Analysis
-
max time kernel
53s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 09:10
Static task
static1
Behavioral task
behavioral1
Sample
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe
Resource
win10-20230220-en
General
-
Target
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe
-
Size
683KB
-
MD5
5c54d14346b422bd90ac03852e0f9e23
-
SHA1
27823c11e489e1c41960186e7f0c89e66dff907a
-
SHA256
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d
-
SHA512
24bc1e1329d383006a6b25dafe9ec15f79d8dc7a2dde6e5a29a45b6db4b00e70de3faf5091052980deb9431ac3f12436bb68511d75ee3af92d9fc0e9a64a66af
-
SSDEEP
12288:JMrgy90JV8wIQugROhialiJv1bj+0LhzyfsFW7bUPBmnL3fwAjUKBTTd4:tyWTym1bnusGbKmnL4ABxd4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3217.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
resource yara_rule behavioral1/memory/3536-179-0x0000000007070000-0x00000000070B6000-memory.dmp family_redline behavioral1/memory/3536-180-0x00000000070F0000-0x0000000007134000-memory.dmp family_redline behavioral1/memory/3536-182-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-181-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-184-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-186-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-190-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-188-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-192-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-194-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-196-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-198-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-200-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-202-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-204-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-206-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-208-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-210-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-212-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-214-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/3536-353-0x00000000071A0000-0x00000000071B0000-memory.dmp family_redline behavioral1/memory/3536-1101-0x00000000071A0000-0x00000000071B0000-memory.dmp family_redline behavioral1/memory/3536-1102-0x00000000071A0000-0x00000000071B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5044 un828860.exe 4472 pro3217.exe 3536 qu7995.exe 5000 si278105.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3217.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un828860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un828860.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4472 pro3217.exe 4472 pro3217.exe 3536 qu7995.exe 3536 qu7995.exe 5000 si278105.exe 5000 si278105.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4472 pro3217.exe Token: SeDebugPrivilege 3536 qu7995.exe Token: SeDebugPrivilege 5000 si278105.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5044 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 66 PID 4452 wrote to memory of 5044 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 66 PID 4452 wrote to memory of 5044 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 66 PID 5044 wrote to memory of 4472 5044 un828860.exe 67 PID 5044 wrote to memory of 4472 5044 un828860.exe 67 PID 5044 wrote to memory of 4472 5044 un828860.exe 67 PID 5044 wrote to memory of 3536 5044 un828860.exe 68 PID 5044 wrote to memory of 3536 5044 un828860.exe 68 PID 5044 wrote to memory of 3536 5044 un828860.exe 68 PID 4452 wrote to memory of 5000 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 70 PID 4452 wrote to memory of 5000 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 70 PID 4452 wrote to memory of 5000 4452 97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe"C:\Users\Admin\AppData\Local\Temp\97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3217.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3217.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7995.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si278105.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si278105.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b70830982832c2358331dccf31eb7705
SHA1497c13a38ef49f98c684c59cb200ee6fbc8ab218
SHA25675d13a79df0ada710ae7fb621a176715eb44ebf607a3fa261f96b330e2f75b40
SHA5129fc0709ea9aa4d74762a4b1e2875727f3f934015d69f11777836470e85e6a828dec4e38f85aa227d56b29c7b1406cc68b1b81de2140f8dae0e054d5dd6403a78
-
Filesize
175KB
MD5b70830982832c2358331dccf31eb7705
SHA1497c13a38ef49f98c684c59cb200ee6fbc8ab218
SHA25675d13a79df0ada710ae7fb621a176715eb44ebf607a3fa261f96b330e2f75b40
SHA5129fc0709ea9aa4d74762a4b1e2875727f3f934015d69f11777836470e85e6a828dec4e38f85aa227d56b29c7b1406cc68b1b81de2140f8dae0e054d5dd6403a78
-
Filesize
541KB
MD501f34e973225a9ff4c8ed25c9681d53b
SHA1ea5cb98029c52e926bcb925103427c68dbce80f5
SHA2568b1a186427adb394cea2ad21983e8a7c9ba49352df5b3608a54a298a782bf137
SHA5122aae33868097c82129ea8f77b6740d942ace080128f63a31ba65aa95637e624f9e887dbd7d79b72c96dd00c260444b5de0664318da55a32f46236111f4eb7165
-
Filesize
541KB
MD501f34e973225a9ff4c8ed25c9681d53b
SHA1ea5cb98029c52e926bcb925103427c68dbce80f5
SHA2568b1a186427adb394cea2ad21983e8a7c9ba49352df5b3608a54a298a782bf137
SHA5122aae33868097c82129ea8f77b6740d942ace080128f63a31ba65aa95637e624f9e887dbd7d79b72c96dd00c260444b5de0664318da55a32f46236111f4eb7165
-
Filesize
321KB
MD5ad0fcfe0df53e19853b1ac6a7582cc9b
SHA1f0321e32e213901c60141d2b32a1717ff54f9734
SHA2560cd5204ae3edb9770496f1c8ec0ae695187e04ed260c6399783bd0f7540ab4ff
SHA5124ac33542de9beb3ba9ee8e810bf6b765c843aecafcbdba836347bfc1eedd5b9fa0f0a5ab29f35d4dc981e9e529564b5cd66a8fd87c4633abd19f0bdfcf6c8055
-
Filesize
321KB
MD5ad0fcfe0df53e19853b1ac6a7582cc9b
SHA1f0321e32e213901c60141d2b32a1717ff54f9734
SHA2560cd5204ae3edb9770496f1c8ec0ae695187e04ed260c6399783bd0f7540ab4ff
SHA5124ac33542de9beb3ba9ee8e810bf6b765c843aecafcbdba836347bfc1eedd5b9fa0f0a5ab29f35d4dc981e9e529564b5cd66a8fd87c4633abd19f0bdfcf6c8055
-
Filesize
380KB
MD5524dc8f68ec38bf71c136b71aade6834
SHA1a5ab4ea2cd261d1deb783355510c2820cc164d1c
SHA2562756866bd77258181b2a44ebe405ec3658f0d9cf15a6c468100a840838f52017
SHA5120755fa4bb9a31de68aa3019dbe25d33c050f58fb51710d8324c68247d253283ac2b2a45999fdbd64a19488cfef1e18e92e504f36d9e04a90a2d80dd8f6d12e3c
-
Filesize
380KB
MD5524dc8f68ec38bf71c136b71aade6834
SHA1a5ab4ea2cd261d1deb783355510c2820cc164d1c
SHA2562756866bd77258181b2a44ebe405ec3658f0d9cf15a6c468100a840838f52017
SHA5120755fa4bb9a31de68aa3019dbe25d33c050f58fb51710d8324c68247d253283ac2b2a45999fdbd64a19488cfef1e18e92e504f36d9e04a90a2d80dd8f6d12e3c