Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 06:23
Static task
static1
Behavioral task
behavioral1
Sample
c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe
Resource
win10-20230220-en
General
-
Target
c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe
-
Size
683KB
-
MD5
f9e6a1b791616892ecd75a400bb86038
-
SHA1
05e13f89a7a46f4bbe4e6ebfd2d78ebe04474cec
-
SHA256
c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f
-
SHA512
2c48bab6e355a3cabfcce6e0461b1f144208a6837a46d28ecef6e19c0f95cd7d6804c99973956ca54ebaba4c198be5166beddeff809c9ad513b1db1ba961a6b2
-
SSDEEP
12288:DMr6y90wUkLSX8YeeUbOynAcDdp0bNoBmdzlwVu47WA+glq:tyNUh7UbbnAchpZB0zlwVp/A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5062.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2856-178-0x0000000002E20000-0x0000000002E66000-memory.dmp family_redline behavioral1/memory/2856-179-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/2856-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2856-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un855119.exepro5062.exequ3750.exesi691537.exepid process 2120 un855119.exe 4248 pro5062.exe 2856 qu3750.exe 4176 si691537.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5062.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5062.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exeun855119.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un855119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un855119.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5062.exequ3750.exesi691537.exepid process 4248 pro5062.exe 4248 pro5062.exe 2856 qu3750.exe 2856 qu3750.exe 4176 si691537.exe 4176 si691537.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5062.exequ3750.exesi691537.exedescription pid process Token: SeDebugPrivilege 4248 pro5062.exe Token: SeDebugPrivilege 2856 qu3750.exe Token: SeDebugPrivilege 4176 si691537.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exeun855119.exedescription pid process target process PID 5044 wrote to memory of 2120 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe un855119.exe PID 5044 wrote to memory of 2120 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe un855119.exe PID 5044 wrote to memory of 2120 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe un855119.exe PID 2120 wrote to memory of 4248 2120 un855119.exe pro5062.exe PID 2120 wrote to memory of 4248 2120 un855119.exe pro5062.exe PID 2120 wrote to memory of 4248 2120 un855119.exe pro5062.exe PID 2120 wrote to memory of 2856 2120 un855119.exe qu3750.exe PID 2120 wrote to memory of 2856 2120 un855119.exe qu3750.exe PID 2120 wrote to memory of 2856 2120 un855119.exe qu3750.exe PID 5044 wrote to memory of 4176 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe si691537.exe PID 5044 wrote to memory of 4176 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe si691537.exe PID 5044 wrote to memory of 4176 5044 c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe si691537.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe"C:\Users\Admin\AppData\Local\Temp\c6ffaa4b0f1a04783af172cfce6b2e8f33eff2c6047f72e92f6dabe0f468d12f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855119.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855119.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3750.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691537.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691537.exeFilesize
175KB
MD5667d0cd239f24bfd6fac1beb0e92df4b
SHA1e856eed05d86abc7f77a3697e1344a7269e7ca34
SHA2566098bf46feecbe5b48cba241d23896fef734f030de08934c5876e75fb68487c0
SHA5128883926ded416e9b59493465e371d85c265ceb814d43d7f4a77753660fe5e8185c42b4f31f2e09a6689e4245ca94b04a391f05b55ceace9ec8e0af23778347ef
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691537.exeFilesize
175KB
MD5667d0cd239f24bfd6fac1beb0e92df4b
SHA1e856eed05d86abc7f77a3697e1344a7269e7ca34
SHA2566098bf46feecbe5b48cba241d23896fef734f030de08934c5876e75fb68487c0
SHA5128883926ded416e9b59493465e371d85c265ceb814d43d7f4a77753660fe5e8185c42b4f31f2e09a6689e4245ca94b04a391f05b55ceace9ec8e0af23778347ef
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855119.exeFilesize
541KB
MD53f4c7258e19b38895df8bae549149417
SHA1ac041e3135253313da54ebb632a75ac8b3f44605
SHA2563e053ef923d212a73877ca6e03fec0150d69bd153133dca9d5ee1d1d3246565a
SHA51243182f3d861664752bbe1b751755be606613469881cc1888077d6ec3c5bb15025149da289aef53d9d0bb386c665ee11eb6f143483e22973b1eea074f91ae6ca5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855119.exeFilesize
541KB
MD53f4c7258e19b38895df8bae549149417
SHA1ac041e3135253313da54ebb632a75ac8b3f44605
SHA2563e053ef923d212a73877ca6e03fec0150d69bd153133dca9d5ee1d1d3246565a
SHA51243182f3d861664752bbe1b751755be606613469881cc1888077d6ec3c5bb15025149da289aef53d9d0bb386c665ee11eb6f143483e22973b1eea074f91ae6ca5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5062.exeFilesize
322KB
MD5286e97d97c937f28f0f7417dc90cd037
