Analysis
-
max time kernel
52s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:46
Static task
static1
Behavioral task
behavioral1
Sample
0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe
Resource
win10-20230220-en
General
-
Target
0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe
-
Size
657KB
-
MD5
332350d8c35eff59c5ac56e27ca627b6
-
SHA1
0788abec754871df3dc24786d92d1dbb58ff12b8
-
SHA256
0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791
-
SHA512
bce04eaf7c92440cb5a6841e703164be9786bca246ca425f2c2fa518f7711d285e64c99b9fdf0aa00985a0963aa98239bc4b56b24ed3b22b34eef3e8cf38b0d2
-
SSDEEP
12288:EMrty90o4oOsHpoO6t49mo/NzALt8wl/Pys44ezWKvI8vjGK:ByP7OtW0h5nyt4nKLGK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1514.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1514.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/1864-177-0x00000000009A0000-0x00000000009E6000-memory.dmp family_redline behavioral1/memory/1864-178-0x0000000002450000-0x0000000002494000-memory.dmp family_redline behavioral1/memory/1864-180-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-179-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-182-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-184-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-186-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-188-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-190-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-192-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-194-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-196-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-198-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-200-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-202-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-204-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-206-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-210-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-214-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-216-0x0000000002450000-0x000000000248F000-memory.dmp family_redline behavioral1/memory/1864-1099-0x0000000004AC0000-0x0000000004AD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un583611.exepro1514.exequ8095.exesi644038.exepid process 3624 un583611.exe 3440 pro1514.exe 1864 qu8095.exe 1444 si644038.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1514.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1514.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exeun583611.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un583611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un583611.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1514.exequ8095.exesi644038.exepid process 3440 pro1514.exe 3440 pro1514.exe 1864 qu8095.exe 1864 qu8095.exe 1444 si644038.exe 1444 si644038.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1514.exequ8095.exesi644038.exedescription pid process Token: SeDebugPrivilege 3440 pro1514.exe Token: SeDebugPrivilege 1864 qu8095.exe Token: SeDebugPrivilege 1444 si644038.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exeun583611.exedescription pid process target process PID 5104 wrote to memory of 3624 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe un583611.exe PID 5104 wrote to memory of 3624 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe un583611.exe PID 5104 wrote to memory of 3624 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe un583611.exe PID 3624 wrote to memory of 3440 3624 un583611.exe pro1514.exe PID 3624 wrote to memory of 3440 3624 un583611.exe pro1514.exe PID 3624 wrote to memory of 3440 3624 un583611.exe pro1514.exe PID 3624 wrote to memory of 1864 3624 un583611.exe qu8095.exe PID 3624 wrote to memory of 1864 3624 un583611.exe qu8095.exe PID 3624 wrote to memory of 1864 3624 un583611.exe qu8095.exe PID 5104 wrote to memory of 1444 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe si644038.exe PID 5104 wrote to memory of 1444 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe si644038.exe PID 5104 wrote to memory of 1444 5104 0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe si644038.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe"C:\Users\Admin\AppData\Local\Temp\0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56644de9f3d56bf950e8fc4a4c655621d
SHA17b0f7baa96d0291c177177887668d528e9753005
SHA256ce671d1767064366974c2e4eb6a6fc4c24c95485357e44e8433d16ff1439aa9b
SHA512a52f88898730dcdc90979fbadf01228633d1b6047e0fad0b477696d389e7b7cb0e915f87e0415b42e1529c3fae67271723f05b8c8909bdb40785625a509599f5
-
Filesize
175KB
MD56644de9f3d56bf950e8fc4a4c655621d
SHA17b0f7baa96d0291c177177887668d528e9753005
SHA256ce671d1767064366974c2e4eb6a6fc4c24c95485357e44e8433d16ff1439aa9b
SHA512a52f88898730dcdc90979fbadf01228633d1b6047e0fad0b477696d389e7b7cb0e915f87e0415b42e1529c3fae67271723f05b8c8909bdb40785625a509599f5
-
Filesize
515KB
MD5351d2ead108779465c2e16dd16e83ee9
SHA13489006fe1be996b79da66024eae070dbff2bb0b
SHA256d9a752c8da1d4bf8c0ea8ad0ea56f9b514204356735607ae7cae0539775e116b
SHA51285e09c04c63b8550c1014b014bbe921a2fc02ef7385262a8a150dac2341673526cfa7bcb4222b57cb1e822b2bffe9c8d68e5adcc8b5eddf428384ccbeca430c1
-
Filesize
515KB
MD5351d2ead108779465c2e16dd16e83ee9
SHA13489006fe1be996b79da66024eae070dbff2bb0b
SHA256d9a752c8da1d4bf8c0ea8ad0ea56f9b514204356735607ae7cae0539775e116b
SHA51285e09c04c63b8550c1014b014bbe921a2fc02ef7385262a8a150dac2341673526cfa7bcb4222b57cb1e822b2bffe9c8d68e5adcc8b5eddf428384ccbeca430c1
-
Filesize
235KB
MD51407b99ed5f5ce5aa71403a4b3cbe505
SHA1f76dc827fb4db5903ca3ecdd268a7e06facd90b0
SHA256e8131c5a6b4ce1acc9137e8659c5a1cea9d912a43531f2c99a43674bd200c18f
SHA512d32c51cb55add47989cfffc4e8b374580ce4b2b6fd7662f412ee3b493384c08356bad37b5a3eaa444e8951898f45c4987ee22863068c53ed3833f7ea54de95f9
-
Filesize
235KB
MD51407b99ed5f5ce5aa71403a4b3cbe505
SHA1f76dc827fb4db5903ca3ecdd268a7e06facd90b0
SHA256e8131c5a6b4ce1acc9137e8659c5a1cea9d912a43531f2c99a43674bd200c18f
SHA512d32c51cb55add47989cfffc4e8b374580ce4b2b6fd7662f412ee3b493384c08356bad37b5a3eaa444e8951898f45c4987ee22863068c53ed3833f7ea54de95f9
-
Filesize
294KB
MD5c5ae65058b61c0281b68243685b2c05b
SHA1d8f06c5678dac10128f51d403278c4c1f9730223
SHA256ada4ca0885de37484e1e8f4bdd4e0c48e3ee628fa9a118c6b1c4e506c5dc18da
SHA51297f983766f9db6eb953d7503c86bfb63cf7b59df16f3c9f93ffa2d8379f4cd15c6953a3dffe6ae6ad665f5431935fb715a5d312994b18fdf8d1555a36a122bef
-
Filesize
294KB
MD5c5ae65058b61c0281b68243685b2c05b
SHA1d8f06c5678dac10128f51d403278c4c1f9730223
SHA256ada4ca0885de37484e1e8f4bdd4e0c48e3ee628fa9a118c6b1c4e506c5dc18da
SHA51297f983766f9db6eb953d7503c86bfb63cf7b59df16f3c9f93ffa2d8379f4cd15c6953a3dffe6ae6ad665f5431935fb715a5d312994b18fdf8d1555a36a122bef