Analysis
-
max time kernel
51s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 08:42
Static task
static1
Behavioral task
behavioral1
Sample
ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe
Resource
win10-20230220-en
General
-
Target
ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe
-
Size
684KB
-
MD5
6ce883aeb338aeb954c4690d0e862eb0
-
SHA1
d4925ed9e5294a555b24e2e6d45c3e102b337907
-
SHA256
ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff
-
SHA512
53f05b4493b6a484b77470a4c263e3bf3ac1b69c5393d3ed8a27c53636c29d0934451f10d4ce7dd7d35541f03e74f46db76617db680863e08d97d6b317d5873d
-
SSDEEP
12288:xMrIy90FgN3ZRogtHE3Nes49liCtmMxTuUpvmgL384walh:hyGgNpRFK4/iCtmMcSmgLMab
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3512.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3512.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3536-178-0x0000000004950000-0x0000000004996000-memory.dmp family_redline behavioral1/memory/3536-179-0x0000000007050000-0x0000000007094000-memory.dmp family_redline behavioral1/memory/3536-181-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-186-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-188-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-183-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-190-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-192-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-194-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-196-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-198-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-200-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-202-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-204-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-206-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-210-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-208-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-212-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-214-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-216-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3536-1098-0x00000000070E0000-0x00000000070F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un904060.exepro3512.exequ4289.exesi736602.exepid process 5048 un904060.exe 4472 pro3512.exe 3536 qu4289.exe 4364 si736602.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3512.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3512.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3512.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exeun904060.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un904060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904060.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3512.exequ4289.exesi736602.exepid process 4472 pro3512.exe 4472 pro3512.exe 3536 qu4289.exe 3536 qu4289.exe 4364 si736602.exe 4364 si736602.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3512.exequ4289.exesi736602.exedescription pid process Token: SeDebugPrivilege 4472 pro3512.exe Token: SeDebugPrivilege 3536 qu4289.exe Token: SeDebugPrivilege 4364 si736602.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exeun904060.exedescription pid process target process PID 4452 wrote to memory of 5048 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe un904060.exe PID 4452 wrote to memory of 5048 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe un904060.exe PID 4452 wrote to memory of 5048 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe un904060.exe PID 5048 wrote to memory of 4472 5048 un904060.exe pro3512.exe PID 5048 wrote to memory of 4472 5048 un904060.exe pro3512.exe PID 5048 wrote to memory of 4472 5048 un904060.exe pro3512.exe PID 5048 wrote to memory of 3536 5048 un904060.exe qu4289.exe PID 5048 wrote to memory of 3536 5048 un904060.exe qu4289.exe PID 5048 wrote to memory of 3536 5048 un904060.exe qu4289.exe PID 4452 wrote to memory of 4364 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe si736602.exe PID 4452 wrote to memory of 4364 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe si736602.exe PID 4452 wrote to memory of 4364 4452 ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe si736602.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe"C:\Users\Admin\AppData\Local\Temp\ef82940cacf0b41f25c24c945f85086aca1ee2a75c6333b71f9f0c053757ccff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3512.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3512.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4289.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4289.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si736602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si736602.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD539f15de57184b418e9c3c1607f9ce815
SHA16b050adbd13e489e03b7438711479c6ba5bbf296
SHA2564c86546957a3312c647ef2a5f509b240ed958dae7d0b989efcf0c1919dc6021a
SHA512338b055e37f49767ed427d2cc1bc0d260bb2ab12d52ab11eaa1fad845add828afc5b0683dd9bbe38a8188f22b601ac579b5d50ef35136699984ded269175dfe5
-
Filesize
175KB
MD539f15de57184b418e9c3c1607f9ce815
SHA16b050adbd13e489e03b7438711479c6ba5bbf296
SHA2564c86546957a3312c647ef2a5f509b240ed958dae7d0b989efcf0c1919dc6021a
SHA512338b055e37f49767ed427d2cc1bc0d260bb2ab12d52ab11eaa1fad845add828afc5b0683dd9bbe38a8188f22b601ac579b5d50ef35136699984ded269175dfe5
-
Filesize
542KB
MD509ed5544d71ab19450e33408b312c9ff
SHA167390895ea845bd7bc932a33266ad2a06cf57cb1
SHA2565500d678b22c05b10b925f896999bd80fe7938dce1440cd1efa2ec0ea5f09aa6
SHA5125fd63e5addcc245d21f67ca679878a41af0fda028c0fdad9f8d405ae94c882e5a690ade272fd7d33a2d0271c07fb43cf7b3f72a007e10be0bfa25baaed72c93b
-
Filesize
542KB
MD509ed5544d71ab19450e33408b312c9ff
SHA167390895ea845bd7bc932a33266ad2a06cf57cb1
SHA2565500d678b22c05b10b925f896999bd80fe7938dce1440cd1efa2ec0ea5f09aa6
SHA5125fd63e5addcc245d21f67ca679878a41af0fda028c0fdad9f8d405ae94c882e5a690ade272fd7d33a2d0271c07fb43cf7b3f72a007e10be0bfa25baaed72c93b
-
Filesize
321KB
MD592ce178d9e85290a1ff35970dc754eb9
SHA111dc46b250d5f5a1c885728b1ef379f3b59ed287
SHA256c19eb846ee11e6df36f6fbc2c2bda163e4ff5ca70b0b1a641eb351a12befffb0
SHA51244eb8f80d6550ef044c33c73345043459f6b216695d7969d99e35721c5519385ce9f9f18a1429878397e5bc8a823aa931f3cfaff9a37daa64609022625dbcdd4
-
Filesize
321KB
MD592ce178d9e85290a1ff35970dc754eb9
SHA111dc46b250d5f5a1c885728b1ef379f3b59ed287
SHA256c19eb846ee11e6df36f6fbc2c2bda163e4ff5ca70b0b1a641eb351a12befffb0
SHA51244eb8f80d6550ef044c33c73345043459f6b216695d7969d99e35721c5519385ce9f9f18a1429878397e5bc8a823aa931f3cfaff9a37daa64609022625dbcdd4
-
Filesize
380KB
MD5b46153487c2394589088fc9e088787d3
SHA161175588b09eae6f498530c69db77278dca22df7
SHA256ecbcd11e616cd87601b9609fadd556d73bb84881f7678e464807c7d32fdfc6ff
SHA51222bcf49d2c4ae1b97b94821dca536c509380ac959595e929cd6e6309524927af508ef00a739dc67be22cbc188d42a64cff030224e37336c450448809cfa300cf
-
Filesize
380KB
MD5b46153487c2394589088fc9e088787d3
SHA161175588b09eae6f498530c69db77278dca22df7
SHA256ecbcd11e616cd87601b9609fadd556d73bb84881f7678e464807c7d32fdfc6ff
SHA51222bcf49d2c4ae1b97b94821dca536c509380ac959595e929cd6e6309524927af508ef00a739dc67be22cbc188d42a64cff030224e37336c450448809cfa300cf