Analysis
-
max time kernel
53s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 05:55
Static task
static1
Behavioral task
behavioral1
Sample
d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe
Resource
win10-20230220-en
General
-
Target
d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe
-
Size
683KB
-
MD5
e9bcb1eb4b38b5080ce705bd63d352f2
-
SHA1
b075b6572b48ca815e95817cca734147edf969ad
-
SHA256
d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352
-
SHA512
db976040ffefd88c22397a01a1216cbeba1b3cea6eb9b4c00cf9db8b067c585e7541da2d3fbe5cb0535a2a6c00307a980b5f81cea98e3a4a97d0a793479fe8a5
-
SSDEEP
12288:rMrwy90fJhaKk/e2BlNH+nvB+C53YjF06NJsOpR3jQoi4iWtAA1MJil:7ybKkGob+vsC50BzR3so1kA+JY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2738.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-181-0x00000000048B0000-0x00000000048F6000-memory.dmp family_redline behavioral1/memory/1348-182-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/1348-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-184-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-186-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-190-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-188-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1348-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un156792.exepro2738.exequ5588.exesi218774.exepid process 4956 un156792.exe 4284 pro2738.exe 1348 qu5588.exe 2128 si218774.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2738.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2738.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exeun156792.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un156792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un156792.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2738.exequ5588.exesi218774.exepid process 4284 pro2738.exe 4284 pro2738.exe 1348 qu5588.exe 1348 qu5588.exe 2128 si218774.exe 2128 si218774.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2738.exequ5588.exesi218774.exedescription pid process Token: SeDebugPrivilege 4284 pro2738.exe Token: SeDebugPrivilege 1348 qu5588.exe Token: SeDebugPrivilege 2128 si218774.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exeun156792.exedescription pid process target process PID 1736 wrote to memory of 4956 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe un156792.exe PID 1736 wrote to memory of 4956 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe un156792.exe PID 1736 wrote to memory of 4956 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe un156792.exe PID 4956 wrote to memory of 4284 4956 un156792.exe pro2738.exe PID 4956 wrote to memory of 4284 4956 un156792.exe pro2738.exe PID 4956 wrote to memory of 4284 4956 un156792.exe pro2738.exe PID 4956 wrote to memory of 1348 4956 un156792.exe qu5588.exe PID 4956 wrote to memory of 1348 4956 un156792.exe qu5588.exe PID 4956 wrote to memory of 1348 4956 un156792.exe qu5588.exe PID 1736 wrote to memory of 2128 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe si218774.exe PID 1736 wrote to memory of 2128 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe si218774.exe PID 1736 wrote to memory of 2128 1736 d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe si218774.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe"C:\Users\Admin\AppData\Local\Temp\d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5569701a3f4eed7663ebd06c99c599a5b
SHA1a2c53ef2cf94f88aef11671e606c634c9b314347
SHA2568ba55b64336a823b6989332e3c5a601fa4da8577932b1ddd61fee8e0ecac1030
SHA5124dc25112df7d1aaf4fb013abf90309210dd759e3c174a0b8d01a22c5c297b9ea9fffe122cd7d9cb7e00dae5e056fe6dc2489d95027fa465bd5a0614ea921be10
-
Filesize
175KB
MD5569701a3f4eed7663ebd06c99c599a5b
SHA1a2c53ef2cf94f88aef11671e606c634c9b314347
SHA2568ba55b64336a823b6989332e3c5a601fa4da8577932b1ddd61fee8e0ecac1030
SHA5124dc25112df7d1aaf4fb013abf90309210dd759e3c174a0b8d01a22c5c297b9ea9fffe122cd7d9cb7e00dae5e056fe6dc2489d95027fa465bd5a0614ea921be10
-
Filesize
541KB
MD55eb960a0b19fbf0d416e1da545b6d846
SHA17859cfec7ec840e3e5a25c8200089962f013cc69
SHA256eb57b0273b06ef3f361a5d180823289d8ac588a55f407b5fb67088e83e5b85aa
SHA512dbae8a50cf477523e286f00a9199aed7551f0dbff148cada19e363b3176da3863a71e9b6acb4a610993c22dbc840086ae9ca55c82168c62c7107d1c6d508c41f
-
Filesize
541KB
MD55eb960a0b19fbf0d416e1da545b6d846
SHA17859cfec7ec840e3e5a25c8200089962f013cc69
SHA256eb57b0273b06ef3f361a5d180823289d8ac588a55f407b5fb67088e83e5b85aa
SHA512dbae8a50cf477523e286f00a9199aed7551f0dbff148cada19e363b3176da3863a71e9b6acb4a610993c22dbc840086ae9ca55c82168c62c7107d1c6d508c41f
-
Filesize
322KB
MD50bec7643890048e452e4f7f0b0763103
SHA1053a2000ca502f2b3717644bbaadc7da09953df3
SHA2561c31aa33727cbe83acbb0d6409fdf4010420251d871f2498ddf902d94e86e46b
SHA512b940f05e2dacea9fb629f0af3f17f0789217f0117d814de368c32893455ee80e298d64e64a0d97524354c855a78fb608c241a0f4aa6c781ed2b331a85defd286
-
Filesize
322KB
MD50bec7643890048e452e4f7f0b0763103
SHA1053a2000ca502f2b3717644bbaadc7da09953df3
SHA2561c31aa33727cbe83acbb0d6409fdf4010420251d871f2498ddf902d94e86e46b
SHA512b940f05e2dacea9fb629f0af3f17f0789217f0117d814de368c32893455ee80e298d64e64a0d97524354c855a78fb608c241a0f4aa6c781ed2b331a85defd286
-
Filesize
379KB
MD5f25366aa51217dd5ebc6ee4e819e6522
SHA1c326260e96006730d8c261579bb144c8c3d633c0
SHA256da9aed056964b66362cc2fdd939e42f60f12819eef583da4114b069ab2d114fa
SHA51214bdf4ad2ea685fdf31b5bd852207021677df89e1f0a70400443fffd94b0d5c777ed53c9e49234192fbd537ea365465e0e174b355b875ed424340d892ba97796
-
Filesize
379KB
MD5f25366aa51217dd5ebc6ee4e819e6522
SHA1c326260e96006730d8c261579bb144c8c3d633c0
SHA256da9aed056964b66362cc2fdd939e42f60f12819eef583da4114b069ab2d114fa
SHA51214bdf4ad2ea685fdf31b5bd852207021677df89e1f0a70400443fffd94b0d5c777ed53c9e49234192fbd537ea365465e0e174b355b875ed424340d892ba97796