feb113abe07
SHA1896cdcff57c16fd4bb461be96c551561696f568c
SHA2567ef656a6c7bed065dec63b1b55d9bcf8874d39aaac03c94e1b405ad69a8a982a
SHA5120d4b91420529027d12d84fda13f16981b7a2ce122a8f176b783051c4ee44c4ff3ead6967b2f9331481369c3482a5386759d403ef6a3ab03736c93c34afee0abf
-
Filesize
345KB
MD5a4953508f28a384d9b43c66d1b982a9f
SHA136cdb25bd7ca0215358de2551bc914234cbf70b4
SHA256f02e08e93ae80339d0e62061736787985bd9114d814084614413b554c74e4023
SHA5121bfce901957457c92d918cf4e28535e76a68aecdecff22c468d9bcb5bf3a79d79a5b6d0b8d69251c99159486aeb77c70fcdcb11d93fb3c8601d4ab4a242318d7
-
Filesize
345KB
MD5a4953508f28a384d9b43c66d1b982a9f
SHA136cdb25bd7ca0215358de2551bc914234cbf70b4
SHA256f02e08e93ae80339d0e62061736787985bd9114d814084614413b554c74e4023
SHA5121bfce901957457c92d918cf4e28535e76a68aecdecff22c468d9bcb5bf3a79d79a5b6d0b8d69251c99159486aeb77c70fcdcb11d93fb3c8601d4ab4a242318d7