Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 03:22
Static task
static1
Behavioral task
behavioral1
Sample
31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe
Resource
win10-20230220-en
General
-
Target
31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe
-
Size
690KB
-
MD5
0e847c83af55d7ac41d2688d0bc6e7c9
-
SHA1
6ce488102e686f9591a1458a5f1dd2d7fb9aae7e
-
SHA256
31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07
-
SHA512
2216691ede43d347eecd8e148066d83190bd1c01851d2313f0f6605a6e0f8dcfe9188fd5b659ec5a1791ad0d63bce5fb325171531eaa172af5a8b1547a6910f1
-
SSDEEP
12288:XMruy90yHLhArK3VbMmbVNuy565hLuF5W6MEp/EAGuvKFm2figzvn6b9r:1ypHlnbVBEfaF5W6/bWm2agwr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1335.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1335.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2556-181-0x0000000003AA0000-0x0000000003AE6000-memory.dmp family_redline behavioral1/memory/2556-182-0x0000000003B50000-0x0000000003B94000-memory.dmp family_redline behavioral1/memory/2556-183-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-184-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-186-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-188-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-190-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-192-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-194-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-196-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-198-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-200-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-202-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-207-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-210-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-212-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-214-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-216-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-218-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/2556-220-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un093206.exepro1335.exequ0248.exesi971721.exepid process 1420 un093206.exe 3360 pro1335.exe 2556 qu0248.exe 3664 si971721.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1335.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1335.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exeun093206.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un093206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un093206.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1335.exequ0248.exesi971721.exepid process 3360 pro1335.exe 3360 pro1335.exe 2556 qu0248.exe 2556 qu0248.exe 3664 si971721.exe 3664 si971721.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1335.exequ0248.exesi971721.exedescription pid process Token: SeDebugPrivilege 3360 pro1335.exe Token: SeDebugPrivilege 2556 qu0248.exe Token: SeDebugPrivilege 3664 si971721.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exeun093206.exedescription pid process target process PID 3200 wrote to memory of 1420 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe un093206.exe PID 3200 wrote to memory of 1420 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe un093206.exe PID 3200 wrote to memory of 1420 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe un093206.exe PID 1420 wrote to memory of 3360 1420 un093206.exe pro1335.exe PID 1420 wrote to memory of 3360 1420 un093206.exe pro1335.exe PID 1420 wrote to memory of 3360 1420 un093206.exe pro1335.exe PID 1420 wrote to memory of 2556 1420 un093206.exe qu0248.exe PID 1420 wrote to memory of 2556 1420 un093206.exe qu0248.exe PID 1420 wrote to memory of 2556 1420 un093206.exe qu0248.exe PID 3200 wrote to memory of 3664 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe si971721.exe PID 3200 wrote to memory of 3664 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe si971721.exe PID 3200 wrote to memory of 3664 3200 31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe si971721.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe"C:\Users\Admin\AppData\Local\Temp\31132e73affcfbc84a0639632638bfa0eb4d01caf9e2dd5fafb8c2c4a2572a07.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093206.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093206.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1335.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1335.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971721.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971721.exeFilesize
175KB
MD5ae319924277465c35e4d91dc3f5d2f20
SHA1a47382dd4e20d8d4f04b43b7678a1271708fbc87
SHA2562bb4d13c3136834d012893ec5f7c002734364a010c81be75d78f91c311ee8586
SHA512c415068e6953802efeb07d89440d72de3da966a30b75696e8dc6d3ef03729540e86dd92768ddeb89ec52f22dbf44e04a3b4b5b80ffa437128d197ea8ffa99948
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971721.exeFilesize
175KB
MD5ae319924277465c35e4d91dc3f5d2f20
SHA1a47382dd4e20d8d4f04b43b7678a1271708fbc87
SHA2562bb4d13c3136834d012893ec5f7c002734364a010c81be75d78f91c311ee8586
SHA512c415068e6953802efeb07d89440d72de3da966a30b75696e8dc6d3ef03729540e86dd92768ddeb89ec52f22dbf44e04a3b4b5b80ffa437128d197ea8ffa99948
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093206.exeFilesize
548KB
MD5568c8280a945839eb06d956b4b2d16dd
SHA13e6d21f8780e1bd9ea509e0260e76b18aed318af
SHA256c74d462ffd4567200e0c101a7a01b7774665820448e772d9cc5e92ff9398c3ca
SHA5121b910f1a6e13ec0ac85e7a1c01d21482b1962787e98d791c0c1045226ac06522e9222c513beb25b062a7138cc80fba9ef1a9dd21c7d2a805313e4a1a03f147f9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093206.exeFilesize
548KB
MD5568c8280a945839eb06d956b4b2d16dd
SHA13e6d21f8780e1bd9ea509e0260e76b18aed318af
SHA256c74d462ffd4567200e0c101a7a01b7774665820448e772d9cc5e92ff9398c3ca
SHA5121b910f1a6e13ec0ac85e7a1c01d21482b1962787e98d791c0c1045226ac06522e9222c513beb25b062a7138cc80fba9ef1a9dd21c7d2a805313e4a1a03f147f9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1335.exeFilesize
