Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe
Resource
win10-20230220-en
General
-
Target
fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe
-
Size
660KB
-
MD5
5743c7ab489eedd761711087005e0a52
-
SHA1
3f8f1d1dbda9f6ac3c8090a0f774c49bb7caf3d2
-
SHA256
fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2
-
SHA512
35dbf0ee1e38eb63d8664ee053d375e5fb2789d82d4ee02c27b77a12a9b965427b19d1e8f51d77ac30eefc9a620bb3daf6a50c906dd5610a29d7a610bd14631f
-
SSDEEP
12288:vMrgy90DKwHLH+G8vSmUJpzKI6S79FjlRkoP1w4lHgXeC:XygNLIvS7t9F1PG4lfC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7911.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4500-179-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/4500-180-0x0000000002820000-0x0000000002864000-memory.dmp family_redline behavioral1/memory/4500-181-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-182-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-184-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-186-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-189-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-192-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-196-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-198-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-200-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-202-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-204-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-206-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-208-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-210-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-212-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-214-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-216-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4500-218-0x0000000002820000-0x000000000285F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2464 un664526.exe 2528 pro7911.exe 4500 qu9287.exe 2568 si501840.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7911.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un664526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un664526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2528 pro7911.exe 2528 pro7911.exe 4500 qu9287.exe 4500 qu9287.exe 2568 si501840.exe 2568 si501840.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2528 pro7911.exe Token: SeDebugPrivilege 4500 qu9287.exe Token: SeDebugPrivilege 2568 si501840.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2464 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 66 PID 2136 wrote to memory of 2464 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 66 PID 2136 wrote to memory of 2464 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 66 PID 2464 wrote to memory of 2528 2464 un664526.exe 67 PID 2464 wrote to memory of 2528 2464 un664526.exe 67 PID 2464 wrote to memory of 2528 2464 un664526.exe 67 PID 2464 wrote to memory of 4500 2464 un664526.exe 68 PID 2464 wrote to memory of 4500 2464 un664526.exe 68 PID 2464 wrote to memory of 4500 2464 un664526.exe 68 PID 2136 wrote to memory of 2568 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 70 PID 2136 wrote to memory of 2568 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 70 PID 2136 wrote to memory of 2568 2136 fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe"C:\Users\Admin\AppData\Local\Temp\fe2e5b143085a1bb1c1976e3767dc3b7bb391cfc89f25fc23891359ec43525a2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un664526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un664526.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7911.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7911.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9287.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501840.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD556967c40f47534962f244f29cac81c80
SHA1886685f011447a3be41683f0ea9fad5ce31a20d0
SHA2561841a38271a1dd30850f60299dab85e359712a742290b3899cc349d905f7ea79
SHA51260a500bffd90bb62ffa891ac95ed710af5ec5557f4e36f0dbcd757854ff8e391bbed47955211bfbe11abe1add46bff8982a0cede08422ccb2d1ce647609af8ed
-
Filesize
176KB
MD556967c40f47534962f244f29cac81c80
SHA1886685f011447a3be41683f0ea9fad5ce31a20d0
SHA2561841a38271a1dd30850f60299dab85e359712a742290b3899cc349d905f7ea79
SHA51260a500bffd90bb62ffa891ac95ed710af5ec5557f4e36f0dbcd757854ff8e391bbed47955211bfbe11abe1add46bff8982a0cede08422ccb2d1ce647609af8ed
-
Filesize
518KB
MD52d631f02764d2997e496de626414ab1e
SHA13a76b80d7dc96ca8056058510a65ff2ea3a3125e
SHA25647ff0e5d1323e185e9ef7ecd3da6e9f769fc557409cd62383febb7cece5df0ad
SHA51280e4ddff84b8fb99f86544a32bb1da3940b9e009c95d7740bbfb2f20adb84c6e5ef6261b0f5ffb1ce94a9a12fb8f8e24fecd048e03a2d035033a14551e327d69
-
Filesize
518KB
MD52d631f02764d2997e496de626414ab1e
SHA13a76b80d7dc96ca8056058510a65ff2ea3a3125e
SHA25647ff0e5d1323e185e9ef7ecd3da6e9f769fc557409cd62383febb7cece5df0ad
SHA51280e4ddff84b8fb99f86544a32bb1da3940b9e009c95d7740bbfb2f20adb84c6e5ef6261b0f5ffb1ce94a9a12fb8f8e24fecd048e03a2d035033a14551e327d69
-
Filesize
295KB
MD537e2c3547a1fc3a2ab0912006f18ec16
SHA1894ea22cda6fcbf11f3ec97c6e750989411672e2
SHA256b22d064809df460c7101011201a2f91ed5bf250cc4bfcf31bf903e7dcd137ee3
SHA51228fdd56b4d1b845556540b1cecf6d2a199baa9b8ed5b4caa44cc08d4ed77707687852f9c23ff73b9675019911b69e480ef6e7d5610dc2984ed577942a3485436
-
Filesize
295KB
MD537e2c3547a1fc3a2ab0912006f18ec16
SHA1894ea22cda6fcbf11f3ec97c6e750989411672e2
SHA256b22d064809df460c7101011201a2f91ed5bf250cc4bfcf31bf903e7dcd137ee3
SHA51228fdd56b4d1b845556540b1cecf6d2a199baa9b8ed5b4caa44cc08d4ed77707687852f9c23ff73b9675019911b69e480ef6e7d5610dc2984ed577942a3485436
-
Filesize
353KB
MD54ec9306a4fb866cf2e9423ae7ebd6514
SHA1e799640f52eb3f8a43d320021031a45753781bbb
SHA256fdc1da9085878e5ba764f7bef643b41571b3ffacf67787227f49fd12b93c4c8f
SHA51238cd3cd81ce63087cbfe88b39cac3f719ab68b150ba3289c34195d4c0140ebe8f28eba040b733f2f84c1d140f70820f09fce14e1c14dc05b08d96e269e0f7f37
-
Filesize
353KB
MD54ec9306a4fb866cf2e9423ae7ebd6514
SHA1e799640f52eb3f8a43d320021031a45753781bbb
SHA256fdc1da9085878e5ba764f7bef643b41571b3ffacf67787227f49fd12b93c4c8f
SHA51238cd3cd81ce63087cbfe88b39cac3f719ab68b150ba3289c34195d4c0140ebe8f28eba040b733f2f84c1d140f70820f09fce14e1c14dc05b08d96e269e0f7f37