Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 09:13
Static task
static1
Behavioral task
behavioral1
Sample
d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe
Resource
win10-20230220-en
General
-
Target
d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe
-
Size
682KB
-
MD5
7ebb30d4eb96e580830e5f1b05929d90
-
SHA1
f3321176c13935fd867480636ca9a85d8b8a1f62
-
SHA256
d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323
-
SHA512
8dd78e7ca184ef13a8688320cd19c099c2e26bb5509896c3a0494c2dbb543dacab946d477cb9b70e66be45950f8ce907048b15a0c931e531db2802f7209651fd
-
SSDEEP
12288:vMrWy90S7D9oZi6y8hilrToV2bt6wV6IutOII6UE2mUL3GfFl4:By0CzrTowNVYM6UmUL29l4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5454.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5454.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2752-178-0x0000000004930000-0x0000000004976000-memory.dmp family_redline behavioral1/memory/2752-179-0x0000000007640000-0x0000000007684000-memory.dmp family_redline behavioral1/memory/2752-180-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-181-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-183-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-185-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-187-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-189-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-191-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-193-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-195-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-197-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-199-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-203-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-207-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-206-0x0000000006FF0000-0x0000000007000000-memory.dmp family_redline behavioral1/memory/2752-209-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-211-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-213-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-215-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/2752-217-0x0000000007640000-0x000000000767F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un078364.exepro5454.exequ3151.exesi298831.exepid process 2112 un078364.exe 3972 pro5454.exe 2752 qu3151.exe 4796 si298831.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5454.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5454.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exeun078364.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un078364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un078364.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5454.exequ3151.exesi298831.exepid process 3972 pro5454.exe 3972 pro5454.exe 2752 qu3151.exe 2752 qu3151.exe 4796 si298831.exe 4796 si298831.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5454.exequ3151.exesi298831.exedescription pid process Token: SeDebugPrivilege 3972 pro5454.exe Token: SeDebugPrivilege 2752 qu3151.exe Token: SeDebugPrivilege 4796 si298831.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exeun078364.exedescription pid process target process PID 5044 wrote to memory of 2112 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe un078364.exe PID 5044 wrote to memory of 2112 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe un078364.exe PID 5044 wrote to memory of 2112 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe un078364.exe PID 2112 wrote to memory of 3972 2112 un078364.exe pro5454.exe PID 2112 wrote to memory of 3972 2112 un078364.exe pro5454.exe PID 2112 wrote to memory of 3972 2112 un078364.exe pro5454.exe PID 2112 wrote to memory of 2752 2112 un078364.exe qu3151.exe PID 2112 wrote to memory of 2752 2112 un078364.exe qu3151.exe PID 2112 wrote to memory of 2752 2112 un078364.exe qu3151.exe PID 5044 wrote to memory of 4796 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe si298831.exe PID 5044 wrote to memory of 4796 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe si298831.exe PID 5044 wrote to memory of 4796 5044 d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe si298831.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe"C:\Users\Admin\AppData\Local\Temp\d83d8a3b52645145233122ac9a48447b02fa9dd41e6b0985cd77760371c30323.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078364.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078364.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5454.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3151.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298831.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298831.exeFilesize
175KB
MD5ff4398e38331f74d8f9fd53eb322def3
SHA1d8b08bfd2a6adc58b85bc68516bd89dab5f7baed
SHA256fb1caaf1a1ec0f9cec2d5120e192350a231409ebb489bdd1bdc6cfb25603cda4
SHA512da8bf893f53e6966d2a0961df7458ebb77b637c1ab8c6ba0e7ce6e30995fe75064beeb12a67abc43fe0b77dde6fce044249c407bfc866ff5093daa9fbedfa71e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298831.exeFilesize
175KB
MD5ff4398e38331f74d8f9fd53eb322def3
SHA1d8b08bfd2a6adc58b85bc68516bd89dab5f7baed
SHA256fb1caaf1a1ec0f9cec2d5120e192350a231409ebb489bdd1bdc6cfb25603cda4
SHA512da8bf893f53e6966d2a0961df7458ebb77b637c1ab8c6ba0e7ce6e30995fe75064beeb12a67abc43fe0b77dde6fce044249c407bfc866ff5093daa9fbedfa71e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078364.exeFilesize
540KB
MD5b72eac085cd983781cf675bd86d9bdcb
SHA19c017f9f1b5497a2e9c13e13d01dccc1210f8472
SHA256578da285fe107b2d2d34498399a1b4610d480e4218ca84fe45f8bce8942ea5c8
SHA51240bd8e151a42364438140a4f77b7ee14b26621a1cdea069a233557b20f704814adc9f2c1683bf6170209d2b6c07f893d5d968ce17a309100189fffad0a8a85d3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078364.exeFilesize
540KB
MD5b72eac085cd983781cf675bd86d9bdcb
SHA19c017f9f1b5497a2e9c13e13d01dccc1210f8472
SHA256578da285fe107b2d2d34498399a1b4610d480e4218ca84fe45f8bce8942ea5c8
