Analysis
-
max time kernel
58s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-04-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe
Resource
win10-20230220-en
General
-
Target
35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe
-
Size
659KB
-
MD5
3cf89559b707657aec53e5b2eb92f9a5
-
SHA1
52a764e018511167c53a10d4c4445041db2a386a
-
SHA256
35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a
-
SHA512
835c3103640fdbd634ddf9ba496dd69781ec7a490817ac61e761d63e8c3dce2a89243127af6731872498ee39625b2ad58eeead042e46459329c721ce50b45d92
-
SSDEEP
12288:qMrqy9014VzMgFw6agjBUibszb6EJOFhlRYHlJZrvD67Et6:0yIovFwVoBbaJOFC87Et6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7433.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4620-177-0x00000000024A0000-0x00000000024E6000-memory.dmp family_redline behavioral1/memory/4620-180-0x0000000002820000-0x0000000002864000-memory.dmp family_redline behavioral1/memory/4620-183-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-186-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-184-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-188-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-190-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-192-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-194-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-196-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-198-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-200-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-202-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-204-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-206-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-208-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-210-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-212-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-214-0x0000000002820000-0x000000000285F000-memory.dmp family_redline behavioral1/memory/4620-216-0x0000000002820000-0x000000000285F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3472 un275350.exe 4532 pro7433.exe 4620 qu4344.exe 1536 si092197.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7433.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un275350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un275350.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4532 pro7433.exe 4532 pro7433.exe 4620 qu4344.exe 4620 qu4344.exe 1536 si092197.exe 1536 si092197.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4532 pro7433.exe Token: SeDebugPrivilege 4620 qu4344.exe Token: SeDebugPrivilege 1536 si092197.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3472 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 66 PID 3440 wrote to memory of 3472 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 66 PID 3440 wrote to memory of 3472 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 66 PID 3472 wrote to memory of 4532 3472 un275350.exe 67 PID 3472 wrote to memory of 4532 3472 un275350.exe 67 PID 3472 wrote to memory of 4532 3472 un275350.exe 67 PID 3472 wrote to memory of 4620 3472 un275350.exe 68 PID 3472 wrote to memory of 4620 3472 un275350.exe 68 PID 3472 wrote to memory of 4620 3472 un275350.exe 68 PID 3440 wrote to memory of 1536 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 70 PID 3440 wrote to memory of 1536 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 70 PID 3440 wrote to memory of 1536 3440 35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe"C:\Users\Admin\AppData\Local\Temp\35239ee8ab38b5be126c1f8942e792547bf262b13aafdeb23ea73d3c5185516a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7433.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7433.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4344.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4344.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092197.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5fbfe252d6ab4639daea7cdc13a6b8c12
SHA14f4f0a3da26053e2956345a2f6303a15d530bb78
SHA256ee9c27c0fe3aeededd364cd45853e0858dcaca674b60cdd1766a437ae2c8789e
SHA51249f63aa567786069f097301367b4523e10c376b83a94191dff192b1ec8b1653eaf760257b06fb8cccded6e84144ee264570a63e1b7fd5c8069531112b60fb724
-
Filesize
177KB
MD5fbfe252d6ab4639daea7cdc13a6b8c12
SHA14f4f0a3da26053e2956345a2f6303a15d530bb78
SHA256ee9c27c0fe3aeededd364cd45853e0858dcaca674b60cdd1766a437ae2c8789e
SHA51249f63aa567786069f097301367b4523e10c376b83a94191dff192b1ec8b1653eaf760257b06fb8cccded6e84144ee264570a63e1b7fd5c8069531112b60fb724
-
Filesize
518KB
MD583e6cc7258bbae40c024d1c963b42abf
SHA16a7279a1999c844b5914510f4325da6a8c8e3c10
SHA256132713b8448b9bf280d958cc614100a1040687fb3f45ab18728ae93d9b41b66c
SHA512f2fbe617f71ab16ffa1fff060b6545d35e413e73dc44518c68029ba548a6230112705b2fa45f990f1614fa429f3c08320e1f02401f00afcd5e226c0c2dacc5f4
-
Filesize
518KB
MD583e6cc7258bbae40c024d1c963b42abf
SHA16a7279a1999c844b5914510f4325da6a8c8e3c10
SHA256132713b8448b9bf280d958cc614100a1040687fb3f45ab18728ae93d9b41b66c
SHA512f2fbe617f71ab16ffa1fff060b6545d35e413e73dc44518c68029ba548a6230112705b2fa45f990f1614fa429f3c08320e1f02401f00afcd5e226c0c2dacc5f4
-
Filesize
295KB
MD5295bdfd3bc66ab99a1aa1599be3df59d
SHA1799ae88c5baff18bc65cd02c93b0da0f2c767a5e
SHA256711952bb928ede3c9d1a49dca0b790f51ea4ee81f170fc477614d7ef52818f25
SHA5124dfeab71e0ead88f219a4ce6bcebe4168df13f8573b8adeffa8bbfd106361f43882c136b2cb53e9fcc267b28973b5e5badc10b3ef16222f72a09329c0ef52bdb
-
Filesize
295KB
MD5295bdfd3bc66ab99a1aa1599be3df59d
SHA1799ae88c5baff18bc65cd02c93b0da0f2c767a5e
SHA256711952bb928ede3c9d1a49dca0b790f51ea4ee81f170fc477614d7ef52818f25
SHA5124dfeab71e0ead88f219a4ce6bcebe4168df13f8573b8adeffa8bbfd106361f43882c136b2cb53e9fcc267b28973b5e5badc10b3ef16222f72a09329c0ef52bdb
-
Filesize
353KB
MD5a10c23c815e00fb99fded0c4f1f8d2a9
SHA1c18c484880c861333ade38742b5da247b2b21f76
SHA256269fa89942a72e10affc5b0aab71dc1364bc15033cfdbc266a018417e4e04d70
SHA5122525fe42670ba8a284cf81d6a30d74362560bf7f4bb580ec83ddcbdb393c6160eff82e89c0506da7ba2faaa80a3a6ae2dbc2f32eac737339c412db599530b154
-
Filesize
353KB
MD5a10c23c815e00fb99fded0c4f1f8d2a9
SHA1c18c484880c861333ade38742b5da247b2b21f76
SHA256269fa89942a72e10affc5b0aab71dc1364bc15033cfdbc266a018417e4e04d70
SHA5122525fe42670ba8a284cf81d6a30d74362560bf7f4bb580ec83ddcbdb393c6160eff82e89c0506da7ba2faaa80a3a6ae2dbc2f32eac737339c412db599530b154