Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe
Resource
win10-20230220-en
General
-
Target
2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe
-
Size
666KB
-
MD5
b3e36223d3d075e550e97baab6c626bb
-
SHA1
125cc6bc5d604786220e5c6978707bfb92e6e430
-
SHA256
2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16
-
SHA512
3eecd4ba06323a6984665b7f76d922527500ea3568c41aa6bb66bbd6971d841b9b2cf629462052d318af59d6816aa0b8b8a8f44298875a9ea49a60d5ff2e3b51
-
SSDEEP
12288:DMrUy90T8vRnaakDJNwTGlfFQrwH7o7lktS8PKxklyohWzC6dckkL:DyHvRpkDJNwBwHlixklpWdi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4363.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/952-179-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/952-180-0x0000000002720000-0x0000000002764000-memory.dmp family_redline behavioral1/memory/952-181-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-184-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-182-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-186-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-188-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-190-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-192-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-194-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-196-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-198-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-200-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-202-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-204-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-206-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-208-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-210-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-215-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/952-218-0x0000000002720000-0x000000000275F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4236 un098761.exe 4208 pro4363.exe 952 qu4191.exe 4916 si527760.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4363.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un098761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un098761.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4208 pro4363.exe 4208 pro4363.exe 952 qu4191.exe 952 qu4191.exe 4916 si527760.exe 4916 si527760.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4208 pro4363.exe Token: SeDebugPrivilege 952 qu4191.exe Token: SeDebugPrivilege 4916 si527760.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4236 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 66 PID 2760 wrote to memory of 4236 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 66 PID 2760 wrote to memory of 4236 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 66 PID 4236 wrote to memory of 4208 4236 un098761.exe 67 PID 4236 wrote to memory of 4208 4236 un098761.exe 67 PID 4236 wrote to memory of 4208 4236 un098761.exe 67 PID 4236 wrote to memory of 952 4236 un098761.exe 68 PID 4236 wrote to memory of 952 4236 un098761.exe 68 PID 4236 wrote to memory of 952 4236 un098761.exe 68 PID 2760 wrote to memory of 4916 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 70 PID 2760 wrote to memory of 4916 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 70 PID 2760 wrote to memory of 4916 2760 2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe"C:\Users\Admin\AppData\Local\Temp\2514a75e9c3cf3e3bb9806654b1d563d7a8d88b7e03419a5cedd44ef8bdc3b16.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098761.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4363.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4191.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527760.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54098a78292caaa13eeed5d294ed06bb2
SHA1094f0619c6990335103211bf875b16146c1c05bc
SHA256546f8dc365aacdf2cd313002009ad7c4255d9f368b54053c7deffdedb1fe9b67
SHA5121881e2c44e0706669ac3b9b9980e5b1d27d743cd5371909a2fa161d75cff934e0d8356a495cd48e356f85424db927c87d5e09febf38bd859693c5b91154e54bb
-
Filesize
175KB
MD54098a78292caaa13eeed5d294ed06bb2
SHA1094f0619c6990335103211bf875b16146c1c05bc
SHA256546f8dc365aacdf2cd313002009ad7c4255d9f368b54053c7deffdedb1fe9b67
SHA5121881e2c44e0706669ac3b9b9980e5b1d27d743cd5371909a2fa161d75cff934e0d8356a495cd48e356f85424db927c87d5e09febf38bd859693c5b91154e54bb
-
Filesize
524KB
MD58ff381df292286b90f9fe37327856bc2
SHA1602907934c131859ebab833add2dd4d929ca5cad
SHA256e8bd2eefa50d5b589473a1b9e054ddf96a1ba88eabb70b494a1229d68d36ae15
SHA51233ef448aff080007d26d345f3dba92511a8142debd4231ad0953744eed58d9fe415743480535c06a3049d8a3c638d39e19df62738b6088facf2f1af512efa40d
-
Filesize
524KB
MD58ff381df292286b90f9fe37327856bc2
SHA1602907934c131859ebab833add2dd4d929ca5cad
SHA256e8bd2eefa50d5b589473a1b9e054ddf96a1ba88eabb70b494a1229d68d36ae15
SHA51233ef448aff080007d26d345f3dba92511a8142debd4231ad0953744eed58d9fe415743480535c06a3049d8a3c638d39e19df62738b6088facf2f1af512efa40d
-
Filesize
295KB
MD59368334eec95a9eb00fae7454509eb16
SHA1b532802fb18afa7c5ecc72c13e2acc8757556b0d
SHA2565cf8dba30abbf92fe7170f71d9b3bd5f5c2f4430872238dae2efe84a1af793a3
SHA512b346b5c3b7f6426ccb0142471b4931d7a77c302270167af27dba44577d23bea51b8459b143e305e3591d7a378bd3cce4f4c01aabb571a9ce2a242d980036679c
-
Filesize
295KB
MD59368334eec95a9eb00fae7454509eb16
SHA1b532802fb18afa7c5ecc72c13e2acc8757556b0d
SHA2565cf8dba30abbf92fe7170f71d9b3bd5f5c2f4430872238dae2efe84a1af793a3
SHA512b346b5c3b7f6426ccb0142471b4931d7a77c302270167af27dba44577d23bea51b8459b143e305e3591d7a378bd3cce4f4c01aabb571a9ce2a242d980036679c
-
Filesize
353KB
MD5c49f7392ba59cbe30d8610f09a863a03
SHA17df8ac3b916baf364777b794c98fecef3c9db582
SHA2566b56c76d572b383573ff108058ee5cafe6f077499c7177b4acb46d5425415493
SHA512784b03b341394502b308e129c13b91780257ad509ade1d139f14522f1783a86a7d06a2a1121ef21e331eab3d0ae01519796576a4821e7708dc8f2d961a0b86b6
-
Filesize
353KB
MD5c49f7392ba59cbe30d8610f09a863a03
SHA17df8ac3b916baf364777b794c98fecef3c9db582
SHA2566b56c76d572b383573ff108058ee5cafe6f077499c7177b4acb46d5425415493
SHA512784b03b341394502b308e129c13b91780257ad509ade1d139f14522f1783a86a7d06a2a1121ef21e331eab3d0ae01519796576a4821e7708dc8f2d961a0b86b6