Analysis
-
max time kernel
51s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-04-2023 22:35
Static task
static1
Behavioral task
behavioral1
Sample
e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe
Resource
win10-20230220-en
General
-
Target
e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe
-
Size
660KB
-
MD5
563ae391f908ee1849378898ba357455
-
SHA1
dfb86d856bb74652588a4bfbda0c1d1005efb387
-
SHA256
e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad
-
SHA512
735cce8c30ec4a65efea6a66ea6a00ca28230ffac1bc3ad03cc64e3911d56401836d4377c3050ab01b6fc608d8120054467f9f3151c870ea2577d0bf319efd5f
-
SSDEEP
12288:rMrwy90sklSMT7gT7SxF+d985IXbwof5KWa/lma8/Kj1Jp1ICKx:XyqwT7NldA9ma8/KRJp1ICKx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4947.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4164-180-0x00000000021D0000-0x0000000002216000-memory.dmp family_redline behavioral1/memory/4164-181-0x00000000023C0000-0x0000000002404000-memory.dmp family_redline behavioral1/memory/4164-182-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-183-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-185-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-189-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-187-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-191-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-193-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-195-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-197-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-199-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-201-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-203-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-205-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-207-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-209-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-211-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-213-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-215-0x00000000023C0000-0x00000000023FF000-memory.dmp family_redline behavioral1/memory/4164-1102-0x0000000002250000-0x0000000002260000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3656 un555574.exe 4584 pro4947.exe 4164 qu0940.exe 1200 si867825.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4947.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un555574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un555574.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4584 pro4947.exe 4584 pro4947.exe 4164 qu0940.exe 4164 qu0940.exe 1200 si867825.exe 1200 si867825.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4584 pro4947.exe Token: SeDebugPrivilege 4164 qu0940.exe Token: SeDebugPrivilege 1200 si867825.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3656 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 66 PID 3632 wrote to memory of 3656 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 66 PID 3632 wrote to memory of 3656 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 66 PID 3656 wrote to memory of 4584 3656 un555574.exe 67 PID 3656 wrote to memory of 4584 3656 un555574.exe 67 PID 3656 wrote to memory of 4584 3656 un555574.exe 67 PID 3656 wrote to memory of 4164 3656 un555574.exe 68 PID 3656 wrote to memory of 4164 3656 un555574.exe 68 PID 3656 wrote to memory of 4164 3656 un555574.exe 68 PID 3632 wrote to memory of 1200 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 70 PID 3632 wrote to memory of 1200 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 70 PID 3632 wrote to memory of 1200 3632 e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe"C:\Users\Admin\AppData\Local\Temp\e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD572fb96b5c65ff292d47f6b81c22f9607
SHA14a7b09166c0e56dec3ed6be71f640e1a007720dd
SHA2566052673ef298839d83648b855a4136debd1502743c2f3d93203c00016f1da75a
SHA51270aeae49fa841df8bb062ae8a494a75f6cb550f3215eea56817e5b5dfb004f5eab1f09199535a68711db4933003060e8ea0894b9df9c5e2cb46f4b3dfbeec80c
-
Filesize
176KB
MD572fb96b5c65ff292d47f6b81c22f9607
SHA14a7b09166c0e56dec3ed6be71f640e1a007720dd
SHA2566052673ef298839d83648b855a4136debd1502743c2f3d93203c00016f1da75a
SHA51270aeae49fa841df8bb062ae8a494a75f6cb550f3215eea56817e5b5dfb004f5eab1f09199535a68711db4933003060e8ea0894b9df9c5e2cb46f4b3dfbeec80c
-
Filesize
518KB
MD5fee986de2fa0a2300226c0bc772f252e
SHA130afb900a518d8fe0c82a926c06516afd45d713d
SHA25686ad58915ec03dd60b27f2c5ace80b27391c9ff97531f287faccc05e86a7c077
SHA51270320cc18327ed85c1f83c4bf34c4832a35ef84ea21e599602e6f2ea0df268902b0e2055f289b315c4f9b79c63c6a00a047ab02ddf6851180b1d71437c2a5609
-
Filesize
518KB
MD5fee986de2fa0a2300226c0bc772f252e
SHA130afb900a518d8fe0c82a926c06516afd45d713d
SHA25686ad58915ec03dd60b27f2c5ace80b27391c9ff97531f287faccc05e86a7c077
SHA51270320cc18327ed85c1f83c4bf34c4832a35ef84ea21e599602e6f2ea0df268902b0e2055f289b315c4f9b79c63c6a00a047ab02ddf6851180b1d71437c2a5609
-
Filesize
376KB
MD5cf49f90ad27cde4aae3a8cb0a01ebc11
SHA1d29208b457f4fe0c2f448fea4bdbe8024c4227d7
SHA25614ed4278846e98776c84f68155d9de642a373b0c22136b004da53215906b0c5a
SHA512327724c4d61d0a0307aac4abb6712dd9147a7c8660bd926c1b199b86fe7dd225deb24145a44e8d651bf805ffeb2ae84ed4e9dc18a07e975060952ed5f10366b1
-
Filesize
376KB
MD5cf49f90ad27cde4aae3a8cb0a01ebc11
SHA1d29208b457f4fe0c2f448fea4bdbe8024c4227d7
SHA25614ed4278846e98776c84f68155d9de642a373b0c22136b004da53215906b0c5a
SHA512327724c4d61d0a0307aac4abb6712dd9147a7c8660bd926c1b199b86fe7dd225deb24145a44e8d651bf805ffeb2ae84ed4e9dc18a07e975060952ed5f10366b1
-
Filesize
434KB
MD5402efffee349a0458666a81652eae001
SHA16eb2e09d49a9a854a0a34f6015f4d05aa4c5b8b5
SHA256b71ba963d8ff1ab50f3753416daef2ed04c5fa21430e2ca6051d0684d70a2780
SHA512e7f9d7195fe27396d3e80c1b29cf8dabbf523d0e148e28d20cb9773ab5f560d5cd6ba82177460609c979a25f9b1f187b7a0bb0a2c150f290c7192759b6551cad
-
Filesize
434KB
MD5402efffee349a0458666a81652eae001
SHA16eb2e09d49a9a854a0a34f6015f4d05aa4c5b8b5
SHA256b71ba963d8ff1ab50f3753416daef2ed04c5fa21430e2ca6051d0684d70a2780
SHA512e7f9d7195fe27396d3e80c1b29cf8dabbf523d0e148e28d20cb9773ab5f560d5cd6ba82177460609c979a25f9b1f187b7a0bb0a2c150f290c7192759b6551cad