Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 06:26
Static task
static1
Behavioral task
behavioral1
Sample
c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe
Resource
win10-20230220-en
General
-
Target
c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe
-
Size
683KB
-
MD5
92e5995bb06e062871f28493f2e2593d
-
SHA1
11f5d154153891251ec32b375ffea626beaa3f85
-
SHA256
c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda
-
SHA512
0dd782aa5238b034cf42dea1f50be782ab391e39710db301248c451fd663f12840903fc82af9dec198e93482af213021f4c6bdf280ff772b20ca347eb1b87816
-
SSDEEP
12288:MMr9y901lkm4iVvouMaBTmk0UNGnqlgDGB4ZWH29niD:JyWbj3BykoigDGy3tE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2883.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2883.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-180-0x00000000049C0000-0x0000000004A06000-memory.dmp family_redline behavioral1/memory/3048-181-0x0000000007650000-0x0000000007694000-memory.dmp family_redline behavioral1/memory/3048-185-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-186-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-189-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-191-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-193-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-195-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-197-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-199-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-201-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-203-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-205-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-207-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-209-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-211-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-213-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-217-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-215-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/3048-219-0x0000000007650000-0x000000000768F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un005245.exepro2883.exequ0384.exesi620442.exepid process 2120 un005245.exe 4248 pro2883.exe 3048 qu0384.exe 4788 si620442.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2883.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2883.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un005245.exec2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un005245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un005245.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2883.exequ0384.exesi620442.exepid process 4248 pro2883.exe 4248 pro2883.exe 3048 qu0384.exe 3048 qu0384.exe 4788 si620442.exe 4788 si620442.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2883.exequ0384.exesi620442.exedescription pid process Token: SeDebugPrivilege 4248 pro2883.exe Token: SeDebugPrivilege 3048 qu0384.exe Token: SeDebugPrivilege 4788 si620442.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exeun005245.exedescription pid process target process PID 5044 wrote to memory of 2120 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe un005245.exe PID 5044 wrote to memory of 2120 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe un005245.exe PID 5044 wrote to memory of 2120 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe un005245.exe PID 2120 wrote to memory of 4248 2120 un005245.exe pro2883.exe PID 2120 wrote to memory of 4248 2120 un005245.exe pro2883.exe PID 2120 wrote to memory of 4248 2120 un005245.exe pro2883.exe PID 2120 wrote to memory of 3048 2120 un005245.exe qu0384.exe PID 2120 wrote to memory of 3048 2120 un005245.exe qu0384.exe PID 2120 wrote to memory of 3048 2120 un005245.exe qu0384.exe PID 5044 wrote to memory of 4788 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe si620442.exe PID 5044 wrote to memory of 4788 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe si620442.exe PID 5044 wrote to memory of 4788 5044 c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe si620442.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe"C:\Users\Admin\AppData\Local\Temp\c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0d1b4ed607b542a4b9089d132b89cc
SHA1f08264fe9ccae9e0df42d05cb79870965b328e6b
SHA2560b6bbf4be2095071c409686fc03b24a23bd25ab2da7cda1e6547aa36babe2a99
SHA5128041165f8d55c33434a2fc7667573585170030ea56203a0e7df3aa683228b90d203c920d6ffbdb75f661efda878953eddfe4de9fc0b17ebd04d0a06b1ac05501
-
Filesize
175KB
MD58b0d1b4ed607b542a4b9089d132b89cc
SHA1f08264fe9ccae9e0df42d05cb79870965b328e6b
SHA2560b6bbf4be2095071c409686fc03b24a23bd25ab2da7cda1e6547aa36babe2a99
SHA5128041165f8d55c33434a2fc7667573585170030ea56203a0e7df3aa683228b90d203c920d6ffbdb75f661efda878953eddfe4de9fc0b17ebd04d0a06b1ac05501
-
Filesize
542KB
MD5fcb0398333b3b4b8b85fe19fd066f129
SHA1bcfed8b4733f560afc9ec2b8bd318cb1d3b7e739
SHA25647ae599c1c416ea12da16926844df0c0ae8f766eeff7bffcfb75d6bab8e3ca7b
SHA512a78d6a6f8b0f2e17b017df068989eb46a43157f7b97c84303196cb281040b3f1d6bfaa5efa0ef6cfdebcc04179b1549d12fe3618a33d6d06b3f83c6f5d2d662f
-
Filesize
542KB
MD5fcb0398333b3b4b8b85fe19fd066f129
SHA1bcfed8b4733f560afc9ec2b8bd318cb1d3b7e739
SHA25647ae599c1c416ea12da16926844df0c0ae8f766eeff7bffcfb75d6bab8e3ca7b
SHA512a78d6a6f8b0f2e17b017df068989eb46a43157f7b97c84303196cb281040b3f1d6bfaa5efa0ef6cfdebcc04179b1549d12fe3618a33d6d06b3f83c6f5d2d662f
-
Filesize
322KB
MD5ee38383874c05df6d9de93e737c2bdde
SHA179d9ca5857a8d30a33d4393efa869ef24fdd5f91
SHA2563175b15815eb08da1ce75a713afefdc6c6dbfbe0a149e10a816c420e88c207a2
SHA512f9ae84b571adfe9194ee6201125cb37eccd6b1c6fd02d4d181f135651982ef2527825bab365cb225e9ca55b4ded4b3eb4b38a4975bb573f3c9a33c72705dacfa
-
Filesize
322KB
MD5ee38383874c05df6d9de93e737c2bdde
SHA179d9ca5857a8d30a33d4393efa869ef24fdd5f91
SHA2563175b15815eb08da1ce75a713afefdc6c6dbfbe0a149e10a816c420e88c207a2
SHA512f9ae84b571adfe9194ee6201125cb37eccd6b1c6fd02d4d181f135651982ef2527825bab365cb225e9ca55b4ded4b3eb4b38a4975bb573f3c9a33c72705dacfa
-
Filesize
379KB
MD5efb99631638e9ce62a73dd7317e9d2b3
SHA18aea7ea1c50d8a8f1577331b1f6aafa917c34bbf
SHA256809f2080e85201d1ea238f588b04b8a67c62d31b73d195e35c551e992b67f68f
SHA5126d5e503cfb33acd55be291a7f2e626698993554a2e8ace1609622246fe106d51513f7d4450948e8445b40833b18ac83b51fbac6b8d6e0902862c5926898b1988
-
Filesize
379KB
MD5efb99631638e9ce62a73dd7317e9d2b3
SHA18aea7ea1c50d8a8f1577331b1f6aafa917c34bbf
SHA256809f2080e85201d1ea238f588b04b8a67c62d31b73d195e35c551e992b67f68f
SHA5126d5e503cfb33acd55be291a7f2e626698993554a2e8ace1609622246fe106d51513f7d4450948e8445b40833b18ac83b51fbac6b8d6e0902862c5926898b1988