Analysis
-
max time kernel
55s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/04/2023, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe
Resource
win10-20230220-en
General
-
Target
cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe
-
Size
660KB
-
MD5
ad49faeb13e608b302f9c595e44d0c45
-
SHA1
ba2ce77ac82350011e74460dbd46a9bab00c6b56
-
SHA256
cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42
-
SHA512
e7457a049b0714662ef4ac979b07ba0c559a5cb42801d7027e41f094ad0d70e445d33cc467f9870fa13cb47362de99d0904d645faac21d3835f05aede31cb913
-
SSDEEP
12288:6Mrfy90SZE+PzXtnykj35AmZRHt5cqN2RmIm:pyXZnBGSHt5c20m
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0854.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0854.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0854.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0854.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0854.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3656-179-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/3656-180-0x0000000004F30000-0x0000000004F74000-memory.dmp family_redline behavioral1/memory/3656-181-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-182-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-184-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-186-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-188-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-190-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-192-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-194-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-196-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-198-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-200-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-202-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-204-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-206-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-208-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-210-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-215-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/3656-218-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2420 un470226.exe 2672 pro0854.exe 3656 qu2886.exe 3220 si413288.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0854.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0854.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un470226.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un470226.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2672 pro0854.exe 2672 pro0854.exe 3656 qu2886.exe 3656 qu2886.exe 3220 si413288.exe 3220 si413288.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 pro0854.exe Token: SeDebugPrivilege 3656 qu2886.exe Token: SeDebugPrivilege 3220 si413288.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2420 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 66 PID 2320 wrote to memory of 2420 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 66 PID 2320 wrote to memory of 2420 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 66 PID 2420 wrote to memory of 2672 2420 un470226.exe 67 PID 2420 wrote to memory of 2672 2420 un470226.exe 67 PID 2420 wrote to memory of 2672 2420 un470226.exe 67 PID 2420 wrote to memory of 3656 2420 un470226.exe 68 PID 2420 wrote to memory of 3656 2420 un470226.exe 68 PID 2420 wrote to memory of 3656 2420 un470226.exe 68 PID 2320 wrote to memory of 3220 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 70 PID 2320 wrote to memory of 3220 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 70 PID 2320 wrote to memory of 3220 2320 cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe"C:\Users\Admin\AppData\Local\Temp\cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5ad306887a097d3311bba000df540d52a
SHA1155789ee8d154ec4066b64efed056c3b3121115b
SHA256d16bfb7fa6e17608048c3681302cd26632ab1f6697de0174d52eb855876a05b8
SHA512ed76da42ce73db0b5a5520c37e26077d6e8600b46d3dac9b48df23890d767e2fb4bef5ab9e248cdf3359023c39b2222e7577a7a04df7b7bbd5262cebd463cc42
-
Filesize
176KB
MD5ad306887a097d3311bba000df540d52a
SHA1155789ee8d154ec4066b64efed056c3b3121115b
SHA256d16bfb7fa6e17608048c3681302cd26632ab1f6697de0174d52eb855876a05b8
SHA512ed76da42ce73db0b5a5520c37e26077d6e8600b46d3dac9b48df23890d767e2fb4bef5ab9e248cdf3359023c39b2222e7577a7a04df7b7bbd5262cebd463cc42
-
Filesize
518KB
MD523676fd16b7f5105b02970a1cc56e895
SHA1af25e91e5d0c7032968703c3ed05ec733eb2e048
SHA25645ca79e4ece5b56da90454c89d03f4753a61da64805d39a4738494e3e1b3eee1
SHA512d05adb696322248956158af259dc0ba950844cf3e6aaef9df43688c627a17972afd2c47546113ca113629c3f957f1e17f89e4a01994e614e2b2f50a549ba5510
-
Filesize
518KB
MD523676fd16b7f5105b02970a1cc56e895
SHA1af25e91e5d0c7032968703c3ed05ec733eb2e048
SHA25645ca79e4ece5b56da90454c89d03f4753a61da64805d39a4738494e3e1b3eee1
SHA512d05adb696322248956158af259dc0ba950844cf3e6aaef9df43688c627a17972afd2c47546113ca113629c3f957f1e17f89e4a01994e614e2b2f50a549ba5510
-
Filesize
237KB
MD5459b317eeec5f8194d92105ad58ac0c6
SHA1e9ed10ecc57230410313394738bf0dbde37bbe9e
SHA256bbed870480c20f2fe5adadec5e83128d346e8f404f68339aa82d7170e2dea8fa
SHA512cecbac05a990b5e9d446f57f61e60aba3d9642a6860bf57aca6b82f60a360ca2cadc4686f8421ca41525beee1b176ae969d6d2be48e7c038b77e490c0a7e0eb4
-
Filesize
237KB
MD5459b317eeec5f8194d92105ad58ac0c6
SHA1e9ed10ecc57230410313394738bf0dbde37bbe9e
SHA256bbed870480c20f2fe5adadec5e83128d346e8f404f68339aa82d7170e2dea8fa
SHA512cecbac05a990b5e9d446f57f61e60aba3d9642a6860bf57aca6b82f60a360ca2cadc4686f8421ca41525beee1b176ae969d6d2be48e7c038b77e490c0a7e0eb4
-
Filesize
295KB
MD51f2c9b137c258fa515e718e67f3b4d60
SHA19c730f1659a1a03d6fb0ef92568c4c33847a637b
SHA256e977ecc5e57bfdccd09ad2856d4e045aa355e49c643b00d8e80a2856835c6441
SHA5122e4eac91d728b312b600551f991cdf0e90c37722ae68160754ea08f073b0da390111f41bc43702ae3f17699db5ed039d9fcdaa1fe1efd420cfa04459e5700886
-
Filesize
295KB
MD51f2c9b137c258fa515e718e67f3b4d60
SHA19c730f1659a1a03d6fb0ef92568c4c33847a637b
SHA256e977ecc5e57bfdccd09ad2856d4e045aa355e49c643b00d8e80a2856835c6441
SHA5122e4eac91d728b312b600551f991cdf0e90c37722ae68160754ea08f073b0da390111f41bc43702ae3f17699db5ed039d9fcdaa1fe1efd420cfa04459e5700886