Analysis
-
max time kernel
50s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe
Resource
win10-20230220-en
General
-
Target
5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe
-
Size
684KB
-
MD5
2b43028df272251a6e11a0ce136dd890
-
SHA1
e0f729b61a099aaed7ac70b5d3947861b3c7c389
-
SHA256
5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494
-
SHA512
de68246e2e7bb51c54542e5e0b383c46598394c8fb2481fbcc14110f61b430d72ceafa8fb922392a51e2e4d8835393e4636fa75c5781f098041b56e34212a965
-
SSDEEP
12288:vMrRy90guu25J0XUJpr0P8bj1iigoyL1wTDoN5QD5jsbB6frOUUammL3qZycNbcl:iyVu9b0Xopj1ii6L1P5Q6bBsqummL2xW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4144.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4144.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/68-176-0x00000000048B0000-0x00000000048F6000-memory.dmp family_redline behavioral1/memory/68-179-0x0000000004BD0000-0x0000000004C14000-memory.dmp family_redline behavioral1/memory/68-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-183-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-185-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-187-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-189-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-193-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-197-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-195-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-199-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-201-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-203-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-205-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-207-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-209-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/68-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un636676.exepro4144.exequ6173.exesi176201.exepid process 3524 un636676.exe 3940 pro4144.exe 68 qu6173.exe 1280 si176201.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4144.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4144.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un636676.exe5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un636676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un636676.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4144.exequ6173.exesi176201.exepid process 3940 pro4144.exe 3940 pro4144.exe 68 qu6173.exe 68 qu6173.exe 1280 si176201.exe 1280 si176201.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4144.exequ6173.exesi176201.exedescription pid process Token: SeDebugPrivilege 3940 pro4144.exe Token: SeDebugPrivilege 68 qu6173.exe Token: SeDebugPrivilege 1280 si176201.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exeun636676.exedescription pid process target process PID 3588 wrote to memory of 3524 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe un636676.exe PID 3588 wrote to memory of 3524 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe un636676.exe PID 3588 wrote to memory of 3524 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe un636676.exe PID 3524 wrote to memory of 3940 3524 un636676.exe pro4144.exe PID 3524 wrote to memory of 3940 3524 un636676.exe pro4144.exe PID 3524 wrote to memory of 3940 3524 un636676.exe pro4144.exe PID 3524 wrote to memory of 68 3524 un636676.exe qu6173.exe PID 3524 wrote to memory of 68 3524 un636676.exe qu6173.exe PID 3524 wrote to memory of 68 3524 un636676.exe qu6173.exe PID 3588 wrote to memory of 1280 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe si176201.exe PID 3588 wrote to memory of 1280 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe si176201.exe PID 3588 wrote to memory of 1280 3588 5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe si176201.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe"C:\Users\Admin\AppData\Local\Temp\5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exeFilesize
175KB
MD55e592c8bea269323b0658ea513fc055a
SHA1d3efd49bdd7438d1a20d9b4a925e2db435bce2db
SHA2564756a9423a3ae57a0d149b6e5cb81920ab7e1755a9f9042e5da8a6fbc45f74fd
SHA5126f7d1007b5b23c2ce08f04a2518d49004ef9196c57fcbd8876a9ef3dd112596dfea16c259480fc29d888faad7fde3d6b9c9c19eef27037c6c80eb0574cf1fec2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exeFilesize
175KB
MD55e592c8bea269323b0658ea513fc055a
SHA1d3efd49bdd7438d1a20d9b4a925e2db435bce2db
SHA2564756a9423a3ae57a0d149b6e5cb81920ab7e1755a9f9042e5da8a6fbc45f74fd
SHA5126f7d1007b5b23c2ce08f04a2518d49004ef9196c57fcbd8876a9ef3dd112596dfea16c259480fc29d888faad7fde3d6b9c9c19eef27037c6c80eb0574cf1fec2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exeFilesize
542KB
MD55bc050edeedd9007830fd248fc6cfa3e
SHA12e40fe01cb64f46a1c3fb0f8868df66d2ea0ead0
SHA2567c9fd4a5a702da4244d14f13ad3de87a28fac1eb9b148a2b034b2ee5d457481b
SHA512836a72bea8f20a559ade429afe39c9f65700d1558c803fd5d95edf241ad039dd0944451554342340803dd01c79406ffdc4ef8f2ff5299f68e925086cd1bb9e59
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exeFilesize
542KB
MD55bc050edeedd9007830fd248fc6cfa3e
SHA12e40fe01cb64f46a1c3fb0f8868df66d2ea0ead0
SHA2567c9fd4a5a702da4244d14f13ad3de87a28fac1eb9b148a2b034b2ee5d457481b
SHA512836a72bea8f20a559ade429afe39c9f65700d1558c803fd5d95edf241ad039dd0944451554342340803dd01c79406ffdc4ef8f2ff5299f68e925086cd1bb9e59
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exeFilesize
321KB
MD5e268bcaad59fae5a7ee485f018c4d1d0
SHA1f45031f1c9555ac3911d7b1e398e888b566efc3a
SHA256c842ad141cfcf5253a335b36055ca3fb24d18949a10e5ad4391489ba84f45e79
