Analysis
-
max time kernel
49s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe
Resource
win10-20230220-en
General
-
Target
85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe
-
Size
659KB
-
MD5
793a3826bb9d018ee270f6c7c11d633d
-
SHA1
39aa389940d94f610a71659fe517444061c7b52c
-
SHA256
85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089
-
SHA512
32318f84b2353bc87781dab214c0a196ee13985823340ea43759faca633a42119063d93ae6eeb4b680d5da9cba0a6316dd335956d8c65893e0fedc643e49177f
-
SSDEEP
12288:pMrmy90p9TDYpeQWwG+pO0CQKlra5zOtpotAmhDkVrfRnT44GzWK0P8vYvXIvZRn:nyA9EWwk0qagt0mVtns4/K6X8RKg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9678.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9678.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/4768-176-0x0000000002140000-0x0000000002186000-memory.dmp family_redline behavioral1/memory/4768-177-0x00000000023B0000-0x00000000023F4000-memory.dmp family_redline behavioral1/memory/4768-178-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-179-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-182-0x0000000004C20000-0x0000000004C30000-memory.dmp family_redline behavioral1/memory/4768-183-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-186-0x0000000004C20000-0x0000000004C30000-memory.dmp family_redline behavioral1/memory/4768-187-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-189-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-191-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-193-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-195-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-199-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-197-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-201-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-203-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-205-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-207-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-209-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-211-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-213-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4768-215-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un646771.exepro9678.exequ6348.exesi955647.exepid process 3996 un646771.exe 3508 pro9678.exe 4768 qu6348.exe 3684 si955647.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9678.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9678.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un646771.exe85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un646771.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un646771.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9678.exequ6348.exesi955647.exepid process 3508 pro9678.exe 3508 pro9678.exe 4768 qu6348.exe 4768 qu6348.exe 3684 si955647.exe 3684 si955647.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9678.exequ6348.exesi955647.exedescription pid process Token: SeDebugPrivilege 3508 pro9678.exe Token: SeDebugPrivilege 4768 qu6348.exe Token: SeDebugPrivilege 3684 si955647.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exeun646771.exedescription pid process target process PID 3480 wrote to memory of 3996 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe un646771.exe PID 3480 wrote to memory of 3996 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe un646771.exe PID 3480 wrote to memory of 3996 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe un646771.exe PID 3996 wrote to memory of 3508 3996 un646771.exe pro9678.exe PID 3996 wrote to memory of 3508 3996 un646771.exe pro9678.exe PID 3996 wrote to memory of 3508 3996 un646771.exe pro9678.exe PID 3996 wrote to memory of 4768 3996 un646771.exe qu6348.exe PID 3996 wrote to memory of 4768 3996 un646771.exe qu6348.exe PID 3996 wrote to memory of 4768 3996 un646771.exe qu6348.exe PID 3480 wrote to memory of 3684 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe si955647.exe PID 3480 wrote to memory of 3684 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe si955647.exe PID 3480 wrote to memory of 3684 3480 85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe si955647.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe"C:\Users\Admin\AppData\Local\Temp\85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d7f811f4f890ad58498a5f81815aa57a
SHA16bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4
SHA25658b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d
SHA5120dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435
-
Filesize
175KB
MD5d7f811f4f890ad58498a5f81815aa57a
SHA16bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4
SHA25658b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d
SHA5120dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435
-
Filesize
516KB
MD57f6efc27b6981beb4cc8fdb560553d5a
SHA1f36f744da6332e40d4df27d33069194d5d82a722
SHA2561f0e3c9e8e8269dd5fb78d2a2fa2ff9fae1782f3ebc28929f5ec3b2e06cc2610
SHA512ccca528f9be5245e7a0243b05ddce76e054c5d5f6a119cb740bb73c2a17302e6ec501fa38669d4dde827d5b116b13080ead8f0e3ca4da8e83687f5b6fb7ffc4a
-
Filesize
516KB
MD57f6efc27b6981beb4cc8fdb560553d5a
SHA1f36f744da6332e40d4df27d33069194d5d82a722
SHA2561f0e3c9e8e8269dd5fb78d2a2fa2ff9fae1782f3ebc28929f5ec3b2e06cc2610
SHA512ccca528f9be5245e7a0243b05ddce76e054c5d5f6a119cb740bb73c2a17302e6ec501fa38669d4dde827d5b116b13080ead8f0e3ca4da8e83687f5b6fb7ffc4a
-
Filesize
235KB
MD59d853047861ec23acc2ae9aa4ac52296
SHA18e37fd9e8d6dab5e867412cf5b546f2a1ad82b74
SHA256316469ec552a4173918c7455a324fc790387ca7842969aa0973c006c522c9860
SHA512d1cfdcc5c52a6b6dd1934d9b55b9e42fbc2276101918008509fc856f07c3065366b8f38ca36ff78dcf996daf8e2354c80b7cd33394430013bfdf7fa6a3bd2cea
-
Filesize
235KB
MD59d853047861ec23acc2ae9aa4ac52296
SHA18e37fd9e8d6dab5e867412cf5b546f2a1ad82b74
SHA256316469ec552a4173918c7455a324fc790387ca7842969aa0973c006c522c9860
SHA512d1cfdcc5c52a6b6dd1934d9b55b9e42fbc2276101918008509fc856f07c3065366b8f38ca36ff78dcf996daf8e2354c80b7cd33394430013bfdf7fa6a3bd2cea
-
Filesize
294KB
MD59dcfcee5fca67c6500258a9a6bfff901
SHA14d20d02cf309f72938d72230038765749daab53e
SHA2561b15547b2313fd61bd911597de56ef3dff6c918001b17a19cb96a42fbcd96bfa
SHA51255c3c17d1f4af3cc45ad0736044a41fe3d7cc1fde97ee3dbcb17a3ee10eab2476f37a60d400c20d08e84507d1782b576bd2291078ef8a1c11a2a206ebb8ef334
-
Filesize
294KB
MD59dcfcee5fca67c6500258a9a6bfff901
SHA14d20d02cf309f72938d72230038765749daab53e
SHA2561b15547b2313fd61bd911597de56ef3dff6c918001b17a19cb96a42fbcd96bfa
SHA51255c3c17d1f4af3cc45ad0736044a41fe3d7cc1fde97ee3dbcb17a3ee10eab2476f37a60d400c20d08e84507d1782b576bd2291078ef8a1c11a2a206ebb8ef334