Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 19:23
Static task
static1
Behavioral task
behavioral1
Sample
37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe
Resource
win10-20230220-en
General
-
Target
37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe
-
Size
660KB
-
MD5
59034de3a271e2b731bc3f934a3badd1
-
SHA1
5000495a080a72ab8aad2ed15fd28d3a0a85e470
-
SHA256
37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f
-
SHA512
0def0b330e365b38677f38d4c6ae94b301643ea1394a34cd32f0c46445c7339634090241aa75ac57216a6f614ce5900ad3e793209432c084506ef447100c2c1a
-
SSDEEP
12288:bMrfy90ODyoGo1UdmR0nMoRF1sdW5YZSl1DdTl6l+:cyV1MmyJl1Bs0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0397.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0397.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4912-151-0x0000000002230000-0x0000000002276000-memory.dmp family_redline behavioral1/memory/4912-156-0x0000000004F90000-0x0000000004FD4000-memory.dmp family_redline behavioral1/memory/4912-181-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-182-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-184-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-186-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-188-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-190-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-192-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-194-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-198-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-202-0x0000000002420000-0x0000000002430000-memory.dmp family_redline behavioral1/memory/4912-201-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-204-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-206-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-208-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-210-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-212-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-214-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/4912-216-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un072904.exepro0397.exepro0397.exequ8211.exesi920073.exepid process 4100 un072904.exe 4120 pro0397.exe 5108 pro0397.exe 4912 qu8211.exe 4756 si920073.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0397.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0397.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exeun072904.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un072904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un072904.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro0397.exedescription pid process target process PID 4120 set thread context of 5108 4120 pro0397.exe pro0397.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0397.exequ8211.exesi920073.exepid process 5108 pro0397.exe 5108 pro0397.exe 4912 qu8211.exe 4912 qu8211.exe 4756 si920073.exe 4756 si920073.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0397.exequ8211.exesi920073.exedescription pid process Token: SeDebugPrivilege 5108 pro0397.exe Token: SeDebugPrivilege 4912 qu8211.exe Token: SeDebugPrivilege 4756 si920073.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exeun072904.exepro0397.exedescription pid process target process PID 5096 wrote to memory of 4100 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe un072904.exe PID 5096 wrote to memory of 4100 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe un072904.exe PID 5096 wrote to memory of 4100 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe un072904.exe PID 4100 wrote to memory of 4120 4100 un072904.exe pro0397.exe PID 4100 wrote to memory of 4120 4100 un072904.exe pro0397.exe PID 4100 wrote to memory of 4120 4100 un072904.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4120 wrote to memory of 5108 4120 pro0397.exe pro0397.exe PID 4100 wrote to memory of 4912 4100 un072904.exe qu8211.exe PID 4100 wrote to memory of 4912 4100 un072904.exe qu8211.exe PID 4100 wrote to memory of 4912 4100 un072904.exe qu8211.exe PID 5096 wrote to memory of 4756 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe si920073.exe PID 5096 wrote to memory of 4756 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe si920073.exe PID 5096 wrote to memory of 4756 5096 37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe si920073.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe"C:\Users\Admin\AppData\Local\Temp\37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bdaef4358a9dc8673a6b08a009f06c4d
SHA14cfb3ffc0827916b1203febd994f627cf077f767
SHA256e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a
SHA5126d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0
-
Filesize
175KB
MD5bdaef4358a9dc8673a6b08a009f06c4d
SHA14cfb3ffc0827916b1203febd994f627cf077f767
SHA256e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a
SHA5126d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0
-
Filesize
517KB
MD5e551663a685ca1f2180d9d449f31d9a8
SHA1eb29a8c55fc06a694f93fc416b7a705cbbbeedc8
SHA256b63a48945b0a515ab0e13ec3f78b7649dc07da3d6832c92eaed4b79b13ef8263
SHA512fb862713744051016061587d59ff932fa894137a5099274642d667447906263483119335c760bcc922442464a00275aa2f32b6a90aee7a5685ab0863bd4ad998
-
Filesize
517KB
MD5e551663a685ca1f2180d9d449f31d9a8
SHA1eb29a8c55fc06a694f93fc416b7a705cbbbeedc8
SHA256b63a48945b0a515ab0e13ec3f78b7649dc07da3d6832c92eaed4b79b13ef8263
SHA512fb862713744051016061587d59ff932fa894137a5099274642d667447906263483119335c760bcc922442464a00275aa2f32b6a90aee7a5685ab0863bd4ad998
-
Filesize
237KB
MD536aa717411e656e1eedd91282d093ebf
SHA12831da8066cf2e701a758407d44feb03c8d191dc
SHA256aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1
SHA5124b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108
-
Filesize
237KB
MD536aa717411e656e1eedd91282d093ebf
SHA12831da8066cf2e701a758407d44feb03c8d191dc
SHA256aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1
SHA5124b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108
-
Filesize
237KB
MD536aa717411e656e1eedd91282d093ebf
SHA12831da8066cf2e701a758407d44feb03c8d191dc
SHA256aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1
SHA5124b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108
-
Filesize
294KB
MD5ea11ef8324cf8b06aca58545d0f9d9ba
SHA169abaf275a95dde4643580de33c5dd75cd0c0d6e
SHA25637775b6114fa7132f99f0fe1b815665364728a09256bbea3bfa33994f307be0b
SHA5129b93d39350adcc93bd1938950480d10a09285819f16c1f2150f0e612854c027948b06b2e87d6ea828a4c1fbecac7f20e7d5487b1d6ee8147a6a813919a253dcd
-
Filesize
294KB
MD5ea11ef8324cf8b06aca58545d0f9d9ba
SHA169abaf275a95dde4643580de33c5dd75cd0c0d6e
SHA25637775b6114fa7132f99f0fe1b815665364728a09256bbea3bfa33994f307be0b
SHA5129b93d39350adcc93bd1938950480d10a09285819f16c1f2150f0e612854c027948b06b2e87d6ea828a4c1fbecac7f20e7d5487b1d6ee8147a6a813919a253dcd