Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe
Resource
win10-20230220-en
General
-
Target
204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe
-
Size
698KB
-
MD5
91fd707bfc4859880eb9cd01e31e1a28
-
SHA1
f6792321cf8c5efc288623fc260892466147808b
-
SHA256
204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51
-
SHA512
bcf6773a2696075bb31a704437adfa2ac1832a753e61103c6d943baeec88ca8ef5069bc9dc5fc060d82e472bf775beb0198dc3c324724906a6145acffd1fe8e4
-
SSDEEP
12288:bMrly90siwp+pfGGzu86xz1HfDCwyUNL6N9GjnAxI9gEE+cA:eyViwp+kJZ/DCw3+GjcI9LpcA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro9062.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4164-181-0x0000000004900000-0x0000000004946000-memory.dmp family_redline behavioral1/memory/4164-182-0x00000000049B0000-0x00000000049F4000-memory.dmp family_redline behavioral1/memory/4164-183-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-184-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-186-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-188-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-192-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-191-0x0000000004990000-0x00000000049A0000-memory.dmp family_redline behavioral1/memory/4164-195-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-197-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-199-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-201-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-203-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-205-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-207-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-209-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-211-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-215-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-213-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-217-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline behavioral1/memory/4164-219-0x00000000049B0000-0x00000000049EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un965152.exepro9062.exequ6858.exesi450427.exepid process 3656 un965152.exe 3960 pro9062.exe 4164 qu6858.exe 5008 si450427.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9062.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9062.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9062.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exeun965152.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un965152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un965152.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9062.exequ6858.exesi450427.exepid process 3960 pro9062.exe 3960 pro9062.exe 4164 qu6858.exe 4164 qu6858.exe 5008 si450427.exe 5008 si450427.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9062.exequ6858.exesi450427.exedescription pid process Token: SeDebugPrivilege 3960 pro9062.exe Token: SeDebugPrivilege 4164 qu6858.exe Token: SeDebugPrivilege 5008 si450427.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exeun965152.exedescription pid process target process PID 3632 wrote to memory of 3656 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe un965152.exe PID 3632 wrote to memory of 3656 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe un965152.exe PID 3632 wrote to memory of 3656 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe un965152.exe PID 3656 wrote to memory of 3960 3656 un965152.exe pro9062.exe PID 3656 wrote to memory of 3960 3656 un965152.exe pro9062.exe PID 3656 wrote to memory of 3960 3656 un965152.exe pro9062.exe PID 3656 wrote to memory of 4164 3656 un965152.exe qu6858.exe PID 3656 wrote to memory of 4164 3656 un965152.exe qu6858.exe PID 3656 wrote to memory of 4164 3656 un965152.exe qu6858.exe PID 3632 wrote to memory of 5008 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe si450427.exe PID 3632 wrote to memory of 5008 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe si450427.exe PID 3632 wrote to memory of 5008 3632 204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe si450427.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe"C:\Users\Admin\AppData\Local\Temp\204d2aded58943e2399b621b701ab228b2909e3db496ce40afb8ee608d2fed51.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965152.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6858.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450427.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD537c39ab7664a537b97bc0f4976185b75
SHA1af61b5adfdfb2f7b2843e6a67abf6074e125470c
SHA256c2bb7cae1ebebce1e8849dae6cff9539f8b1f8d8c4fae1931fe48e599ae390ca
SHA51253c73c6afe1e5fb2cdf123d7a9fa10165b6e0ab9a9bfbf3597b1cac2c1ef2b242c8d0f33e36a703271ce7dd23ac35fe99a20ca22825472e5a60bd8f73439c79d
-
Filesize
175KB
MD537c39ab7664a537b97bc0f4976185b75
SHA1af61b5adfdfb2f7b2843e6a67abf6074e125470c
SHA256c2bb7cae1ebebce1e8849dae6cff9539f8b1f8d8c4fae1931fe48e599ae390ca
SHA51253c73c6afe1e5fb2cdf123d7a9fa10165b6e0ab9a9bfbf3597b1cac2c1ef2b242c8d0f33e36a703271ce7dd23ac35fe99a20ca22825472e5a60bd8f73439c79d
-
Filesize
556KB
MD54b8fbc42cee0f0916770a7f406aaee73
SHA18a1cab321db336c4d47b5fa76a537e5742c12844
SHA256985294877089cbac7c4cd00a9f53d65f7ef3a624cdc57f90747aea5a71b4a2b2
SHA512c811d0c8b84a799aa61d227e67636bb0497d083dc29aa009e5555dc7f69b9b6605c8b64e48204dcd5f8158195fa478a2f5eb6f14c9787edf41ad6ba064d2f855
-
Filesize
556KB
MD54b8fbc42cee0f0916770a7f406aaee73
SHA18a1cab321db336c4d47b5fa76a537e5742c12844
SHA256985294877089cbac7c4cd00a9f53d65f7ef3a624cdc57f90747aea5a71b4a2b2
SHA512c811d0c8b84a799aa61d227e67636bb0497d083dc29aa009e5555dc7f69b9b6605c8b64e48204dcd5f8158195fa478a2f5eb6f14c9787edf41ad6ba064d2f855
-
Filesize
347KB
MD56c5f580268158c5bfdd84974e6615c13
SHA11599090a0ed9ec02c789041a1403a10111e37035
SHA256b4dd329ae438de29d6aec58afa44492f8d81ac8ca13f3212e21cf508393e131f
SHA512bd2bb3e8a705bce40e8ee528ae293e392676150b4f4ee2c2b1a5dedaa8db7cd1f10441cad22b3e170e50f4ab8857cdd1f268f18143e39f612915c0ee61e67171
-
Filesize
347KB
MD56c5f580268158c5bfdd84974e6615c13
SHA11599090a0ed9ec02c789041a1403a10111e37035
SHA256b4dd329ae438de29d6aec58afa44492f8d81ac8ca13f3212e21cf508393e131f
SHA512bd2bb3e8a705bce40e8ee528ae293e392676150b4f4ee2c2b1a5dedaa8db7cd1f10441cad22b3e170e50f4ab8857cdd1f268f18143e39f612915c0ee61e67171
-
Filesize
406KB
MD548ccee74db998f85cf8e3a849622dcda
SHA13e4663d037480b7b4cf394cfbb239a4ebc17e960
SHA256137a5e086e85c505046f8d063bca1c792100fca51aa1db1a1ee2773dd06ba32f
SHA512d5296993ffc1ec8c1d0ba559157798d70bdc7a02a04d464c5ff4beb436672f202e34b8f754c72770069ff4852715aff6fd5fb9f9f8dedbca57a32e7759908a4e
-
Filesize
406KB
MD548ccee74db998f85cf8e3a849622dcda
SHA13e4663d037480b7b4cf394cfbb239a4ebc17e960
SHA256137a5e086e85c505046f8d063bca1c792100fca51aa1db1a1ee2773dd06ba32f
SHA512d5296993ffc1ec8c1d0ba559157798d70bdc7a02a04d464c5ff4beb436672f202e34b8f754c72770069ff4852715aff6fd5fb9f9f8dedbca57a32e7759908a4e