Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe
Resource
win10-20230220-en
General
-
Target
07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe
-
Size
689KB
-
MD5
ab59048fb4173d37fd805389f3b781fd
-
SHA1
e95c0cac6d47b4882c4d1c5c7a4f0b75d2902d7f
-
SHA256
07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d
-
SHA512
124ba90f165d97267a154766892cb2be36605910ac3e0d736877df6b3bd29154af97dc1684a18b8bfd5705206b43f41c65b41eb95ad90194ca313d05ec60bd5a
-
SSDEEP
12288:DMroy909QF4EoaGiv29tyV65hLuvK3muSvtRpmcmJWvvFuifigflfRQdNjDqyO:XyPHoajvKkIfavK2uqtRpNmJWVuiagff
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1574.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1574.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4548-178-0x00000000038F0000-0x0000000003936000-memory.dmp family_redline behavioral1/memory/4548-179-0x0000000003970000-0x00000000039B4000-memory.dmp family_redline behavioral1/memory/4548-180-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-181-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-183-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-185-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-187-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-189-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-191-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-193-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-195-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-197-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-199-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-201-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-203-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-205-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-207-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-209-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-211-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/4548-213-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un434573.exepro1574.exequ1738.exesi211544.exepid process 3564 un434573.exe 4296 pro1574.exe 4548 qu1738.exe 3628 si211544.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1574.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1574.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exeun434573.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un434573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un434573.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1574.exequ1738.exesi211544.exepid process 4296 pro1574.exe 4296 pro1574.exe 4548 qu1738.exe 4548 qu1738.exe 3628 si211544.exe 3628 si211544.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1574.exequ1738.exesi211544.exedescription pid process Token: SeDebugPrivilege 4296 pro1574.exe Token: SeDebugPrivilege 4548 qu1738.exe Token: SeDebugPrivilege 3628 si211544.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exeun434573.exedescription pid process target process PID 4156 wrote to memory of 3564 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe un434573.exe PID 4156 wrote to memory of 3564 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe un434573.exe PID 4156 wrote to memory of 3564 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe un434573.exe PID 3564 wrote to memory of 4296 3564 un434573.exe pro1574.exe PID 3564 wrote to memory of 4296 3564 un434573.exe pro1574.exe PID 3564 wrote to memory of 4296 3564 un434573.exe pro1574.exe PID 3564 wrote to memory of 4548 3564 un434573.exe qu1738.exe PID 3564 wrote to memory of 4548 3564 un434573.exe qu1738.exe PID 3564 wrote to memory of 4548 3564 un434573.exe qu1738.exe PID 4156 wrote to memory of 3628 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe si211544.exe PID 4156 wrote to memory of 3628 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe si211544.exe PID 4156 wrote to memory of 3628 4156 07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe si211544.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe"C:\Users\Admin\AppData\Local\Temp\07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD523aa197abe3148af46e59fc49f607074
SHA100e5337f820fc4b4d76a74321309127775c5bcf4
SHA256780e8e8376860d8d7bb0f6976c5b7344617115e4a8473a6635d97cb9728dd6b7
SHA512280be284beadcfba12196afa1b2e02e1f2b173b2a3f6bd2dfead1f350773fa84e4f354eb3c030abd298f32be08ef00e52b0049e840f6e3ab2e34014fe6fdabf8
-
Filesize
175KB
MD523aa197abe3148af46e59fc49f607074
SHA100e5337f820fc4b4d76a74321309127775c5bcf4
SHA256780e8e8376860d8d7bb0f6976c5b7344617115e4a8473a6635d97cb9728dd6b7
SHA512280be284beadcfba12196afa1b2e02e1f2b173b2a3f6bd2dfead1f350773fa84e4f354eb3c030abd298f32be08ef00e52b0049e840f6e3ab2e34014fe6fdabf8
-
Filesize
547KB
MD523b50a383c2a974244074c1175079e74
SHA1a3e52600fe0706a20696ece04748be68f2f323af
SHA25690b46f0d64cd09895fd4899f9ac5db430f27d7db02aec0e43027a2fef477f383
SHA5124a6445cca9823dff32f22012ec5d847a9fb6bf150e9e3f066ee346b689f6fd4eeef81f587d96af4702543c80e5c90e129f72d24b8d4e36ab9b470746bd80ee01
-
Filesize
547KB
MD523b50a383c2a974244074c1175079e74
SHA1a3e52600fe0706a20696ece04748be68f2f323af
SHA25690b46f0d64cd09895fd4899f9ac5db430f27d7db02aec0e43027a2fef477f383
SHA5124a6445cca9823dff32f22012ec5d847a9fb6bf150e9e3f066ee346b689f6fd4eeef81f587d96af4702543c80e5c90e129f72d24b8d4e36ab9b470746bd80ee01
-
Filesize
291KB
MD5cb8d6b0125adaacbe9cdddb46866fe2e
SHA13204e403ff5f098b58e58cbef5a4f73557ee775e
SHA2562fb8f124e644e65b2047159a9eb754db9269c065251cea714ebc7b10cd1cb601
SHA512c24386531e1eb3c40d8f7ee5095202ebc3d7a98cd3603e85e2f45aea486907b4c6b694c134f39e442a2773a5311f7dfa54157089d8e3b8a554887d0150c9e0f3
-
Filesize
291KB
MD5cb8d6b0125adaacbe9cdddb46866fe2e
SHA13204e403ff5f098b58e58cbef5a4f73557ee775e
SHA2562fb8f124e644e65b2047159a9eb754db9269c065251cea714ebc7b10cd1cb601
SHA512c24386531e1eb3c40d8f7ee5095202ebc3d7a98cd3603e85e2f45aea486907b4c6b694c134f39e442a2773a5311f7dfa54157089d8e3b8a554887d0150c9e0f3
-
Filesize
345KB
MD5618e6c05ccd66199be45891f71acfc9b
SHA10d70c36bf97b021c3a74c7b8ce4b3e540e7c641b
SHA256fa85b604a24839fe72cb0e0ae02715b99c54932e2f24949c044f21af60bf848d
SHA512c56cd6f99226fd362979a146e7ef34a1c6d96f6ee5c26e81c356d4534a9e5cc2bb968d90fc9f89beb0f84069d78ee6c44db03131c137df9d90556cbf3cfab452
-
Filesize
345KB
MD5618e6c05ccd66199be45891f71acfc9b
SHA10d70c36bf97b021c3a74c7b8ce4b3e540e7c641b
SHA256fa85b604a24839fe72cb0e0ae02715b99c54932e2f24949c044f21af60bf848d
SHA512c56cd6f99226fd362979a146e7ef34a1c6d96f6ee5c26e81c356d4534a9e5cc2bb968d90fc9f89beb0f84069d78ee6c44db03131c137df9d90556cbf3cfab452