Analysis
-
max time kernel
50s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-04-2023 02:44
Static task
static1
Behavioral task
behavioral1
Sample
bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe
Resource
win10-20230220-en
General
-
Target
bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe
-
Size
659KB
-
MD5
07c81b72ac92b7e40a08011ff39d0ef1
-
SHA1
877c37632155b1251fac6f636d58388d1c4bf1ce
-
SHA256
bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af
-
SHA512
32d047511476ef91d59b9c87ffdb1531e425c9c6413d2c9ee6ffb2913b43f3f30b4c85dd692ccd9decc58f3b6e5ab218fa00e7f27c45180d16ea2bf1a226a0ed
-
SSDEEP
12288:EMrMy90Zl2qFuOE0F56EKY2y0+GY41lof5Ksa/Pm3tQdF:Yy+2+x36TvtY41iAdm9QdF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1818.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4400-180-0x0000000002660000-0x00000000026A6000-memory.dmp family_redline behavioral1/memory/4400-181-0x0000000004B30000-0x0000000004B74000-memory.dmp family_redline behavioral1/memory/4400-182-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-183-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-185-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-187-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-189-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-191-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-193-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-195-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-197-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-199-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-201-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-203-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-205-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-207-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-209-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-211-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-213-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-215-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/4400-223-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/4400-1102-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2248 un915569.exe 2600 pro1818.exe 4400 qu7428.exe 3552 si380186.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1818.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un915569.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un915569.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2600 pro1818.exe 2600 pro1818.exe 4400 qu7428.exe 4400 qu7428.exe 3552 si380186.exe 3552 si380186.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2600 pro1818.exe Token: SeDebugPrivilege 4400 qu7428.exe Token: SeDebugPrivilege 3552 si380186.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2248 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 66 PID 2060 wrote to memory of 2248 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 66 PID 2060 wrote to memory of 2248 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 66 PID 2248 wrote to memory of 2600 2248 un915569.exe 67 PID 2248 wrote to memory of 2600 2248 un915569.exe 67 PID 2248 wrote to memory of 2600 2248 un915569.exe 67 PID 2248 wrote to memory of 4400 2248 un915569.exe 68 PID 2248 wrote to memory of 4400 2248 un915569.exe 68 PID 2248 wrote to memory of 4400 2248 un915569.exe 68 PID 2060 wrote to memory of 3552 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 70 PID 2060 wrote to memory of 3552 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 70 PID 2060 wrote to memory of 3552 2060 bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe"C:\Users\Admin\AppData\Local\Temp\bbebced73d21b07851a5be80183630613202ccbc6f07b6890eb088a4489cb8af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un915569.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un915569.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1818.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1818.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7428.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7428.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380186.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5088f7623850c67fd2505d4613f1924ab
SHA1535fc710fd414d92baede2771559baafbf866160
SHA2561adafb994f3cdfbf177d3155de9a6b323f854d55671792833edf6449f852cd5d
SHA51229fdbf325b96103e62e183cf541b590bf8e95442ead99f203a6baea24c4b2f2e0b70edbec2be70795a1fb5d8c6836fda63f9e2dc19ccf76d2e0cbf4d189d0737
-
Filesize
176KB
MD5088f7623850c67fd2505d4613f1924ab
SHA1535fc710fd414d92baede2771559baafbf866160
SHA2561adafb994f3cdfbf177d3155de9a6b323f854d55671792833edf6449f852cd5d
SHA51229fdbf325b96103e62e183cf541b590bf8e95442ead99f203a6baea24c4b2f2e0b70edbec2be70795a1fb5d8c6836fda63f9e2dc19ccf76d2e0cbf4d189d0737
-
Filesize
518KB
MD5cb684eb10124010fefaefe633b402455
SHA1346491893c365be5c862d1f1ea4b9de9dcf7326c
SHA256844d8ce162bca4178d08a97d59fc5456043a8a6acc04b1410e7a0d3717bdadaa
SHA5128aa0f2998854d640ca14f2a3b96379d2216b1d8c7fc13e376dd82f489a6d9e8caddd24977a9e2b26ecae91150e5731559240cc9f963c41a20cc7320b95391497
-
Filesize
518KB
MD5cb684eb10124010fefaefe633b402455
SHA1346491893c365be5c862d1f1ea4b9de9dcf7326c
SHA256844d8ce162bca4178d08a97d59fc5456043a8a6acc04b1410e7a0d3717bdadaa
SHA5128aa0f2998854d640ca14f2a3b96379d2216b1d8c7fc13e376dd82f489a6d9e8caddd24977a9e2b26ecae91150e5731559240cc9f963c41a20cc7320b95391497
-
Filesize
376KB
MD5995c5cf231d61713ca8f5942100a5407
SHA1685405e4bb1d241026962a2d4849da256ba0185b
SHA256664faf80da3aded3e0a1ca27b1dc2445441a99b615bc35a6dfb2abe951452ba6
SHA512985ac76d27bb7ea616f245a2460045956b095b72b6635371606e2c78b2350241fd463694f1e8e7f3c3be735353f73f1695e0feb9dbab5754fcad449b913c6bc7
-
Filesize
376KB
MD5995c5cf231d61713ca8f5942100a5407
SHA1685405e4bb1d241026962a2d4849da256ba0185b
SHA256664faf80da3aded3e0a1ca27b1dc2445441a99b615bc35a6dfb2abe951452ba6
SHA512985ac76d27bb7ea616f245a2460045956b095b72b6635371606e2c78b2350241fd463694f1e8e7f3c3be735353f73f1695e0feb9dbab5754fcad449b913c6bc7
-
Filesize
434KB
MD52de13db459a25e2d5d8de0874f8dd940
SHA1fca80f924c02f41616ee1d8bd6d14eda8354c0d4
SHA2564518ed68b1410158a9d3e2b88ca0716a0b960e17e0e62328329037bcd2e36898
SHA512331a98a783e5748a6ef3890611a27e090180c84a6fbe9ac08feed7e4374edadc2690fc7f4519f5446ee90535fd30431647bea71211e70284ff43d44e97795807
-
Filesize
434KB
MD52de13db459a25e2d5d8de0874f8dd940
SHA1fca80f924c02f41616ee1d8bd6d14eda8354c0d4
SHA2564518ed68b1410158a9d3e2b88ca0716a0b960e17e0e62328329037bcd2e36898
SHA512331a98a783e5748a6ef3890611a27e090180c84a6fbe9ac08feed7e4374edadc2690fc7f4519f5446ee90535fd30431647bea71211e70284ff43d44e97795807