Analysis
-
max time kernel
53s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:27
Static task
static1
Behavioral task
behavioral1
Sample
5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe
Resource
win10-20230220-en
General
-
Target
5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe
-
Size
660KB
-
MD5
accdb0f2dce61f07fc9a9688297ef1ba
-
SHA1
e2dda670ec514e9d89685109491bb8d91aa0df20
-
SHA256
5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3
-
SHA512
4d58b2600db05b75259b3f7079bbb4f4d960ef25707e71cb842e86a7bbd7c582f443a60c519089f533ec25ba2fa69215d9840f82a47e389d3b76fe775b064759
-
SSDEEP
12288:dMrwy90gMxkSnuwBQMctDZzQCUT6GP/y/8egZSmxwxtl6QX:py7mbucbcTU2GS/7DmxOsi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7310.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7310.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4716-149-0x0000000002360000-0x00000000023A6000-memory.dmp family_redline behavioral1/memory/4716-153-0x0000000002640000-0x0000000002684000-memory.dmp family_redline behavioral1/memory/4716-162-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-160-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-166-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-171-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-181-0x00000000023B0000-0x00000000023C0000-memory.dmp family_redline behavioral1/memory/4716-182-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-188-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-192-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-177-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-195-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-199-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-203-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-207-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-209-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-211-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-213-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-215-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-217-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4716-1107-0x00000000023B0000-0x00000000023C0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un013903.exepro7310.exepro7310.exequ1088.exesi667265.exepid process 5044 un013903.exe 4472 pro7310.exe 1780 pro7310.exe 4716 qu1088.exe 4968 si667265.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7310.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7310.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exeun013903.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un013903.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un013903.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro7310.exedescription pid process target process PID 4472 set thread context of 1780 4472 pro7310.exe pro7310.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7310.exequ1088.exesi667265.exepid process 1780 pro7310.exe 1780 pro7310.exe 4716 qu1088.exe 4716 qu1088.exe 4968 si667265.exe 4968 si667265.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7310.exequ1088.exesi667265.exedescription pid process Token: SeDebugPrivilege 1780 pro7310.exe Token: SeDebugPrivilege 4716 qu1088.exe Token: SeDebugPrivilege 4968 si667265.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exeun013903.exepro7310.exedescription pid process target process PID 4452 wrote to memory of 5044 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe un013903.exe PID 4452 wrote to memory of 5044 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe un013903.exe PID 4452 wrote to memory of 5044 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe un013903.exe PID 5044 wrote to memory of 4472 5044 un013903.exe pro7310.exe PID 5044 wrote to memory of 4472 5044 un013903.exe pro7310.exe PID 5044 wrote to memory of 4472 5044 un013903.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 4472 wrote to memory of 1780 4472 pro7310.exe pro7310.exe PID 5044 wrote to memory of 4716 5044 un013903.exe qu1088.exe PID 5044 wrote to memory of 4716 5044 un013903.exe qu1088.exe PID 5044 wrote to memory of 4716 5044 un013903.exe qu1088.exe PID 4452 wrote to memory of 4968 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe si667265.exe PID 4452 wrote to memory of 4968 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe si667265.exe PID 4452 wrote to memory of 4968 4452 5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe si667265.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe"C:\Users\Admin\AppData\Local\Temp\5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51bcd70c4b25dc008630e1028ec832724
SHA1c19a320318e96d8acdf55151d71ed792c45ee60c
SHA2567d1bfe7445b94243257c34b41c7a9023867ed1fa3f626eecaead4b0a12789c7b
SHA512fbc65a76a8b862f894788f13fc1d6eae8f8a492c3336692cb67490b4d5a6e02f90fa029209bd1f6449fe198fed80381edbd423a7a9b04322e47b3e1b7a742af1
-
Filesize
175KB
MD51bcd70c4b25dc008630e1028ec832724
SHA1c19a320318e96d8acdf55151d71ed792c45ee60c
SHA2567d1bfe7445b94243257c34b41c7a9023867ed1fa3f626eecaead4b0a12789c7b
SHA512fbc65a76a8b862f894788f13fc1d6eae8f8a492c3336692cb67490b4d5a6e02f90fa029209bd1f6449fe198fed80381edbd423a7a9b04322e47b3e1b7a742af1
-
Filesize
518KB
MD510b4e4817d433bdbbaafaaf05f4ca54d
SHA1d8bfc0d7203dab7f7ee548f56028f65c29acc38f
SHA256ccca6f3d8b291d7896674cf98c6be811ab3e50814e3625e2c454ba230d07add4
SHA512258eaa5d1b08a09700c01ff8aa49db84821e33fa942b03ef5b369c2c49e6f5e63df102e6ed3e57586ffc8c20a7628a601621652ecb5febc957f350c143e1c411
-
Filesize
518KB
MD510b4e4817d433bdbbaafaaf05f4ca54d
SHA1d8bfc0d7203dab7f7ee548f56028f65c29acc38f
SHA256ccca6f3d8b291d7896674cf98c6be811ab3e50814e3625e2c454ba230d07add4
SHA512258eaa5d1b08a09700c01ff8aa49db84821e33fa942b03ef5b369c2c49e6f5e63df102e6ed3e57586ffc8c20a7628a601621652ecb5febc957f350c143e1c411
-
Filesize
237KB
MD5f72fa26d1e3e8913b45ec4c7dd75d91a
SHA1232712fe99115866e3732db9064bfcd58a1d99ee
SHA2568ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8
SHA512795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3
-
Filesize
237KB
MD5f72fa26d1e3e8913b45ec4c7dd75d91a
SHA1232712fe99115866e3732db9064bfcd58a1d99ee
SHA2568ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8
SHA512795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3
-
Filesize
237KB
MD5f72fa26d1e3e8913b45ec4c7dd75d91a
SHA1232712fe99115866e3732db9064bfcd58a1d99ee
SHA2568ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8
SHA512795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3
-
Filesize
294KB
MD5173b81d815b01b5105050d2b0371925c
SHA18d690dab9982a00ac0b02dbab396ba7b2e84da87
SHA256203688982ec70d633596a6833ecb1af28001d22db386157817b6218cd55aabec
SHA5120daea010d332884400ec6b8d10c1114d0abaeaa9280cc57859681a867ee727d8a3bbca2e40c097e7dfe58b932a1c4cf071f021840ff49fadc72e9e8a760261c6
-
Filesize
294KB
MD5173b81d815b01b5105050d2b0371925c
SHA18d690dab9982a00ac0b02dbab396ba7b2e84da87
SHA256203688982ec70d633596a6833ecb1af28001d22db386157817b6218cd55aabec
SHA5120daea010d332884400ec6b8d10c1114d0abaeaa9280cc57859681a867ee727d8a3bbca2e40c097e7dfe58b932a1c4cf071f021840ff49fadc72e9e8a760261c6