Analysis
-
max time kernel
56s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 07:03
Static task
static1
Behavioral task
behavioral1
Sample
14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe
Resource
win10-20230220-en
General
-
Target
14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe
-
Size
684KB
-
MD5
a20f45102500172c01a958456a208210
-
SHA1
4aeeb8ac7d3f102a9645711b83b01d407fa042a4
-
SHA256
14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc
-
SHA512
90f1a867db10be654720bf893a2685c4dc2ed18b5a0b65ac41e06e635cdf7b79b08d7726383a48308e831d42bc89cad3d52cd1e900a68ae538feac9b5a118b0f
-
SSDEEP
12288:VMrcy90H4dvlin/VqiyqbHddqf6StaTHLiDmyhWRaC54lWyytsbp:5yxd9i9q3qb9dJrsqaCK8Ap
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3229.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3229.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3516-181-0x00000000048F0000-0x0000000004936000-memory.dmp family_redline behavioral1/memory/3516-183-0x0000000004A80000-0x0000000004AC4000-memory.dmp family_redline behavioral1/memory/3516-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3516-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un549564.exepro3229.exequ7761.exesi049418.exepid process 2340 un549564.exe 2588 pro3229.exe 3516 qu7761.exe 2812 si049418.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3229.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3229.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exeun549564.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un549564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un549564.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3229.exequ7761.exesi049418.exepid process 2588 pro3229.exe 2588 pro3229.exe 3516 qu7761.exe 3516 qu7761.exe 2812 si049418.exe 2812 si049418.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3229.exequ7761.exesi049418.exedescription pid process Token: SeDebugPrivilege 2588 pro3229.exe Token: SeDebugPrivilege 3516 qu7761.exe Token: SeDebugPrivilege 2812 si049418.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exeun549564.exedescription pid process target process PID 1840 wrote to memory of 2340 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe un549564.exe PID 1840 wrote to memory of 2340 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe un549564.exe PID 1840 wrote to memory of 2340 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe un549564.exe PID 2340 wrote to memory of 2588 2340 un549564.exe pro3229.exe PID 2340 wrote to memory of 2588 2340 un549564.exe pro3229.exe PID 2340 wrote to memory of 2588 2340 un549564.exe pro3229.exe PID 2340 wrote to memory of 3516 2340 un549564.exe qu7761.exe PID 2340 wrote to memory of 3516 2340 un549564.exe qu7761.exe PID 2340 wrote to memory of 3516 2340 un549564.exe qu7761.exe PID 1840 wrote to memory of 2812 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe si049418.exe PID 1840 wrote to memory of 2812 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe si049418.exe PID 1840 wrote to memory of 2812 1840 14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe si049418.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe"C:\Users\Admin\AppData\Local\Temp\14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exeFilesize
175KB
MD5c5ed62b01630e281fc539feef1ca5610
SHA1c4ae0d44780c96c490e082e25087654098c758fe
SHA2568a07699b3ead3aebca2042666182e24d3ffaff0b2d43a746f4e5ee701921c134
SHA5126abd4e5bc192629b46eb7e12b647f665c8681ead7cd2d8a78cd798aa0174ca9129d04a8dd458b7fa02720d25948d6a49db1e57c7eea94571b74c583227b34062
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exeFilesize
175KB
MD5c5ed62b01630e281fc539feef1ca5610
SHA1c4ae0d44780c96c490e082e25087654098c758fe
SHA2568a07699b3ead3aebca2042666182e24d3ffaff0b2d43a746f4e5ee701921c134
SHA5126abd4e5bc192629b46eb7e12b647f665c8681ead7cd2d8a78cd798aa0174ca9129d04a8dd458b7fa02720d25948d6a49db1e57c7eea94571b74c583227b34062
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exeFilesize
542KB
MD506b5a226495479225d1c1a920beb740b
SHA14d73b60275357376e1a67b759bb2c625abdc2364
SHA256e655a7e7af44a39fd8a503a4b04e14c5e4e19e08c7974910ba731d71b09bb44e
SHA51290739fc5216755de22519746fffe0adb05632c3589e90ac052d088951a75c49b4d73c778fc138784a1efffeb4b85f1daf277a53afa99c101c3e4936b3b640f01
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exeFilesize
542KB
MD506b5a226495479225d1c1a920beb740b
SHA14d73b60275357376e1a67b759bb2c625abdc2364
SHA256e655a7e7af44a39fd8a503a4b04e14c5e4e19e08c7974910ba731d71b09bb44e
SHA51290739fc5216755de22519746fffe0adb05632c3589e90ac052d088951a75c49b4d73c778fc138784a1efffeb4b85f1daf277a53afa99c101c3e4936b3b640f01
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exeFilesize
322KB
MD553ad9d4b023f2652aa796a5b73ef2b9f
SHA1435ededc95b8724cb3f290c66d08f8de6d0e56ba
SHA2565f2eb03649214658ab8e2e66a97fee47ecfdefc9ee87884bf01a828a599c2386
SHA512c3ebaea79e88b4532a4290639885fe3bb84412449aeeae41682082efe4555f27e9cb3b5b6bfff6f4e46f30170e08c65958747951d1f6b4f874c8a1d9d27f2dfb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exeFilesize
322KB
MD553ad9d4b023f2652aa796a5b73ef2b9f
SHA1435ededc95b8724cb3f290c66d08f8de6d0e56ba
