Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 08:01
Static task
static1
Behavioral task
behavioral1
Sample
20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe
Resource
win10-20230220-en
General
-
Target
20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe
-
Size
684KB
-
MD5
3f88cb36704b591c794170a1e218d38e
-
SHA1
6fa7f1941e43f973e4389ef81167225139341037
-
SHA256
20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0
-
SHA512
0a77f7c1b6969716cb0479632a5be3eb0e6bf9dc8680e2ec44884138f5369894c278bf8e3b5b069b986f1bd1b4a2719336ec3202defa788b8f6242cc29d1392d
-
SSDEEP
12288:9Mr2y90j8Vsgy1O33W/TWOY85WAYM+FU48m7L3K9:jyE8GgCTW45LY/F2m7LU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2635.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2635.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4664-180-0x0000000004A30000-0x0000000004A76000-memory.dmp family_redline behavioral1/memory/4664-184-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4664-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-187-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-189-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-193-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-197-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-199-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-195-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-201-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-203-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-205-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-207-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-211-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-215-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4664-219-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un992148.exepro2635.exequ5800.exesi014910.exepid process 2600 un992148.exe 3896 pro2635.exe 4664 qu5800.exe 5100 si014910.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2635.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2635.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un992148.exe20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un992148.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un992148.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2635.exequ5800.exesi014910.exepid process 3896 pro2635.exe 3896 pro2635.exe 4664 qu5800.exe 4664 qu5800.exe 5100 si014910.exe 5100 si014910.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2635.exequ5800.exesi014910.exedescription pid process Token: SeDebugPrivilege 3896 pro2635.exe Token: SeDebugPrivilege 4664 qu5800.exe Token: SeDebugPrivilege 5100 si014910.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exeun992148.exedescription pid process target process PID 2408 wrote to memory of 2600 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe un992148.exe PID 2408 wrote to memory of 2600 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe un992148.exe PID 2408 wrote to memory of 2600 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe un992148.exe PID 2600 wrote to memory of 3896 2600 un992148.exe pro2635.exe PID 2600 wrote to memory of 3896 2600 un992148.exe pro2635.exe PID 2600 wrote to memory of 3896 2600 un992148.exe pro2635.exe PID 2600 wrote to memory of 4664 2600 un992148.exe qu5800.exe PID 2600 wrote to memory of 4664 2600 un992148.exe qu5800.exe PID 2600 wrote to memory of 4664 2600 un992148.exe qu5800.exe PID 2408 wrote to memory of 5100 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe si014910.exe PID 2408 wrote to memory of 5100 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe si014910.exe PID 2408 wrote to memory of 5100 2408 20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe si014910.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe"C:\Users\Admin\AppData\Local\Temp\20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56efa25c26be8b5c15a761d31ae6a2d44
SHA1be3e836eb74fae552794b84e230bc7f944deb86b
SHA256121e4e191ce00a7e9c0adecfd344c71117318aac7d2f6ca9b4f9a8cb3f7d5149
SHA51214c49bfb32116a87383f19b09937e6c9a26fec71a1971a7c66fe7e01d39d1d2a5acf50d8e36f87b554a6f75c4afbd4d35895f77758e6a91b922c465a472e8223
-
Filesize
175KB
MD56efa25c26be8b5c15a761d31ae6a2d44
SHA1be3e836eb74fae552794b84e230bc7f944deb86b
SHA256121e4e191ce00a7e9c0adecfd344c71117318aac7d2f6ca9b4f9a8cb3f7d5149
SHA51214c49bfb32116a87383f19b09937e6c9a26fec71a1971a7c66fe7e01d39d1d2a5acf50d8e36f87b554a6f75c4afbd4d35895f77758e6a91b922c465a472e8223
-
Filesize
542KB
MD5c82e5814a72402533ee4cfd63b34076c
SHA17f32c7d1fda877d6ede29f240bf3c26956815563
SHA256ec5672533e1e62c262c454adf5fda2f145d2574fd2e741232f245df89026a21b
SHA512c7ca4712acf0d46cd618366ac8d9200e52175d06fe7b5892a50dcc5738fd58356d64f641d712bed3deed38cfab614a8cc6130d3bf07f4b1fb05fae44da8f66ae
-
Filesize
542KB
MD5c82e5814a72402533ee4cfd63b34076c
SHA17f32c7d1fda877d6ede29f240bf3c26956815563
SHA256ec5672533e1e62c262c454adf5fda2f145d2574fd2e741232f245df89026a21b
SHA512c7ca4712acf0d46cd618366ac8d9200e52175d06fe7b5892a50dcc5738fd58356d64f641d712bed3deed38cfab614a8cc6130d3bf07f4b1fb05fae44da8f66ae
-
Filesize
321KB
MD51f027f994c3237234b228f0835628b66
SHA1ab7e955622a6edc99dbd3953b01a8c757ae4787f
SHA256ff76f44cd32b2b5efe691d5c6d49526af3d610093ebbd13ca0325c600d9c1208
SHA512838eee96ae6c8f63a28f26833b12e1cb1b69bac489c284b1b36db8bcfde8bcdbd99375c42f1c3acfa09475c04c63229e78e0cdf87de4ff5948d210affcee4ffc
-
Filesize
321KB
MD51f027f994c3237234b228f0835628b66
SHA1ab7e955622a6edc99dbd3953b01a8c757ae4787f
SHA256ff76f44cd32b2b5efe691d5c6d49526af3d610093ebbd13ca0325c600d9c1208
SHA512838eee96ae6c8f63a28f26833b12e1cb1b69bac489c284b1b36db8bcfde8bcdbd99375c42f1c3acfa09475c04c63229e78e0cdf87de4ff5948d210affcee4ffc
-
Filesize
380KB
MD5a0b5c72c4eaa8d00cc3403a9eb6e49ec
SHA15f7c3d73af2efda49e1730bcf05fe7c0fcce724a
SHA2566981166f48064b6494656fd39c6a181d25e5c984e34de37ccd71567eb7075e23
SHA5123cacca6e79ae67038824dd71314c43075c1b96c76e52f28a6e0adaa95b3c520acd01beaaa5b0d66d0e085e31e24997dc8603917a9a0064075068074eaeb32bbc
-
Filesize
380KB
MD5a0b5c72c4eaa8d00cc3403a9eb6e49ec
SHA15f7c3d73af2efda49e1730bcf05fe7c0fcce724a
SHA2566981166f48064b6494656fd39c6a181d25e5c984e34de37ccd71567eb7075e23
SHA5123cacca6e79ae67038824dd71314c43075c1b96c76e52f28a6e0adaa95b3c520acd01beaaa5b0d66d0e085e31e24997dc8603917a9a0064075068074eaeb32bbc