Analysis
-
max time kernel
54s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe
Resource
win10-20230220-en
General
-
Target
2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe
-
Size
673KB
-
MD5
11802d8a977378dc7e851eb6305c9090
-
SHA1
28bf1d89a5e5b0cced81c7125010d54a55c1c40f
-
SHA256
2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d
-
SHA512
093f1f2177afd31b30eee640343612d06e3629886302e137bf45794e19acaaf3eeff17f1d1cc53bcb5d3e731e9b965d0bf79ca11eceb85ec608d7c9c227409a3
-
SSDEEP
12288:QMrsy90D8okBMoH70MG0BVp+WTbuWaHmM8:syu8okBV70T0BVpx3uln8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7972.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4888-180-0x00000000022F0000-0x0000000002336000-memory.dmp family_redline behavioral1/memory/4888-181-0x0000000004F70000-0x0000000004FB4000-memory.dmp family_redline behavioral1/memory/4888-182-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-183-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-185-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-187-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-189-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-191-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-193-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-195-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-197-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-199-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-201-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-203-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-205-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-207-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-209-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-211-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-218-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline behavioral1/memory/4888-214-0x0000000004F70000-0x0000000004FAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2464 un698908.exe 2492 pro7972.exe 4888 qu3018.exe 4060 si911580.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7972.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7972.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698908.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2492 pro7972.exe 2492 pro7972.exe 4888 qu3018.exe 4888 qu3018.exe 4060 si911580.exe 4060 si911580.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2492 pro7972.exe Token: SeDebugPrivilege 4888 qu3018.exe Token: SeDebugPrivilege 4060 si911580.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2464 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 66 PID 2168 wrote to memory of 2464 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 66 PID 2168 wrote to memory of 2464 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 66 PID 2464 wrote to memory of 2492 2464 un698908.exe 67 PID 2464 wrote to memory of 2492 2464 un698908.exe 67 PID 2464 wrote to memory of 2492 2464 un698908.exe 67 PID 2464 wrote to memory of 4888 2464 un698908.exe 68 PID 2464 wrote to memory of 4888 2464 un698908.exe 68 PID 2464 wrote to memory of 4888 2464 un698908.exe 68 PID 2168 wrote to memory of 4060 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 70 PID 2168 wrote to memory of 4060 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 70 PID 2168 wrote to memory of 4060 2168 2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe"C:\Users\Admin\AppData\Local\Temp\2092a635272559aa69de62a2b46c641c2b8aaa3aa989e35554f91308253bd80d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7972.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3018.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3018.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si911580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si911580.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD579759121d5180e1f82f8a8bdf779da8f
SHA182f6110ece1b71fd38ae631caa0e1b0c4de8df37
SHA256344a98416475f83211a7a52b429d8e5c7a87904157a0c013f88abd955b8e0948
SHA512501d63cdd779c3e40b72086218aa428b2ef13a8bf3be6badd6aaa35bae9667aa51e5dfa99e5736c69eebf03d3ac433db1cf6070cb11bf29f78a3eadbf2a158ef
-
Filesize
176KB
MD579759121d5180e1f82f8a8bdf779da8f
SHA182f6110ece1b71fd38ae631caa0e1b0c4de8df37
SHA256344a98416475f83211a7a52b429d8e5c7a87904157a0c013f88abd955b8e0948
SHA512501d63cdd779c3e40b72086218aa428b2ef13a8bf3be6badd6aaa35bae9667aa51e5dfa99e5736c69eebf03d3ac433db1cf6070cb11bf29f78a3eadbf2a158ef
-
Filesize
531KB
MD5126845a40353f968c6f166e6c859c0e0
SHA1f25a247e0d06e7206c3dcc95ddc74be3e7f6afcf
SHA2567e56a94dc27e0d19902e84e964552a2dda520da66ffa03b3b5c5c325d93bde74
SHA51294982071d99f28ce7d176f8b172ca02bbc92df141f4d2916c4fce2a9a04937aed5b6cb91097da8a38790c9946e5252f5b109585ec01bb2ddd623bed7e6dc0700
-
Filesize
531KB
MD5126845a40353f968c6f166e6c859c0e0
SHA1f25a247e0d06e7206c3dcc95ddc74be3e7f6afcf
SHA2567e56a94dc27e0d19902e84e964552a2dda520da66ffa03b3b5c5c325d93bde74
SHA51294982071d99f28ce7d176f8b172ca02bbc92df141f4d2916c4fce2a9a04937aed5b6cb91097da8a38790c9946e5252f5b109585ec01bb2ddd623bed7e6dc0700
-
Filesize
260KB
MD56bf508212993c458968208adbfdc6c11
SHA17538375fe18207b26a43c52f6505bad10478539b
SHA2563b3f4d50a203e5896ed1603fc0843adda9a3ebc2ded9a2894d5cc1068d5d517f
SHA512e49ab8206eba0b265944e4c8e84729abec4536cf499f7f9733116051a6c5464db7680b11aa808f7cd7c78fe27423761925b46324aff27b17d9a6fd1c55dff40f
-
Filesize
260KB
MD56bf508212993c458968208adbfdc6c11
SHA17538375fe18207b26a43c52f6505bad10478539b
SHA2563b3f4d50a203e5896ed1603fc0843adda9a3ebc2ded9a2894d5cc1068d5d517f
SHA512e49ab8206eba0b265944e4c8e84729abec4536cf499f7f9733116051a6c5464db7680b11aa808f7cd7c78fe27423761925b46324aff27b17d9a6fd1c55dff40f
-
Filesize
319KB
MD5f16f95c5c58c7f6599f04d4c34860595
SHA1ba3e55a6df802c6ff5d31591d4c2ceb457498283
SHA256ed58be83bebcca0a1be5c3300b2d0eb3eecf6e5fa3384ad4d246289320483205
SHA512b73059029d78d32e017321dd589c2c882ad646a8e4eae287d44a00c7aefca98213d071dcaeec7657ac8d587b05772a0dc2bcd599abdc9d8bce249d4e379a1119
-
Filesize
319KB
MD5f16f95c5c58c7f6599f04d4c34860595
SHA1ba3e55a6df802c6ff5d31591d4c2ceb457498283
SHA256ed58be83bebcca0a1be5c3300b2d0eb3eecf6e5fa3384ad4d246289320483205
SHA512b73059029d78d32e017321dd589c2c882ad646a8e4eae287d44a00c7aefca98213d071dcaeec7657ac8d587b05772a0dc2bcd599abdc9d8bce249d4e379a1119