Analysis
-
max time kernel
86s -
max time network
120s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe
Resource
win10-20230220-en
General
-
Target
23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe
-
Size
665KB
-
MD5
51c9b9b06dbd7c274a92eab227082865
-
SHA1
ae356e7c03b8f0981be29f145edbcdb7962e71cb
-
SHA256
23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a
-
SHA512
c9910f2e2a29e3f20c21d7ee3673608508340f0d37fe2d767b7d586dd0fcf9b894650741f0999d8b206927aefbc4eaeaac44ab917ed64b15cd5db1ba15268152
-
SSDEEP
12288:xMrqy90WjFPt6Wdj4PGt8/WF9o83+vDu+6tVHKpzHRy3NFbrld4LOCZZA:ryttlj4PqQWYru+6tVHKpdy3NFr4iCD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3307.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4740-179-0x0000000004D10000-0x0000000004D56000-memory.dmp family_redline behavioral1/memory/4740-180-0x0000000004D90000-0x0000000004DD4000-memory.dmp family_redline behavioral1/memory/4740-181-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-182-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-184-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-186-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-188-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-190-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-192-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-194-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-196-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-198-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-200-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-202-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-204-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-206-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-208-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-210-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-212-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-214-0x0000000004D90000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/4740-1101-0x0000000004EE0000-0x0000000004EF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2804 un847035.exe 2988 pro3307.exe 4740 qu7468.exe 3596 si164929.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3307.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un847035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un847035.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 pro3307.exe 2988 pro3307.exe 4740 qu7468.exe 4740 qu7468.exe 3596 si164929.exe 3596 si164929.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 pro3307.exe Token: SeDebugPrivilege 4740 qu7468.exe Token: SeDebugPrivilege 3596 si164929.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2804 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 66 PID 2476 wrote to memory of 2804 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 66 PID 2476 wrote to memory of 2804 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 66 PID 2804 wrote to memory of 2988 2804 un847035.exe 67 PID 2804 wrote to memory of 2988 2804 un847035.exe 67 PID 2804 wrote to memory of 2988 2804 un847035.exe 67 PID 2804 wrote to memory of 4740 2804 un847035.exe 68 PID 2804 wrote to memory of 4740 2804 un847035.exe 68 PID 2804 wrote to memory of 4740 2804 un847035.exe 68 PID 2476 wrote to memory of 3596 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 70 PID 2476 wrote to memory of 3596 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 70 PID 2476 wrote to memory of 3596 2476 23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe"C:\Users\Admin\AppData\Local\Temp\23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD580ee3bd1fae9f832f2b0d61d709e4d48
SHA1505c0a8f96c625b9e85203352b0cfe009fd8b792
SHA256861ba8f3696393283687f355b984f57eb70f2a565eccc552af656fedbba43d7c
SHA512a113ed1d3a0d2fd08972c40afdf4fb5acf44c87c35fe255ac7e4d28af4d42b7efbe275555b05714ee8cb299bebf880618ad5f065508c61f92b36ed2136784620
-
Filesize
175KB
MD580ee3bd1fae9f832f2b0d61d709e4d48
SHA1505c0a8f96c625b9e85203352b0cfe009fd8b792
SHA256861ba8f3696393283687f355b984f57eb70f2a565eccc552af656fedbba43d7c
SHA512a113ed1d3a0d2fd08972c40afdf4fb5acf44c87c35fe255ac7e4d28af4d42b7efbe275555b05714ee8cb299bebf880618ad5f065508c61f92b36ed2136784620
-
Filesize
523KB
MD53787d1fe058ade2f8925a69296824f46
SHA1658bb1ec64bc00a25d72a22ec456dbe82ffdce63
SHA2561ecf8d154a3462c79bc492e3d005e45fc96815aac6e4c1ae774411cae65d9a37
SHA512d03b07a43247c563bbb01c8acd2f4610f377fad332e9af66c62fb7be2f17192c080bea35ffaaf801f2d7e48c70dde28260223a95a95d1e3280480118e742ecac
-
Filesize
523KB
MD53787d1fe058ade2f8925a69296824f46
SHA1658bb1ec64bc00a25d72a22ec456dbe82ffdce63
SHA2561ecf8d154a3462c79bc492e3d005e45fc96815aac6e4c1ae774411cae65d9a37
SHA512d03b07a43247c563bbb01c8acd2f4610f377fad332e9af66c62fb7be2f17192c080bea35ffaaf801f2d7e48c70dde28260223a95a95d1e3280480118e742ecac
-
Filesize
294KB
MD546b68083e8f287bb48d3ecc672cc481a
SHA13cfafbe4bd6b8eaa2b737f76c2d81166df5797d7
SHA25629f9f1885b9b8b8f6ff1dca5e62758ce1606942cceebe6ad1fe9f4eb2e0bf857
SHA51200b94411f5a21a23247563f710dd249e18b20db684bb153ae8ac1f89b7d46158e4633ca81f4d523ab946833af2e4df7036cf44e48d36ce80e5a73d5549d5c9a0
-
Filesize
294KB
MD546b68083e8f287bb48d3ecc672cc481a
SHA13cfafbe4bd6b8eaa2b737f76c2d81166df5797d7
SHA25629f9f1885b9b8b8f6ff1dca5e62758ce1606942cceebe6ad1fe9f4eb2e0bf857
SHA51200b94411f5a21a23247563f710dd249e18b20db684bb153ae8ac1f89b7d46158e4633ca81f4d523ab946833af2e4df7036cf44e48d36ce80e5a73d5549d5c9a0
-
Filesize
353KB
MD596231e9bd222d92b579024f9e5b4e06f
SHA1e89f18a36619eff8619073df7917640e07c8bc65
SHA25639318a299cfdee809ad8418dc56d883fd338af7f4531eb9107f0bf579c7e5456
SHA512f175cbac43034bd4b884490611f07ce95c55e04e19b0831cbcc2f5c4053d25ce150fcbf8ac6c1bee938c18c9b9fa73059803876d8e0e7f483622d0f9109d6ec4
-
Filesize
353KB
MD596231e9bd222d92b579024f9e5b4e06f
SHA1e89f18a36619eff8619073df7917640e07c8bc65
SHA25639318a299cfdee809ad8418dc56d883fd338af7f4531eb9107f0bf579c7e5456
SHA512f175cbac43034bd4b884490611f07ce95c55e04e19b0831cbcc2f5c4053d25ce150fcbf8ac6c1bee938c18c9b9fa73059803876d8e0e7f483622d0f9109d6ec4