Analysis
-
max time kernel
52s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 07:06
Static task
static1
Behavioral task
behavioral1
Sample
1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe
Resource
win10-20230220-en
General
-
Target
1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe
-
Size
682KB
-
MD5
c8b443b09ed0e5727d8051a863e7b914
-
SHA1
cec11f017828fa8ea75682482aec7906db1358e7
-
SHA256
1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c
-
SHA512
4f3235e37a98d5ba12fb83f9acac1e3d11c1a94ae116587bd2c934514b9c97618cf88b836a69dc59acf89c83162eb7dd7c339547b0ee68b8513393e2250f46a3
-
SSDEEP
12288:uMrwy90arFnuiiTSdE9d7/0HN/KzuHvBxY47WRIVA8yWK387:CyFrAT4ED7/UbvBx7/VlyW7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3167.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3167.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4316-179-0x00000000046B0000-0x00000000046F6000-memory.dmp family_redline behavioral1/memory/4316-180-0x00000000048E0000-0x0000000004924000-memory.dmp family_redline behavioral1/memory/4316-181-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-182-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-184-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-186-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-188-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-190-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-192-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-194-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-196-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-198-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-202-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-200-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-205-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-208-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-212-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-214-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-216-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline behavioral1/memory/4316-218-0x00000000048E0000-0x000000000491F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un294623.exepro3167.exequ4114.exesi742088.exepid process 4156 un294623.exe 996 pro3167.exe 4316 qu4114.exe 4032 si742088.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3167.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3167.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un294623.exe1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un294623.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un294623.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3167.exequ4114.exesi742088.exepid process 996 pro3167.exe 996 pro3167.exe 4316 qu4114.exe 4316 qu4114.exe 4032 si742088.exe 4032 si742088.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3167.exequ4114.exesi742088.exedescription pid process Token: SeDebugPrivilege 996 pro3167.exe Token: SeDebugPrivilege 4316 qu4114.exe Token: SeDebugPrivilege 4032 si742088.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exeun294623.exedescription pid process target process PID 4212 wrote to memory of 4156 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe un294623.exe PID 4212 wrote to memory of 4156 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe un294623.exe PID 4212 wrote to memory of 4156 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe un294623.exe PID 4156 wrote to memory of 996 4156 un294623.exe pro3167.exe PID 4156 wrote to memory of 996 4156 un294623.exe pro3167.exe PID 4156 wrote to memory of 996 4156 un294623.exe pro3167.exe PID 4156 wrote to memory of 4316 4156 un294623.exe qu4114.exe PID 4156 wrote to memory of 4316 4156 un294623.exe qu4114.exe PID 4156 wrote to memory of 4316 4156 un294623.exe qu4114.exe PID 4212 wrote to memory of 4032 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe si742088.exe PID 4212 wrote to memory of 4032 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe si742088.exe PID 4212 wrote to memory of 4032 4212 1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe si742088.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe"C:\Users\Admin\AppData\Local\Temp\1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50315a136187835fb0c8c5363d4193fbf
SHA1ecf186e36f3d44e51b12bfd5f5019ca91be05dc4
SHA2566dd89fac7e358bf1034074dbab8df7d7e500dae4df0f1f8b4d4a8021a74acc5d
SHA512524a74622cb1a48b9bc2aa711b7cc24cd3603989a9e058aa787534c6fe9e3a33fad7d1fc6d67acbabf29c24e499834ad252cb17fe16f6f5ac7efe4a9e8974183
-
Filesize
175KB
MD50315a136187835fb0c8c5363d4193fbf
SHA1ecf186e36f3d44e51b12bfd5f5019ca91be05dc4
SHA2566dd89fac7e358bf1034074dbab8df7d7e500dae4df0f1f8b4d4a8021a74acc5d
SHA512524a74622cb1a48b9bc2aa711b7cc24cd3603989a9e058aa787534c6fe9e3a33fad7d1fc6d67acbabf29c24e499834ad252cb17fe16f6f5ac7efe4a9e8974183
-
Filesize
541KB
MD5dfa8cf1244b469f45c4614dfe5c69d72
SHA15b8754ce029590bc1b9d1a9dec4100a276f85d59
SHA2564ca3fccb3c93e20bab76c36382117964108da65f6049863a2ef13453fc0909de
SHA51234abc00eea2de2bc9145d7e11697d60c4d7f33596dda52cd60903701fc466397d6996a1ba1622d15ba90abdec044a6397b4b3651e9a93326f46f878130863d64
-
Filesize
541KB
MD5dfa8cf1244b469f45c4614dfe5c69d72
SHA15b8754ce029590bc1b9d1a9dec4100a276f85d59
SHA2564ca3fccb3c93e20bab76c36382117964108da65f6049863a2ef13453fc0909de
SHA51234abc00eea2de2bc9145d7e11697d60c4d7f33596dda52cd60903701fc466397d6996a1ba1622d15ba90abdec044a6397b4b3651e9a93326f46f878130863d64
-
Filesize
322KB
MD5b92c371df33c5023a12b913a225879eb
SHA177999c8fdee85b6ea0e22dde98170e94bdb810c3
SHA2561032346a0a22f4c90cc2d84466d9d9b6971065a4dcd7518063700209e8bb9533
SHA512f95d3cf0a251dce0123881f2baf04f12aad7424f8204d07302c3aa40b766688b62572ed6d281b9653625dfeb94d1a1f5fa445746d60d6519e28802143dc72159
-
Filesize
322KB
MD5b92c371df33c5023a12b913a225879eb
SHA177999c8fdee85b6ea0e22dde98170e94bdb810c3
SHA2561032346a0a22f4c90cc2d84466d9d9b6971065a4dcd7518063700209e8bb9533
SHA512f95d3cf0a251dce0123881f2baf04f12aad7424f8204d07302c3aa40b766688b62572ed6d281b9653625dfeb94d1a1f5fa445746d60d6519e28802143dc72159
-
Filesize
379KB
MD5ea9697cd06acaccfb906d074e337bd3a
SHA1294ec36a8d8f34159d3fe0efd405e7516e648db8
SHA256c6bef242ee68f5f36bdcb5d5bc25abb7d7626e7a0de01cc4e47a01012b9322d6
SHA5128748649f4ab7aaae017dc417f6ff86579940f79a7385f3e4f8ae556f67589610de71c1b40bb4a1702ff2cab5e832d67d98b9e9f43a36231a0b10e0aac179aaa8
-
Filesize
379KB
MD5ea9697cd06acaccfb906d074e337bd3a
SHA1294ec36a8d8f34159d3fe0efd405e7516e648db8
SHA256c6bef242ee68f5f36bdcb5d5bc25abb7d7626e7a0de01cc4e47a01012b9322d6
SHA5128748649f4ab7aaae017dc417f6ff86579940f79a7385f3e4f8ae556f67589610de71c1b40bb4a1702ff2cab5e832d67d98b9e9f43a36231a0b10e0aac179aaa8