Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28/03/2023, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe
Resource
win10-20230220-en
General
-
Target
24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe
-
Size
695KB
-
MD5
a18584247783816894d230c8ad0611ba
-
SHA1
49c5a1a9c0275a0560c6fb1d5f8adcfeeb6f1e81
-
SHA256
24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0
-
SHA512
3394132d7127a9ef044c91531a79cb8fed69f588155a6467c415065a5cc11a25ba82b75f12285d631aa5438250c4c7519cb5a0ddba24f4a551fba30d1ebc8dc5
-
SSDEEP
12288:dMrVy90tlWO4viIiiTIaOXGCvmcr69/NOMuuxX+rVWwEwiUHX+FztJba+:Uy6Ht0Ea5cr6jOMlYnittb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3269.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4884-181-0x0000000004870000-0x00000000048B6000-memory.dmp family_redline behavioral1/memory/4884-182-0x0000000007100000-0x0000000007144000-memory.dmp family_redline behavioral1/memory/4884-183-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-184-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-188-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-186-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-192-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-190-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-194-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-196-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-198-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-200-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-202-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-204-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-206-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-208-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-212-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-210-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-214-0x0000000007100000-0x000000000713F000-memory.dmp family_redline behavioral1/memory/4884-216-0x0000000007100000-0x000000000713F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4468 un437833.exe 4824 pro3269.exe 4884 qu0882.exe 2820 si322398.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3269.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un437833.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un437833.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4824 pro3269.exe 4824 pro3269.exe 4884 qu0882.exe 4884 qu0882.exe 2820 si322398.exe 2820 si322398.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4824 pro3269.exe Token: SeDebugPrivilege 4884 qu0882.exe Token: SeDebugPrivilege 2820 si322398.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4468 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 66 PID 3272 wrote to memory of 4468 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 66 PID 3272 wrote to memory of 4468 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 66 PID 4468 wrote to memory of 4824 4468 un437833.exe 67 PID 4468 wrote to memory of 4824 4468 un437833.exe 67 PID 4468 wrote to memory of 4824 4468 un437833.exe 67 PID 4468 wrote to memory of 4884 4468 un437833.exe 68 PID 4468 wrote to memory of 4884 4468 un437833.exe 68 PID 4468 wrote to memory of 4884 4468 un437833.exe 68 PID 3272 wrote to memory of 2820 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 70 PID 3272 wrote to memory of 2820 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 70 PID 3272 wrote to memory of 2820 3272 24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe"C:\Users\Admin\AppData\Local\Temp\24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b03994fb3c6f5a52e2ec2549243f6eb
SHA1f5225ce492e9fa002ecef12d42c24d10dd9538f9
SHA2568a27b5ec572bc336fbba17a9d1275f1d2ab0f953b9a3a0d724e6a0a14d844fd8
SHA512610c8e4e3ecf130bae896bc67ed77c1648c7c68667a6e4ab354ef639d1e77c4c4912cf2fb49c2d80754fb7165a3889b7b8af849ed542e7531348437f19dbd2df
-
Filesize
175KB
MD56b03994fb3c6f5a52e2ec2549243f6eb
SHA1f5225ce492e9fa002ecef12d42c24d10dd9538f9
SHA2568a27b5ec572bc336fbba17a9d1275f1d2ab0f953b9a3a0d724e6a0a14d844fd8
SHA512610c8e4e3ecf130bae896bc67ed77c1648c7c68667a6e4ab354ef639d1e77c4c4912cf2fb49c2d80754fb7165a3889b7b8af849ed542e7531348437f19dbd2df
-
Filesize
554KB
MD576a657987f58fb24eb11c88316b95ad6
SHA1386cc8fe3804a0b16383b187f2abf7173ebab8c5
SHA25683fad59659c6176aa629d312feb38e3f51f1bc6a0cb5cf4a775a185077defa54
SHA512eb5333ce8e66750a6060d7bfec8eb76c6f499e7076ad0e0e5932f484b71a87d04d891bc697c478bd392184d1e608717449ee3ee43c337de29c012074bba32645
-
Filesize
554KB
MD576a657987f58fb24eb11c88316b95ad6
SHA1386cc8fe3804a0b16383b187f2abf7173ebab8c5
SHA25683fad59659c6176aa629d312feb38e3f51f1bc6a0cb5cf4a775a185077defa54
SHA512eb5333ce8e66750a6060d7bfec8eb76c6f499e7076ad0e0e5932f484b71a87d04d891bc697c478bd392184d1e608717449ee3ee43c337de29c012074bba32645
-
Filesize
345KB
MD5e0433d8adff71555f2c09f3e61a7c38d
SHA163fcd0f0945e62db949bc1ae89e526dda449ed01
SHA25628d9cf418015b1500f0880fb10d1fdf57bb3df95099e70f1c9653f50c93857b1
SHA51290f6c7293992f9db39e5381d4b95391ecd77176e15acfa8fd8c675339e2d3c9105b6dccf1c6171e79ad9fbee1f72f515da7c7eecac93e2f9fbc41fb6b74994ad
-
Filesize
345KB
MD5e0433d8adff71555f2c09f3e61a7c38d
SHA163fcd0f0945e62db949bc1ae89e526dda449ed01
SHA25628d9cf418015b1500f0880fb10d1fdf57bb3df95099e70f1c9653f50c93857b1
SHA51290f6c7293992f9db39e5381d4b95391ecd77176e15acfa8fd8c675339e2d3c9105b6dccf1c6171e79ad9fbee1f72f515da7c7eecac93e2f9fbc41fb6b74994ad
-
Filesize
403KB
MD557f595b69a728187ea2c6dcac4755abe
SHA1be9bc328c9ebedfedef4dadbcfe38da296c1ac17
SHA2560b6a2677887185dc6626b2c9529cfe2d8241515d7d9b21c4c85c67f2e5d41a37
SHA512decd70172649e655751d55e8d819aba3df5a7a78eca5669770477cb9a6edbcb73c448cedb24024b41725ba0441962197ae6bd727688b056b241eaf8333861644
-
Filesize
403KB
MD557f595b69a728187ea2c6dcac4755abe
SHA1be9bc328c9ebedfedef4dadbcfe38da296c1ac17
SHA2560b6a2677887185dc6626b2c9529cfe2d8241515d7d9b21c4c85c67f2e5d41a37
SHA512decd70172649e655751d55e8d819aba3df5a7a78eca5669770477cb9a6edbcb73c448cedb24024b41725ba0441962197ae6bd727688b056b241eaf8333861644