SHA51240bd8e151a42364438140a4f77b7ee14b26621a1cdea069a233557b20f704814adc9f2c1683bf6170209d2b6c07f893d5d968ce17a309100189fffad0a8a85d3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5454.exeFilesize
321KB
MD551567bc21ba9bc664660bdd4ab07d55a
SHA13e87635ab4041e923727df56fc94aeadd2e3887a
SHA256202a8720d1d4a1b1a99ea7b8996b1b9695dad245d17bb72ea903d073bc7dc88d
SHA5128c12f1ccc666a01767478bc5a35b6305278d9eb67d1cfb952f3f24b61c9435e352aaa7e4fdbae570991c407862eae73a813e2033e43d3dd5695c8468d34fd375
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5454.exeFilesize
321KB
MD551567bc21ba9bc664660bdd4ab07d55a
SHA13e87635ab4041e923727df56fc94aeadd2e3887a
SHA256202a8720d1d4a1b1a99ea7b8996b1b9695dad245d17bb72ea903d073bc7dc88d
SHA5128c12f1ccc666a01767478bc5a35b6305278d9eb67d1cfb952f3f24b61c9435e352aaa7e4fdbae570991c407862eae73a813e2033e43d3dd5695c8468d34fd375
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3151.exeFilesize
380KB
MD5c298040b3b52fe19df4f27306ac644e3
SHA19b9fcd17d24fd5e82f558dd1ca38f060ec2a77c2
SHA256f1693e3457f09f1114761156e02f0d6c7c02a5520e55bb8d7d99527de2cfd6ec
SHA512e819276e39b0ecbaea43b6e4d6750baaf83cb911d3c34e3bec508eed67611433401c016093c2eaada0eeda2d8417c6a5a2ebf7770aaee3c1813ef44dabdbe763
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3151.exeFilesize
380KB
MD5c298040b3b52fe19df4f27306ac644e3
SHA19b9fcd17d24fd5e82f558dd1ca38f060ec2a77c2
SHA256f1693e3457f09f1114761156e02f0d6c7c02a5520e55bb8d7d99527de2cfd6ec
SHA512e819276e39b0ecbaea43b6e4d6750baaf83cb911d3c34e3bec508eed67611433401c016093c2eaada0eeda2d8417c6a5a2ebf7770aaee3c1813ef44dabdbe763
-
memory/2752-1092-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/2752-1093-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB
-
memory/2752-1106-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-1105-0x0000000009410000-0x0000000009460000-memory.dmpFilesize
320KB
-
memory/2752-1104-0x0000000009390000-0x0000000009406000-memory.dmpFilesize
472KB
-
memory/2752-1103-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-1102-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-1101-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-1100-0x0000000008D50000-0x000000000927C000-memory.dmpFilesize
5.2MB
-
memory/2752-1099-0x0000000008B80000-0x0000000008D42000-memory.dmpFilesize
1.8MB
-
memory/2752-1098-0x0000000008980000-0x0000000008A12000-memory.dmpFilesize
584KB
-
memory/2752-1097-0x0000000007CA0000-0x0000000007D06000-memory.dmpFilesize
408KB
-
memory/2752-1095-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-195-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-1094-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/2752-1091-0x0000000007860000-0x000000000796A000-memory.dmpFilesize
1.0MB
-
memory/2752-1090-0x0000000007DF0000-0x00000000083F6000-memory.dmpFilesize
6.0MB
-
memory/2752-217-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-215-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-213-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-211-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-209-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-206-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-178-0x0000000004930000-0x0000000004976000-memory.dmpFilesize
280KB
-
memory/2752-197-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-180-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-181-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-183-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-185-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-187-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-189-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-191-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-207-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-193-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-179-0x0000000007640000-0x0000000007684000-memory.dmpFilesize
272KB
-
memory/2752-199-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-200-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/2752-202-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/2752-203-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/2752-204-0x0000000006FF0000-0x0000000007000000-memory.dmpFilesize
64KB
-
memory/3972-173-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3972-147-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-139-0x0000000004B50000-0x0000000004B68000-memory.dmpFilesize
96KB
-
memory/3972-155-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-171-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3972-170-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3972-169-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3972-168-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3972-167-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-137-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3972-157-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-165-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-161-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-138-0x0000000007300000-0x00000000077FE000-memory.dmpFilesize
5.0MB
-
memory/3972-149-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-140-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-153-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-151-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-163-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-159-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-145-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-143-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-141-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-136-0x0000000002D90000-0x0000000002DAA000-memory.dmpFilesize
104KB
-
memory/3972-135-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4796-1112-0x0000000000F10000-0x0000000000F42000-memory.dmpFilesize
200KB
-
memory/4796-1113-0x0000000005950000-0x000000000599B000-memory.dmpFilesize
300KB
-
memory/4796-1114-0x00000000057B0000-0x00000000057C0000-memory.dmpFilesize
64KB