Analysis
-
max time kernel
54s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe
Resource
win10-20230220-en
General
-
Target
c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe
-
Size
666KB
-
MD5
4db8fc1c49a40ce05ecb5eabb40c9e99
-
SHA1
97661204b4f89c117dbd1aa92ebf73692be38e28
-
SHA256
c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88
-
SHA512
d2032f7ae4dc69e7fb738f981cc620100aac8b29d8aa70db82b4af1e96aac0538be9c25e43c460ae5bc6e4a4416a7068403ac4109ae34b0a38a054d4167b2e24
-
SSDEEP
12288:pMrQy90liNHtaw9DW6GJr/GHEMSKnppk+wgLi9qkvf2N8bUecf7qu4Zcr:5y6iSD7Ghdu1f2N8BI7q0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5347.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3884-180-0x00000000025E0000-0x0000000002626000-memory.dmp family_redline behavioral1/memory/3884-181-0x00000000028A0000-0x00000000028E4000-memory.dmp family_redline behavioral1/memory/3884-185-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-187-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-189-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-191-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-193-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-195-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-197-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-199-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-201-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-203-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-205-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-207-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-209-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-211-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-213-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-215-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-217-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/3884-219-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3192 un695175.exe 4100 pro5347.exe 3884 qu7954.exe 4504 si250704.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5347.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un695175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un695175.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4100 pro5347.exe 4100 pro5347.exe 3884 qu7954.exe 3884 qu7954.exe 4504 si250704.exe 4504 si250704.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4100 pro5347.exe Token: SeDebugPrivilege 3884 qu7954.exe Token: SeDebugPrivilege 4504 si250704.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3192 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 66 PID 4308 wrote to memory of 3192 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 66 PID 4308 wrote to memory of 3192 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 66 PID 3192 wrote to memory of 4100 3192 un695175.exe 67 PID 3192 wrote to memory of 4100 3192 un695175.exe 67 PID 3192 wrote to memory of 4100 3192 un695175.exe 67 PID 3192 wrote to memory of 3884 3192 un695175.exe 68 PID 3192 wrote to memory of 3884 3192 un695175.exe 68 PID 3192 wrote to memory of 3884 3192 un695175.exe 68 PID 4308 wrote to memory of 4504 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 70 PID 4308 wrote to memory of 4504 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 70 PID 4308 wrote to memory of 4504 4308 c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe"C:\Users\Admin\AppData\Local\Temp\c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fc91e291023632005b2dfd0966531f53
SHA1635b7ec30c2e160e6c9df124d8e8e28cd96e05d6
SHA2564932206a468861102c761017d644de4a6e6be2e1ba1edd2d03158ad2a4f43872
SHA512baa95e816f03afd684156f765546a229bf99fc55aae231ea2eebbf6d4eba838a4928606d6429ac010717df8be81cf43d535206f62279da33cf5760e27e28ff06
-
Filesize
175KB
MD5fc91e291023632005b2dfd0966531f53
SHA1635b7ec30c2e160e6c9df124d8e8e28cd96e05d6
SHA2564932206a468861102c761017d644de4a6e6be2e1ba1edd2d03158ad2a4f43872
SHA512baa95e816f03afd684156f765546a229bf99fc55aae231ea2eebbf6d4eba838a4928606d6429ac010717df8be81cf43d535206f62279da33cf5760e27e28ff06
-
Filesize
524KB
MD5070221ac61b18ca66d8f23362ccd1304
SHA15b3cdaafe47735da724c5bcfcf6b9f24bfcb91c3
SHA25608f0ade4de91667d522ce9c4a853e0a00ab8e13b94ba039ee36a166caf40cfa2
SHA5124127dbcb3ebc91f6b3e204d37bceda06b96b7a4a6710302a699b7b30ef675dfd17144b2460542e838541cabdb861a812b5f42e4dc8b0e390850ccd580c9781c0
-
Filesize
524KB
MD5070221ac61b18ca66d8f23362ccd1304
SHA15b3cdaafe47735da724c5bcfcf6b9f24bfcb91c3
SHA25608f0ade4de91667d522ce9c4a853e0a00ab8e13b94ba039ee36a166caf40cfa2
SHA5124127dbcb3ebc91f6b3e204d37bceda06b96b7a4a6710302a699b7b30ef675dfd17144b2460542e838541cabdb861a812b5f42e4dc8b0e390850ccd580c9781c0
-
Filesize
294KB
MD5c85f19334dd1563b00c7e9a8c25581e9
SHA19b2da1c8b28cc6f150063f33497b8b08de874596
SHA2567326365bd5a533127d3cffd334ee6676030725cae2ffa0904b5023a5cd858d20
SHA5124b7cad109b4d307fa2a897c7a5f21f1a9c1040fefcb71d48c4e4fa8e842ea594f09e2750fbd9921780000c85c77a29a9666b85c955a21206afbd010e0542e246
-
Filesize
294KB
MD5c85f19334dd1563b00c7e9a8c25581e9
SHA19b2da1c8b28cc6f150063f33497b8b08de874596
SHA2567326365bd5a533127d3cffd334ee6676030725cae2ffa0904b5023a5cd858d20
SHA5124b7cad109b4d307fa2a897c7a5f21f1a9c1040fefcb71d48c4e4fa8e842ea594f09e2750fbd9921780000c85c77a29a9666b85c955a21206afbd010e0542e246
-
Filesize
353KB
MD5e37d00975bfc7fc0d5a2a7cf7e91ab88
SHA10c3cfdbdcfcec5b483d9699a983132c1ff618cc3
SHA256526793ce6223b7791f543eff3bb4ec62ad18471319cecc778ef8344eda46039e
SHA512791cd75fa4d53806d9f7ab34f9101b2429b7b506295d508d24089f557160aea39710cfb44713721948cec2adf7dede95805af0289b3c2068849d82e9fce83082
-
Filesize
353KB
MD5e37d00975bfc7fc0d5a2a7cf7e91ab88
SHA10c3cfdbdcfcec5b483d9699a983132c1ff618cc3
SHA256526793ce6223b7791f543eff3bb4ec62ad18471319cecc778ef8344eda46039e
SHA512791cd75fa4d53806d9f7ab34f9101b2429b7b506295d508d24089f557160aea39710cfb44713721948cec2adf7dede95805af0289b3c2068849d82e9fce83082