291KB
MD51ae035677a265536c0db3ddb1a1eaa77
SHA19da71a00b6cf46218f4ad7280cd800aa4cc02be3
SHA256bd0092948dc6c9cb17051249b834da06d75b9290bd7ae237db3067a705b2ec47
SHA5125b60e392d125c8bb4b397e1144870a889a7f4bc6a2dbf423c3d24c4147fa4b76b3dfae807626387217ef33c1ce814f90fee8e3efe4fdbfc299c100632b021913
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1335.exeFilesize
291KB
MD51ae035677a265536c0db3ddb1a1eaa77
SHA19da71a00b6cf46218f4ad7280cd800aa4cc02be3
SHA256bd0092948dc6c9cb17051249b834da06d75b9290bd7ae237db3067a705b2ec47
SHA5125b60e392d125c8bb4b397e1144870a889a7f4bc6a2dbf423c3d24c4147fa4b76b3dfae807626387217ef33c1ce814f90fee8e3efe4fdbfc299c100632b021913
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exeFilesize
345KB
MD528991ad346c767b17215823c44f1ea96
SHA1fb44d522ef8e82a82a33cb1296bd0b8a5f3a0251
SHA25633d7f8f560f5cf6c026daac8a8cfe34649d1c8d3bc5f1dbe911168d8cef18387
SHA5126a9c540431bc60fed51d6d1a258a5c3952141a5cca2db27b3c3e2517e08d834cedae7aa32623fdc482c3ca2eb43c0b643c7eb733895bed475bef1222adf351d2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exeFilesize
345KB
MD528991ad346c767b17215823c44f1ea96
SHA1fb44d522ef8e82a82a33cb1296bd0b8a5f3a0251
SHA25633d7f8f560f5cf6c026daac8a8cfe34649d1c8d3bc5f1dbe911168d8cef18387
SHA5126a9c540431bc60fed51d6d1a258a5c3952141a5cca2db27b3c3e2517e08d834cedae7aa32623fdc482c3ca2eb43c0b643c7eb733895bed475bef1222adf351d2
-
memory/2556-1093-0x0000000006680000-0x0000000006C86000-memory.dmpFilesize
6.0MB
-
memory/2556-220-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-1109-0x0000000007E00000-0x000000000832C000-memory.dmpFilesize
5.2MB
-
memory/2556-1108-0x0000000007C30000-0x0000000007DF2000-memory.dmpFilesize
1.8MB
-
memory/2556-1107-0x0000000007BC0000-0x0000000007C10000-memory.dmpFilesize
320KB
-
memory/2556-198-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-1106-0x0000000007B40000-0x0000000007BB6000-memory.dmpFilesize
472KB
-
memory/2556-1105-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-1104-0x00000000071F0000-0x0000000007256000-memory.dmpFilesize
408KB
-
memory/2556-1103-0x0000000007150000-0x00000000071E2000-memory.dmpFilesize
584KB
-
memory/2556-200-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-1102-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-1101-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-1100-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-1098-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-1097-0x0000000006FC0000-0x000000000700B000-memory.dmpFilesize
300KB
-
memory/2556-1096-0x0000000006E70000-0x0000000006EAE000-memory.dmpFilesize
248KB
-
memory/2556-1095-0x0000000006E50000-0x0000000006E62000-memory.dmpFilesize
72KB
-
memory/2556-1094-0x0000000006D10000-0x0000000006E1A000-memory.dmpFilesize
1.0MB
-
memory/2556-207-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-218-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-216-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-214-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-208-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-212-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-181-0x0000000003AA0000-0x0000000003AE6000-memory.dmpFilesize
280KB
-
memory/2556-182-0x0000000003B50000-0x0000000003B94000-memory.dmpFilesize
272KB
-
memory/2556-183-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-184-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-196-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-188-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-190-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-192-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-194-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-186-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-210-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-206-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/2556-203-0x0000000001AA0000-0x0000000001AEB000-memory.dmpFilesize
300KB
-
memory/2556-202-0x0000000003B50000-0x0000000003B8F000-memory.dmpFilesize
252KB
-
memory/2556-205-0x0000000003AF0000-0x0000000003B00000-memory.dmpFilesize
64KB
-
memory/3360-171-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/3360-156-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-144-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-139-0x0000000004DE0000-0x00000000052DE000-memory.dmpFilesize
5.0MB
-
memory/3360-140-0x00000000026F0000-0x0000000002708000-memory.dmpFilesize
96KB
-
memory/3360-176-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/3360-174-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-173-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-172-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-138-0x0000000002370000-0x000000000238A000-memory.dmpFilesize
104KB
-
memory/3360-141-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-170-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-168-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-166-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-164-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-162-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-160-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-158-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-154-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-152-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-150-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-148-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-146-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-145-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-142-0x00000000026F0000-0x0000000002702000-memory.dmpFilesize
72KB
-
memory/3360-137-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3360-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/3664-1115-0x0000000000430000-0x0000000000462000-memory.dmpFilesize
200KB
-
memory/3664-1116-0x0000000002860000-0x00000000028AB000-memory.dmpFilesize
300KB
-
memory/3664-1117-0x00000000050D0000-0x00000000050E0000-memory.dmpFilesize
64KB