Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 20:25
Static task
static1
Behavioral task
behavioral1
Sample
1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe
Resource
win10-20230220-en
General
-
Target
1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe
-
Size
658KB
-
MD5
082a4fbbff7cacdc4ea22b4f6bf0a98a
-
SHA1
f2096b40fb718d7772a6cbfc82910fd9dda3d468
-
SHA256
1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3
-
SHA512
c9ae13f1e995c066200391ecb78ea6b2fd0277f9099a2fd02111996673cd42de709ff4b7d07859fc09662465b1534a6ab399251bc3d6f4920cc4fa8c75afa731
-
SSDEEP
12288:/MrVy90vHrHoy9OSa/LVRHtAxIQ1ogdqN44tzWKU28vgnWvN7lJm0:2yGtMSyHtG11nqO4wKqN3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4319.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3052-181-0x0000000002250000-0x0000000002296000-memory.dmp family_redline behavioral1/memory/3052-182-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/3052-183-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-184-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-186-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-188-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-190-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-192-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-194-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-196-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-198-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-200-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-202-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-204-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-206-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-208-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-210-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-212-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-214-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-216-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3052-298-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un907141.exepro4319.exequ3482.exesi055970.exepid process 3028 un907141.exe 3832 pro4319.exe 3052 qu3482.exe 3796 si055970.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4319.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4319.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un907141.exe1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un907141.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un907141.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4319.exequ3482.exesi055970.exepid process 3832 pro4319.exe 3832 pro4319.exe 3052 qu3482.exe 3052 qu3482.exe 3796 si055970.exe 3796 si055970.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4319.exequ3482.exesi055970.exedescription pid process Token: SeDebugPrivilege 3832 pro4319.exe Token: SeDebugPrivilege 3052 qu3482.exe Token: SeDebugPrivilege 3796 si055970.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exeun907141.exedescription pid process target process PID 2488 wrote to memory of 3028 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe un907141.exe PID 2488 wrote to memory of 3028 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe un907141.exe PID 2488 wrote to memory of 3028 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe un907141.exe PID 3028 wrote to memory of 3832 3028 un907141.exe pro4319.exe PID 3028 wrote to memory of 3832 3028 un907141.exe pro4319.exe PID 3028 wrote to memory of 3832 3028 un907141.exe pro4319.exe PID 3028 wrote to memory of 3052 3028 un907141.exe qu3482.exe PID 3028 wrote to memory of 3052 3028 un907141.exe qu3482.exe PID 3028 wrote to memory of 3052 3028 un907141.exe qu3482.exe PID 2488 wrote to memory of 3796 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe si055970.exe PID 2488 wrote to memory of 3796 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe si055970.exe PID 2488 wrote to memory of 3796 2488 1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe si055970.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe"C:\Users\Admin\AppData\Local\Temp\1d8d9b4bfdc82f81897b300ee90e0bab7c5a5262b4874fcb4ef5a9ea4e0796b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907141.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3482.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si055970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si055970.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c051a9f1ba819b43742e3ae8419255ba
SHA1f4fe813c5002c18477deefe03a7f944b7e0ca91f
SHA25670ba5d87f340d1f071ecef4592ede002d4330a7b7245e8bb2a504357ee996a17
SHA512f1a03075fa7f94df8387cf4ff7ee80c228e80ed52d87d9d3906c7034443df2190b02994c42656d3d6891050b9b68153ccd6e6e5ba6d8b8087e57042cd36248b9
-
Filesize
175KB
MD5c051a9f1ba819b43742e3ae8419255ba
SHA1f4fe813c5002c18477deefe03a7f944b7e0ca91f
SHA25670ba5d87f340d1f071ecef4592ede002d4330a7b7245e8bb2a504357ee996a17
SHA512f1a03075fa7f94df8387cf4ff7ee80c228e80ed52d87d9d3906c7034443df2190b02994c42656d3d6891050b9b68153ccd6e6e5ba6d8b8087e57042cd36248b9
-
Filesize
516KB
MD5a6c085778fda80700713142728c5b65a
SHA1bf2a1c88a57b8fffbee9fd394eb47d99d902fa8a
SHA2567a1ff7c5ea49c19705b344754815a10ca56fbededacfc7fb8a1762d3f7bef17c
SHA512e291b24a93faff7902589571a70f58f3c98b720c0e597bb263757cf6be8a857c0b412feaa9444a59a45165ba29f08d1f8af4cf0ff238ea2b497a9463663b0b57
-
Filesize
516KB
MD5a6c085778fda80700713142728c5b65a
SHA1bf2a1c88a57b8fffbee9fd394eb47d99d902fa8a
SHA2567a1ff7c5ea49c19705b344754815a10ca56fbededacfc7fb8a1762d3f7bef17c
SHA512e291b24a93faff7902589571a70f58f3c98b720c0e597bb263757cf6be8a857c0b412feaa9444a59a45165ba29f08d1f8af4cf0ff238ea2b497a9463663b0b57
-
Filesize
235KB
MD52209693e1a09715dc2e320cf9e6c95c6
SHA1a8d22fe6888d7ea562c81234aa7c99f11c0a60d2
SHA256481bfbdf71d61e6b0f02d94ece277a4b55f8c06e29bacd0694ee95a981695ec3
SHA512aff015693c46a3874d8e1407fa440f9184be2ef112e89f08e1e4a66d1a16ae4550b71509736db4787702ee008d707e85771eeb3a95d00991fafd6d5a98f5404b
-
Filesize
235KB
MD52209693e1a09715dc2e320cf9e6c95c6
SHA1a8d22fe6888d7ea562c81234aa7c99f11c0a60d2
SHA256481bfbdf71d61e6b0f02d94ece277a4b55f8c06e29bacd0694ee95a981695ec3
SHA512aff015693c46a3874d8e1407fa440f9184be2ef112e89f08e1e4a66d1a16ae4550b71509736db4787702ee008d707e85771eeb3a95d00991fafd6d5a98f5404b
-
Filesize
294KB
MD590b5850a3fa7ce0c34a860c411b61521
SHA1da085773a8efb7b280b59e86514dfc0fc113b872
SHA2568f1b951cfa054336a6982b743516dc11509f4dadf45d1cef291f5754da3afd55
SHA512d7de9d6b185afacde6691d975d047f751a8b187b35f8946dc98980eef7ad1c7a15ebb9e6d531391fcaab3886a143418f8410becf38e95dee856c5ca9e3199b34
-
Filesize
294KB
MD590b5850a3fa7ce0c34a860c411b61521
SHA1da085773a8efb7b280b59e86514dfc0fc113b872
SHA2568f1b951cfa054336a6982b743516dc11509f4dadf45d1cef291f5754da3afd55
SHA512d7de9d6b185afacde6691d975d047f751a8b187b35f8946dc98980eef7ad1c7a15ebb9e6d531391fcaab3886a143418f8410becf38e95dee856c5ca9e3199b34