SHA2565f2eb03649214658ab8e2e66a97fee47ecfdefc9ee87884bf01a828a599c2386
SHA512c3ebaea79e88b4532a4290639885fe3bb84412449aeeae41682082efe4555f27e9cb3b5b6bfff6f4e46f30170e08c65958747951d1f6b4f874c8a1d9d27f2dfb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exeFilesize
379KB
MD565a14f4eadcf093b84b65e5ab57fc659
SHA142e96951c42690c34fe9608de79e293e952d9109
SHA2565167fbc79f099606fac5ac7c805f6dc3e4dd7147e2b7534380eb72ce4702c7bb
SHA512e0686f19897355a8ec728b5437d02a2ac2a791e2ef19d537c0d6392b4bb1815a569791b149f87c6136527c22eaa73c524b41ac0ea9a86bacecc0f60352729087
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exeFilesize
379KB
MD565a14f4eadcf093b84b65e5ab57fc659
SHA142e96951c42690c34fe9608de79e293e952d9109
SHA2565167fbc79f099606fac5ac7c805f6dc3e4dd7147e2b7534380eb72ce4702c7bb
SHA512e0686f19897355a8ec728b5437d02a2ac2a791e2ef19d537c0d6392b4bb1815a569791b149f87c6136527c22eaa73c524b41ac0ea9a86bacecc0f60352729087
-
memory/2588-148-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-158-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-138-0x0000000007170000-0x000000000766E000-memory.dmpFilesize
5.0MB
-
memory/2588-139-0x0000000004C70000-0x0000000004C88000-memory.dmpFilesize
96KB
-
memory/2588-140-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-141-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-142-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-143-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-144-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-146-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/2588-150-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-152-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-154-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-156-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-137-0x0000000004650000-0x000000000466A000-memory.dmpFilesize
104KB
-
memory/2588-160-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-162-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-164-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-166-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-168-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-170-0x0000000004C70000-0x0000000004C82000-memory.dmpFilesize
72KB
-
memory/2588-171-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2588-173-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-172-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-174-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/2588-176-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2812-1110-0x0000000000010000-0x0000000000042000-memory.dmpFilesize
200KB
-
memory/2812-1111-0x0000000004930000-0x000000000497B000-memory.dmpFilesize
300KB
-
memory/2812-1112-0x00000000048A0000-0x00000000048B0000-memory.dmpFilesize
64KB
-
memory/3516-181-0x00000000048F0000-0x0000000004936000-memory.dmpFilesize
280KB
-
memory/3516-184-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-185-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-187-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-189-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-191-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-193-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-197-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-195-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-199-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-201-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-203-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-205-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-207-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-209-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-211-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-213-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-215-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-217-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3516-1090-0x0000000007F10000-0x0000000008516000-memory.dmpFilesize
6.0MB
-
memory/3516-1091-0x0000000007900000-0x0000000007A0A000-memory.dmpFilesize
1.0MB
-
memory/3516-1092-0x0000000004CE0000-0x0000000004CF2000-memory.dmpFilesize
72KB
-
memory/3516-1093-0x0000000004E20000-0x0000000004E5E000-memory.dmpFilesize
248KB
-
memory/3516-1094-0x0000000004E60000-0x0000000004EAB000-memory.dmpFilesize
300KB
-
memory/3516-1095-0x00000000073F0000-0x0000000007400000-memory.dmpFilesize
64KB
-
memory/3516-1097-0x00000000073F0000-0x0000000007400000-memory.dmpFilesize
64KB
-
memory/3516-1098-0x0000000007B60000-0x0000000007BC6000-memory.dmpFilesize
408KB
-
memory/3516-1099-0x0000000008830000-0x00000000088C2000-memory.dmpFilesize
584KB
-
memory/3516-1100-0x0000000008910000-0x0000000008986000-memory.dmpFilesize
472KB
-
memory/3516-1101-0x0000000008AE0000-0x0000000008B30000-memory.dmpFilesize
320KB
-
memory/3516-183-0x0000000004A80000-0x0000000004AC4000-memory.dmpFilesize
272KB
-
memory/3516-182-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/3516-1102-0x0000000008C50000-0x0000000008E12000-memory.dmpFilesize
1.8MB
-
memory/3516-1103-0x0000000008E20000-0x000000000934C000-memory.dmpFilesize
5.2MB
-
memory/3516-1104-0x00000000073F0000-0x0000000007400000-memory.dmpFilesize
64KB