Analysis
-
max time kernel
50s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28/03/2023, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe
Resource
win10-20230220-en
General
-
Target
5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe
-
Size
697KB
-
MD5
0f1efbead217b6df1cfb2ccf28928983
-
SHA1
1b8136829b879dec35ccb394bfc5a58842b5bcdb
-
SHA256
5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6
-
SHA512
0922911e8db2a245a4070a9080ca1dc11e1873cf6911c66a09ba0cdb53a95c4ac36bce5ad50360c56f1e137bdf46b49b99f40c2a995426d19fc4b0ccbe935949
-
SSDEEP
12288:YMrpy90aKev7G0tFVXKKZYuzEngqS5Ha5B03GQwkUHio/79ieh1pnSXoOuz:xy7Lv7fVXKluz6gqSJak3yxHVJd6XoOM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4205.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4280-179-0x00000000070A0000-0x00000000070E6000-memory.dmp family_redline behavioral1/memory/4280-180-0x0000000007660000-0x00000000076A4000-memory.dmp family_redline behavioral1/memory/4280-181-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-182-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-184-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-188-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-192-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-194-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-196-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-198-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-200-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-202-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-204-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-206-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-208-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-210-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-212-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-214-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-216-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4280-218-0x0000000007660000-0x000000000769F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2584 un393747.exe 4128 pro4205.exe 4280 qu8922.exe 4692 si840677.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4205.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4205.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un393747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un393747.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4128 pro4205.exe 4128 pro4205.exe 4280 qu8922.exe 4280 qu8922.exe 4692 si840677.exe 4692 si840677.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4128 pro4205.exe Token: SeDebugPrivilege 4280 qu8922.exe Token: SeDebugPrivilege 4692 si840677.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2584 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 66 PID 2612 wrote to memory of 2584 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 66 PID 2612 wrote to memory of 2584 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 66 PID 2584 wrote to memory of 4128 2584 un393747.exe 67 PID 2584 wrote to memory of 4128 2584 un393747.exe 67 PID 2584 wrote to memory of 4128 2584 un393747.exe 67 PID 2584 wrote to memory of 4280 2584 un393747.exe 68 PID 2584 wrote to memory of 4280 2584 un393747.exe 68 PID 2584 wrote to memory of 4280 2584 un393747.exe 68 PID 2612 wrote to memory of 4692 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 70 PID 2612 wrote to memory of 4692 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 70 PID 2612 wrote to memory of 4692 2612 5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe"C:\Users\Admin\AppData\Local\Temp\5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5759455bebca1cc161b8c37754113ff15
SHA18adcf1dc4b945fc38bc1fc39bce44ba4e8b25907
SHA2568844d05b688d539ff5461c53fe3121078edd84218d47e1aa170be4814c170041
SHA512fab9a9af020a403da2c841516a992cafb8ee53ac7c19e785e9d9c6e221ce637ac3ca25d90732de8fc436092a6160b532de880ecb33ae55c24ca53a8d855cee93
-
Filesize
175KB
MD5759455bebca1cc161b8c37754113ff15
SHA18adcf1dc4b945fc38bc1fc39bce44ba4e8b25907
SHA2568844d05b688d539ff5461c53fe3121078edd84218d47e1aa170be4814c170041
SHA512fab9a9af020a403da2c841516a992cafb8ee53ac7c19e785e9d9c6e221ce637ac3ca25d90732de8fc436092a6160b532de880ecb33ae55c24ca53a8d855cee93
-
Filesize
555KB
MD5b2ec6e25384c6499550ab3eb29f8939b
SHA1158e57582ab7d33d7606d74ac47a7d0404d0f4bc
SHA256c078a631157ef8416bbc0e2dc648a68e0dd20d01705fc30300f4fc9076aa3ba6
SHA51295afd5937c35a885b5be633348757290ed85891f7a75119dd5f7ef42e683e7f8111e84a33816d891a4c38258ae93337620060f4615a5a59b512dafe75f3bf04c
-
Filesize
555KB
MD5b2ec6e25384c6499550ab3eb29f8939b
SHA1158e57582ab7d33d7606d74ac47a7d0404d0f4bc
SHA256c078a631157ef8416bbc0e2dc648a68e0dd20d01705fc30300f4fc9076aa3ba6
SHA51295afd5937c35a885b5be633348757290ed85891f7a75119dd5f7ef42e683e7f8111e84a33816d891a4c38258ae93337620060f4615a5a59b512dafe75f3bf04c
-
Filesize
345KB
MD531a0ea5618058221aea4a1de363a4644
SHA1e916190024c9aae9c5726056d7f6c4f4c3109dde
SHA2563ec14ddae32806b2f2579ab05728b93be933b04221a4bcfc9319ffc0d6a18596
SHA512cd4e2974c8c77fddce7a91155efb0c5dd7b490d30c964888b19d4ee57f9a2508decc3e521065ca1ea764dc48f0e591160d7db564d952bf5d6592b1ac5156b2d7
-
Filesize
345KB
MD531a0ea5618058221aea4a1de363a4644
SHA1e916190024c9aae9c5726056d7f6c4f4c3109dde
SHA2563ec14ddae32806b2f2579ab05728b93be933b04221a4bcfc9319ffc0d6a18596
SHA512cd4e2974c8c77fddce7a91155efb0c5dd7b490d30c964888b19d4ee57f9a2508decc3e521065ca1ea764dc48f0e591160d7db564d952bf5d6592b1ac5156b2d7
-
Filesize
403KB
MD55785786b87afced42063886af9f2e0a7
SHA1bdfd228c85f61ecb4c9676260663845019da7646
SHA2561e624bd4b3da1f774479f0dc2820d6cbc9aeb976d9273ddf98813564c7d752db
SHA512008fad31070be4643194a71ff41207d01a75cb1ec6722e82a0b7da88a823cd658c86097c0a99b26bd811f0a44616bd15dfb7271cde9ee2baf10e3322c43f309d
-
Filesize
403KB
MD55785786b87afced42063886af9f2e0a7
SHA1bdfd228c85f61ecb4c9676260663845019da7646
SHA2561e624bd4b3da1f774479f0dc2820d6cbc9aeb976d9273ddf98813564c7d752db
SHA512008fad31070be4643194a71ff41207d01a75cb1ec6722e82a0b7da88a823cd658c86097c0a99b26bd811f0a44616bd15dfb7271cde9ee2baf10e3322c43f309d