Analysis
-
max time kernel
52s -
max time network
78s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:43
Static task
static1
Behavioral task
behavioral1
Sample
25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe
Resource
win10-20230220-en
General
-
Target
25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe
-
Size
658KB
-
MD5
7df7203bb397ee1fe3beb46ef92ef8cc
-
SHA1
147ae8358964f47dce0ad8703239c8db273cef14
-
SHA256
25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd
-
SHA512
ced232138f3296946b5cdfb0f81938d50d6693f78f0b349956693398e9dfa074779cfe99f631655b2c6879327f7ae37f351a973834bee5303530c4080a17d7f4
-
SSDEEP
12288:dMrjy90kJZq5TSGpPt5W/QnR001LxiKkKE744KzWKaJ8ve5TPwIXK:ayvJHGVtQInRP18WEk4TKmBwI6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9868.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4532-178-0x00000000048B0000-0x00000000048F6000-memory.dmp family_redline behavioral1/memory/4532-179-0x0000000004FB0000-0x0000000004FF4000-memory.dmp family_redline behavioral1/memory/4532-180-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-181-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-183-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-185-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-187-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-189-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-191-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-193-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-195-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-202-0x0000000004920000-0x0000000004930000-memory.dmp family_redline behavioral1/memory/4532-201-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-204-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-197-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-207-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-209-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-211-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-213-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-215-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4532-217-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un515817.exepro9868.exequ4321.exesi256244.exepid process 4456 un515817.exe 3148 pro9868.exe 4532 qu4321.exe 4884 si256244.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9868.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9868.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exeun515817.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un515817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un515817.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9868.exequ4321.exesi256244.exepid process 3148 pro9868.exe 3148 pro9868.exe 4532 qu4321.exe 4532 qu4321.exe 4884 si256244.exe 4884 si256244.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9868.exequ4321.exesi256244.exedescription pid process Token: SeDebugPrivilege 3148 pro9868.exe Token: SeDebugPrivilege 4532 qu4321.exe Token: SeDebugPrivilege 4884 si256244.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exeun515817.exedescription pid process target process PID 4120 wrote to memory of 4456 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe un515817.exe PID 4120 wrote to memory of 4456 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe un515817.exe PID 4120 wrote to memory of 4456 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe un515817.exe PID 4456 wrote to memory of 3148 4456 un515817.exe pro9868.exe PID 4456 wrote to memory of 3148 4456 un515817.exe pro9868.exe PID 4456 wrote to memory of 3148 4456 un515817.exe pro9868.exe PID 4456 wrote to memory of 4532 4456 un515817.exe qu4321.exe PID 4456 wrote to memory of 4532 4456 un515817.exe qu4321.exe PID 4456 wrote to memory of 4532 4456 un515817.exe qu4321.exe PID 4120 wrote to memory of 4884 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe si256244.exe PID 4120 wrote to memory of 4884 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe si256244.exe PID 4120 wrote to memory of 4884 4120 25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe si256244.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe"C:\Users\Admin\AppData\Local\Temp\25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e214e730e4b0c767632064cbe94f5319
SHA11f19115f2b13b55daf5bbf25ac1c7b6420715409
SHA2566ebbcb77f820866efef72e57cac6cf921bf7770aedf544de59a9be8a7ec8ba3c
SHA512fefa6645eb08058969b023431179a4051e92857eb797b09cef91fdb7fe5d07906ab90f5079d7359ee143d50360dac4ad1f980ab7acfe41d94f44d747323937d9
-
Filesize
175KB
MD5e214e730e4b0c767632064cbe94f5319
SHA11f19115f2b13b55daf5bbf25ac1c7b6420715409
SHA2566ebbcb77f820866efef72e57cac6cf921bf7770aedf544de59a9be8a7ec8ba3c
SHA512fefa6645eb08058969b023431179a4051e92857eb797b09cef91fdb7fe5d07906ab90f5079d7359ee143d50360dac4ad1f980ab7acfe41d94f44d747323937d9
-
Filesize
516KB
MD5886007e1fa9ebbeafcda5cc3b0f0f7cf
SHA1d91571d6ace5e1493a4197dbe80bac9ae887bfee
SHA256f783d18a2d413561b593412edd0753d5a0593faed906eacb019b43536ecdd9b3
SHA512506b8cd1099766b4bc417a82841e656a68a05daa9a361d08eaf46f46f7c59301a89a01704934ae3acef57e617657e91d80d786491602354b68ce1bff667a049a
-
Filesize
516KB
MD5886007e1fa9ebbeafcda5cc3b0f0f7cf
SHA1d91571d6ace5e1493a4197dbe80bac9ae887bfee
SHA256f783d18a2d413561b593412edd0753d5a0593faed906eacb019b43536ecdd9b3
SHA512506b8cd1099766b4bc417a82841e656a68a05daa9a361d08eaf46f46f7c59301a89a01704934ae3acef57e617657e91d80d786491602354b68ce1bff667a049a
-
Filesize
235KB
MD5d8e073ed26905fa12937a32ca2ef3490
SHA15ea76aaade90bc25e076ff47b241b94948c38405
SHA25680fc76792814e778adf73531dba4a53b43ae391c457ed3007a9018d4e6bfa3e2
SHA512aee8b2ded36a9834a48e42e61d981076d9090c8240d087b39c9b0f5646ecbf058b2bf3b9e7302e0b0dd14c047188a1d380ed04375073805ebc7c5dd452462a1f
-
Filesize
235KB
MD5d8e073ed26905fa12937a32ca2ef3490
SHA15ea76aaade90bc25e076ff47b241b94948c38405
SHA25680fc76792814e778adf73531dba4a53b43ae391c457ed3007a9018d4e6bfa3e2
SHA512aee8b2ded36a9834a48e42e61d981076d9090c8240d087b39c9b0f5646ecbf058b2bf3b9e7302e0b0dd14c047188a1d380ed04375073805ebc7c5dd452462a1f
-
Filesize
294KB
MD5a52554eb6dbdf46e67e67b66f7b7e12b
SHA1b87f01ce6efb81d55e8745a35d888d2462fe725b
SHA2565f4b1470ff5ad8985168ddefac3a745355d398634fd31f573f4d9d0c035bb6a2
SHA5129cb8ff5679d8ee2a48ec0a2f879c8a4fb692095ad1fde54894e1e420a1223e37fd45b6a87856218a7ea6e48d0694b2ba2fb4da3759599a9fc34dda21fa38b099
-
Filesize
294KB
MD5a52554eb6dbdf46e67e67b66f7b7e12b
SHA1b87f01ce6efb81d55e8745a35d888d2462fe725b
SHA2565f4b1470ff5ad8985168ddefac3a745355d398634fd31f573f4d9d0c035bb6a2
SHA5129cb8ff5679d8ee2a48ec0a2f879c8a4fb692095ad1fde54894e1e420a1223e37fd45b6a87856218a7ea6e48d0694b2ba2fb4da3759599a9fc34dda21fa38b099