SHA51210144476b197446eb9ee523853a57d8a6c05df4de1fdddcdb11e5b5105c1c11710cc9206dacf9b75ae4416aa2bd9f44865fe0274a6e98ec4d56cc584d750fca0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exeFilesize
321KB
MD5e268bcaad59fae5a7ee485f018c4d1d0
SHA1f45031f1c9555ac3911d7b1e398e888b566efc3a
SHA256c842ad141cfcf5253a335b36055ca3fb24d18949a10e5ad4391489ba84f45e79
SHA51210144476b197446eb9ee523853a57d8a6c05df4de1fdddcdb11e5b5105c1c11710cc9206dacf9b75ae4416aa2bd9f44865fe0274a6e98ec4d56cc584d750fca0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exeFilesize
380KB
MD5d0e742c1477a146a8cf1b827336305e1
SHA1a52c1a3266a2aed5a791c723ecf8e230f121ed26
SHA256d5af3f4c4f4f53eed3441b5b7406e1b2168b891c6a5a445c298fa606ff0c2199
SHA5126fec5128587207f72258c1306db6e917d1611577614c548a9c6b5b1a5e87dbcc7dd35ecae82aa5b057f6ad2c2c0bf44d063ee55952300cc8e47fa8a024fe1616
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exeFilesize
380KB
MD5d0e742c1477a146a8cf1b827336305e1
SHA1a52c1a3266a2aed5a791c723ecf8e230f121ed26
SHA256d5af3f4c4f4f53eed3441b5b7406e1b2168b891c6a5a445c298fa606ff0c2199
SHA5126fec5128587207f72258c1306db6e917d1611577614c548a9c6b5b1a5e87dbcc7dd35ecae82aa5b057f6ad2c2c0bf44d063ee55952300cc8e47fa8a024fe1616
-
memory/68-1088-0x0000000007900000-0x0000000007F06000-memory.dmpFilesize
6.0MB
-
memory/68-1090-0x0000000007280000-0x0000000007292000-memory.dmpFilesize
72KB
-
memory/68-209-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-207-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-205-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-1104-0x0000000008F60000-0x000000000948C000-memory.dmpFilesize
5.2MB
-
memory/68-1103-0x0000000008D80000-0x0000000008F42000-memory.dmpFilesize
1.8MB
-
memory/68-189-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-1102-0x0000000008D10000-0x0000000008D60000-memory.dmpFilesize
320KB
-
memory/68-1101-0x0000000008C90000-0x0000000008D06000-memory.dmpFilesize
472KB
-
memory/68-1100-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-1099-0x0000000008970000-0x0000000008A02000-memory.dmpFilesize
584KB
-
memory/68-1098-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-1096-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-1097-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-1095-0x00000000082B0000-0x0000000008316000-memory.dmpFilesize
408KB
-
memory/68-193-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-1093-0x0000000008120000-0x000000000816B000-memory.dmpFilesize
300KB
-
memory/68-1092-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-1091-0x00000000072A0000-0x00000000072DE000-memory.dmpFilesize
248KB
-
memory/68-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-176-0x00000000048B0000-0x00000000048F6000-memory.dmpFilesize
280KB
-
memory/68-178-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-179-0x0000000004BD0000-0x0000000004C14000-memory.dmpFilesize
272KB
-
memory/68-181-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-180-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/68-177-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/68-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-183-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-185-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-187-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-1089-0x0000000007F10000-0x000000000801A000-memory.dmpFilesize
1.0MB
-
memory/68-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-197-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-195-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-199-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-201-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/68-203-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1280-1110-0x0000000000D70000-0x0000000000DA2000-memory.dmpFilesize
200KB
-
memory/1280-1111-0x00000000057D0000-0x000000000581B000-memory.dmpFilesize
300KB
-
memory/1280-1112-0x0000000005620000-0x0000000005630000-memory.dmpFilesize
64KB
-
memory/3940-166-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-168-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-158-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-136-0x0000000004890000-0x00000000048A8000-memory.dmpFilesize
96KB
-
memory/3940-148-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-137-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/3940-138-0x0000000002D90000-0x0000000002DA0000-memory.dmpFilesize
64KB
-
memory/3940-171-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3940-169-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3940-139-0x0000000002D90000-0x0000000002DA0000-memory.dmpFilesize
64KB
-
memory/3940-164-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-162-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-160-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-156-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-154-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-152-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-150-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-146-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-144-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-135-0x00000000072A0000-0x000000000779E000-memory.dmpFilesize
5.0MB
-
memory/3940-134-0x0000000002F20000-0x0000000002F3A000-memory.dmpFilesize
104KB
-
memory/3940-141-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-142-0x0000000004890000-0x00000000048A2000-memory.dmpFilesize
72KB
-
memory/3940-140-0x0000000002D90000-0x0000000002DA0000-memory.dmpFilesize
64KB