Analysis
-
max time kernel
51s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:03
Static task
static1
Behavioral task
behavioral1
Sample
b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe
Resource
win10-20230220-en
General
-
Target
b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe
-
Size
657KB
-
MD5
b7f2c873ae275108c10031b162dc5efa
-
SHA1
7c67fa7567f58ed2dfc4e48e9ed76bd16c780274
-
SHA256
b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024
-
SHA512
0270022af341c7154d50a5bbb424c7e6b0b78a2793f77fda26bd0fce2eb9c2a9a8730be20c1439b5a40eeea1491f24ac81d65b482562971aeff4d7f61c70fff8
-
SSDEEP
12288:UMr4y90+mnOmg8DoEVR1tECoTJOwYLt8aFxj4q44WzWKMu8vvMUIM:0y61oq1t5oTJpYhfZ4L4PKqM9M
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1803.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1803.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2996-178-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/2996-179-0x0000000004FD0000-0x0000000005014000-memory.dmp family_redline behavioral1/memory/2996-181-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-183-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-180-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-185-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-187-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-189-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-191-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-194-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-197-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-201-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-203-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-205-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-207-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-209-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-211-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-213-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-215-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline behavioral1/memory/2996-217-0x0000000004FD0000-0x000000000500F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un215058.exepro1803.exequ9405.exesi659782.exepid process 3432 un215058.exe 1268 pro1803.exe 2996 qu9405.exe 2084 si659782.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1803.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1803.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exeun215058.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un215058.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un215058.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1803.exequ9405.exesi659782.exepid process 1268 pro1803.exe 1268 pro1803.exe 2996 qu9405.exe 2996 qu9405.exe 2084 si659782.exe 2084 si659782.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1803.exequ9405.exesi659782.exedescription pid process Token: SeDebugPrivilege 1268 pro1803.exe Token: SeDebugPrivilege 2996 qu9405.exe Token: SeDebugPrivilege 2084 si659782.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exeun215058.exedescription pid process target process PID 404 wrote to memory of 3432 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe un215058.exe PID 404 wrote to memory of 3432 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe un215058.exe PID 404 wrote to memory of 3432 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe un215058.exe PID 3432 wrote to memory of 1268 3432 un215058.exe pro1803.exe PID 3432 wrote to memory of 1268 3432 un215058.exe pro1803.exe PID 3432 wrote to memory of 1268 3432 un215058.exe pro1803.exe PID 3432 wrote to memory of 2996 3432 un215058.exe qu9405.exe PID 3432 wrote to memory of 2996 3432 un215058.exe qu9405.exe PID 3432 wrote to memory of 2996 3432 un215058.exe qu9405.exe PID 404 wrote to memory of 2084 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe si659782.exe PID 404 wrote to memory of 2084 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe si659782.exe PID 404 wrote to memory of 2084 404 b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe si659782.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe"C:\Users\Admin\AppData\Local\Temp\b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54b411dd84f555ec1f611ea2025a29d1d
SHA1f36a9b77d84ace20e880c625b0b797a04c88d5d0
SHA256fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7
SHA512c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f
-
Filesize
175KB
MD54b411dd84f555ec1f611ea2025a29d1d
SHA1f36a9b77d84ace20e880c625b0b797a04c88d5d0
SHA256fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7
SHA512c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f
-
Filesize
515KB
MD55aa966aac632fe60634086affc8ad07d
SHA1bce84acb3d50db33393f2e6ada1f051c1dd64fe2
SHA2568aafa0af2d9c1732bcd77b8a17893859a45603e7793a8f94b917d1b92b4dcf19
SHA512f2d12760bd06b355d395eeb233c2de7f27a5378d35dbac7f40d75fd645677b381af6e39cc9f78d05937c124147b7f099687f2659b3797bd06348c97a382a61c3
-
Filesize
515KB
MD55aa966aac632fe60634086affc8ad07d
SHA1bce84acb3d50db33393f2e6ada1f051c1dd64fe2
SHA2568aafa0af2d9c1732bcd77b8a17893859a45603e7793a8f94b917d1b92b4dcf19
SHA512f2d12760bd06b355d395eeb233c2de7f27a5378d35dbac7f40d75fd645677b381af6e39cc9f78d05937c124147b7f099687f2659b3797bd06348c97a382a61c3
-
Filesize
235KB
MD5772d26b6dca6f4fc0fa55306cb9fe555
SHA19e8f682e392b8e570fc41a82fdf0bb825a592354
SHA2561184e3b3d936b5e641959b4e281a3bf0fbcfb310751487ddeddbf6d7ce35ecda
SHA5125d8b2d826452fb2a0289f1076b60b5cec713e4ba60e88ab3065185a67079e7f4709b812a951116b2dcc6087c18fe253068653e5b70612c4c74adef549ab9e6fd
-
Filesize
235KB
MD5772d26b6dca6f4fc0fa55306cb9fe555
SHA19e8f682e392b8e570fc41a82fdf0bb825a592354
SHA2561184e3b3d936b5e641959b4e281a3bf0fbcfb310751487ddeddbf6d7ce35ecda
SHA5125d8b2d826452fb2a0289f1076b60b5cec713e4ba60e88ab3065185a67079e7f4709b812a951116b2dcc6087c18fe253068653e5b70612c4c74adef549ab9e6fd
-
Filesize
294KB
MD518c84d08c6e91c6c334be29ca84e11a0
SHA17f3334e5d7cda695210f1e9fe4b19315f8e0979b
SHA25607f8b7d0799921d61ea445aaddb1b00fb7f98ce9b3a431828827ce71e7e00d0d
SHA512663c8dbbd11b74c724165f233ab4127b685440f3ae53cc29626d6e63ef0a13820266b0e9f2dfe0c5b027f935d674e746a0f59fa8e5852b0e50c1cef0fec1374c
-
Filesize
294KB
MD518c84d08c6e91c6c334be29ca84e11a0
SHA17f3334e5d7cda695210f1e9fe4b19315f8e0979b
SHA25607f8b7d0799921d61ea445aaddb1b00fb7f98ce9b3a431828827ce71e7e00d0d
SHA512663c8dbbd11b74c724165f233ab4127b685440f3ae53cc29626d6e63ef0a13820266b0e9f2dfe0c5b027f935d674e746a0f59fa8e5852b0e50c1cef0fec1374c