SHA143d17d5f8977b5473bd241aee511692b0a1bcc49
SHA2563a2c7cdf372dae95e29477927de7b9a034fdad1dd23d61698b30068cff8256d6
SHA512475c570e3b2497a978f2bf1bda53773d2b9674d7b21691ce6cb6d8d5b1fe70926f3f709f898801cb71cfdfba570fb07b4107054da2ef1f150b4b4253dcce388c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5062.exeFilesize
322KB
MD5286e97d97c937f28f0f7417dc90cd037
SHA143d17d5f8977b5473bd241aee511692b0a1bcc49
SHA2563a2c7cdf372dae95e29477927de7b9a034fdad1dd23d61698b30068cff8256d6
SHA512475c570e3b2497a978f2bf1bda53773d2b9674d7b21691ce6cb6d8d5b1fe70926f3f709f898801cb71cfdfba570fb07b4107054da2ef1f150b4b4253dcce388c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3750.exeFilesize
379KB
MD533bebec9132ae2846f56a3df400e6b3e
SHA1da1570269ba722e92fe6145cbcd813625358aed3
SHA2566ae1a75fd54571e3c479ac7347cadf9e3e5dc5257b01fbbe827b8b0e1425b8bc
SHA512fa1e4e3cac8a32e3f728faefb0ab42e2114f168e68789478225f5c343728b4315d6dfc3df1c1d58faff401016e814c224d5c55173c26f3d93b8e26812fd648a9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3750.exeFilesize
379KB
MD533bebec9132ae2846f56a3df400e6b3e
SHA1da1570269ba722e92fe6145cbcd813625358aed3
SHA2566ae1a75fd54571e3c479ac7347cadf9e3e5dc5257b01fbbe827b8b0e1425b8bc
SHA512fa1e4e3cac8a32e3f728faefb0ab42e2114f168e68789478225f5c343728b4315d6dfc3df1c1d58faff401016e814c224d5c55173c26f3d93b8e26812fd648a9
-
memory/2856-1092-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/2856-1093-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB
-
memory/2856-1106-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-1105-0x0000000009570000-0x00000000095C0000-memory.dmpFilesize
320KB
-
memory/2856-1104-0x00000000094E0000-0x0000000009556000-memory.dmpFilesize
472KB
-
memory/2856-1103-0x0000000008E80000-0x00000000093AC000-memory.dmpFilesize
5.2MB
-
memory/2856-1102-0x0000000008C90000-0x0000000008E52000-memory.dmpFilesize
1.8MB
-
memory/2856-1101-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-1100-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-1099-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-1098-0x0000000008970000-0x0000000008A02000-memory.dmpFilesize
584KB
-
memory/2856-1097-0x0000000007CA0000-0x0000000007D06000-memory.dmpFilesize
408KB
-
memory/2856-1095-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-1094-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/2856-1091-0x0000000007860000-0x000000000796A000-memory.dmpFilesize
1.0MB
-
memory/2856-1090-0x0000000007DF0000-0x00000000083F6000-memory.dmpFilesize
6.0MB
-
memory/2856-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-178-0x0000000002E20000-0x0000000002E66000-memory.dmpFilesize
280KB
-
memory/2856-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-180-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/2856-181-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-182-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-184-0x0000000004960000-0x0000000004970000-memory.dmpFilesize
64KB
-
memory/2856-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-179-0x0000000004AA0000-0x0000000004AE4000-memory.dmpFilesize
272KB
-
memory/2856-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/2856-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4176-1112-0x0000000000310000-0x0000000000342000-memory.dmpFilesize
200KB
-
memory/4176-1114-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4176-1113-0x0000000004D50000-0x0000000004D9B000-memory.dmpFilesize
300KB
-
memory/4248-173-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4248-151-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-170-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4248-169-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-167-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-165-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-137-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4248-153-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-163-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-159-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-138-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4248-161-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-140-0x0000000007270000-0x000000000776E000-memory.dmpFilesize
5.0MB
-
memory/4248-171-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4248-149-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-147-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-143-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-145-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-142-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-141-0x0000000004AA0000-0x0000000004AB8000-memory.dmpFilesize
96KB
-
memory/4248-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4248-135-0x0000000002F90000-0x0000000002FAA000-memory.dmpFilesize
104KB
-
memory/4248-155-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/4248-139-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4248-157-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB