Analysis
-
max time kernel
54s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 08:32
Static task
static1
Behavioral task
behavioral1
Sample
6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe
Resource
win10-20230220-en
General
-
Target
6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe
-
Size
683KB
-
MD5
a07c9998dc3a58ddec73cc84c0c2a32f
-
SHA1
3570dab349675c58c1467b34ea80fc8375a38df3
-
SHA256
6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d
-
SHA512
fb943d13aa608d07f1e5a14a6c95d5d0c1dc6e1ff34138e3e72033198e8a98ec377bcfbf53036d7860ada432845b8190d25a6b6db9fa90201c411611ffd37e3d
-
SSDEEP
12288:/MrVy90hRPgnpPqMxykAIWd2RLOFDlnKs49lqHVOLUxEmZD3nHMUg:Ky+SpP7NQ21OB4/qHVSdmZDXsv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7676.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/3884-181-0x00000000048A0000-0x00000000048E6000-memory.dmp family_redline behavioral1/memory/3884-182-0x0000000007640000-0x0000000007684000-memory.dmp family_redline behavioral1/memory/3884-183-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-184-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-186-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-190-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-188-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-192-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-194-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-196-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-198-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-200-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-202-0x0000000004900000-0x0000000004910000-memory.dmp family_redline behavioral1/memory/3884-203-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-206-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-207-0x0000000004900000-0x0000000004910000-memory.dmp family_redline behavioral1/memory/3884-209-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-211-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-215-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-213-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-217-0x0000000007640000-0x000000000767F000-memory.dmp family_redline behavioral1/memory/3884-219-0x0000000007640000-0x000000000767F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un840332.exepro7676.exequ6506.exesi838181.exepid process 3192 un840332.exe 1720 pro7676.exe 3884 qu6506.exe 4504 si838181.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7676.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7676.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exeun840332.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un840332.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un840332.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7676.exequ6506.exesi838181.exepid process 1720 pro7676.exe 1720 pro7676.exe 3884 qu6506.exe 3884 qu6506.exe 4504 si838181.exe 4504 si838181.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7676.exequ6506.exesi838181.exedescription pid process Token: SeDebugPrivilege 1720 pro7676.exe Token: SeDebugPrivilege 3884 qu6506.exe Token: SeDebugPrivilege 4504 si838181.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exeun840332.exedescription pid process target process PID 4300 wrote to memory of 3192 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe un840332.exe PID 4300 wrote to memory of 3192 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe un840332.exe PID 4300 wrote to memory of 3192 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe un840332.exe PID 3192 wrote to memory of 1720 3192 un840332.exe pro7676.exe PID 3192 wrote to memory of 1720 3192 un840332.exe pro7676.exe PID 3192 wrote to memory of 1720 3192 un840332.exe pro7676.exe PID 3192 wrote to memory of 3884 3192 un840332.exe qu6506.exe PID 3192 wrote to memory of 3884 3192 un840332.exe qu6506.exe PID 3192 wrote to memory of 3884 3192 un840332.exe qu6506.exe PID 4300 wrote to memory of 4504 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe si838181.exe PID 4300 wrote to memory of 4504 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe si838181.exe PID 4300 wrote to memory of 4504 4300 6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe si838181.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe"C:\Users\Admin\AppData\Local\Temp\6b0130fcbb99d02f64eebb4f544699f21319f79f8bf37f9800a8d39b4ab41d7d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840332.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840332.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7676.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6506.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si838181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si838181.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si838181.exeFilesize
175KB
MD52bbc86f1db90c18128a5b2a0fcdf9175
SHA1fcbd0f4f99b376bed11064fe2d6e2d8b03e1f88e
SHA2566ac818e0497911c6c2cf19f2ca5f904b97c0de956cf4ca02b0231a3cd2809a4a
SHA51294da9f79f0d2b5409b10f44d7d2e2072db08fbb13a413194dc0afffe7b4146be0cecf7f6f19f80af4814bccf1277b7448fd142469d89935df5fb853517299bc8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si838181.exeFilesize
175KB
MD52bbc86f1db90c18128a5b2a0fcdf9175
SHA1fcbd0f4f99b376bed11064fe2d6e2d8b03e1f88e
SHA2566ac818e0497911c6c2cf19f2ca5f904b97c0de956cf4ca02b0231a3cd2809a4a
SHA51294da9f79f0d2b5409b10f44d7d2e2072db08fbb13a413194dc0afffe7b4146be0cecf7f6f19f80af4814bccf1277b7448fd142469d89935df5fb853517299bc8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840332.exeFilesize
542KB
MD5724d3458a3bdb5f6cb4f356408b8b9d5
SHA1af972a1a25670c67a329004c1908d638f95a7130
SHA2568faff1a278032c087caf3fe6ba8c84563c6d4bf88aaff44d976b0b3be311ed70
SHA51216e3ad0544cae77d9e6119eb78e7f19ed19338530c8b3b952872dc38087a07ea467b021b75ae49aa85093b81972bf8afd7848ac823b0153f5597af3075920553
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840332.exeFilesize
542KB
MD5724d3458a3bdb5f6cb4f356408b8b9d5
SHA1af972a1a25670c67a329004c1908d638f95a7130
SHA2568faff1a278032c087caf3fe6ba8c84563c6d4bf88aaff44d976b0b3be311ed70
SHA51216e3ad0544cae77d9e6119eb78e7f19ed19338530c8b3b952872dc38087a07ea467b021b75ae49aa85093b81972bf8afd7848ac823b0153f5597af3075920553
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7676.exeFilesize
321KB
MD518c7ae1f81bfe8e015d34e965badcef4
SHA1cba6ab75a535bbb0e051a2200df844457834ea5f
SHA256f7739c8ba3dcbc34dcc7b5be8ef9e5fbbac1c14086000088f0c5308bba52c3ed
SHA512141323e82947c577b5a889f3ed8886c73ebffb89a57f261b9defbf07e8143399d68eb6c6be2debc5ba2bd19cc632f32b56131960acb98a8e51b0e3d50d0f10b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7676.exeFilesize
321KB
MD518c7ae1f81bfe8e015d34e965badcef4
SHA1cba6ab75a535bbb0e051a2200df844457834ea5f
SHA256f7739c8ba3dcbc34dcc7b5be8ef9e5fbbac1c14086000088f0c5308bba52c3ed
SHA512141323e82947c577b5a889f3ed8886c73ebffb89a57f261b9defbf07e8143399d68eb6c6be2debc5ba2bd19cc632f32b56131960acb98a8e51b0e3d50d0f10b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6506.exeFilesize
380KB
MD5fa3faa5ef45e45a3d77c9614a46299d9
SHA149c1a37b84cd8af4e6c4fea86ccb6c5fb00c6adb
SHA256b0c85ced4e3c3adeb60132dffe219966950de83779709c53e62c713389f93895
SHA512b8205f6894d40943535403b16db0a7d07271712aa07d37e85a51966c6ad5318df6e911f54b2c03fe13c6e73c0d262a6fc2074afbbc640008f14ed292e561da7c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6506.exeFilesize
380KB
MD5fa3faa5ef45e45a3d77c9614a46299d9
SHA149c1a37b84cd8af4e6c4fea86ccb6c5fb00c6adb
SHA256b0c85ced4e3c3adeb60132dffe219966950de83779709c53e62c713389f93895
SHA512b8205f6894d40943535403b16db0a7d07271712aa07d37e85a51966c6ad5318df6e911f54b2c03fe13c6e73c0d262a6fc2074afbbc640008f14ed292e561da7c
-
memory/1720-135-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/1720-136-0x0000000004770000-0x000000000478A000-memory.dmpFilesize
104KB
-
memory/1720-137-0x00000000071F0000-0x00000000076EE000-memory.dmpFilesize
5.0MB
-
memory/1720-138-0x0000000004820000-0x0000000004838000-memory.dmpFilesize
96KB
-
memory/1720-139-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-140-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-142-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-144-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-146-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-148-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-150-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-152-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-154-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-156-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-158-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-160-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-162-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-164-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-166-0x0000000004820000-0x0000000004832000-memory.dmpFilesize
72KB
-
memory/1720-167-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-168-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-169-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-170-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1720-171-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-172-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-174-0x0000000004790000-0x00000000047A0000-memory.dmpFilesize
64KB
-
memory/1720-175-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3884-180-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3884-181-0x00000000048A0000-0x00000000048E6000-memory.dmpFilesize
280KB
-
memory/3884-182-0x0000000007640000-0x0000000007684000-memory.dmpFilesize
272KB
-
memory/3884-183-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-184-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-186-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-190-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-188-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-192-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-194-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-196-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-198-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-200-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-202-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-203-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-205-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-206-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-207-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-209-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-211-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-215-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-213-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-217-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-219-0x0000000007640000-0x000000000767F000-memory.dmpFilesize
252KB
-
memory/3884-1092-0x0000000007DF0000-0x00000000083F6000-memory.dmpFilesize
6.0MB
-
memory/3884-1093-0x0000000007860000-0x000000000796A000-memory.dmpFilesize
1.0MB
-
memory/3884-1094-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/3884-1095-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB
-
memory/3884-1096-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/3884-1097-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-1099-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3884-1100-0x0000000007CA0000-0x0000000007D06000-memory.dmpFilesize
408KB
-
memory/3884-1101-0x0000000008970000-0x0000000008A02000-memory.dmpFilesize
584KB
-
memory/3884-1102-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-1103-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-1104-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/3884-1105-0x0000000008A10000-0x0000000008A86000-memory.dmpFilesize
472KB
-
memory/3884-1106-0x0000000008AB0000-0x0000000008B00000-memory.dmpFilesize
320KB
-
memory/3884-1107-0x0000000008D70000-0x0000000008F32000-memory.dmpFilesize
1.8MB
-
memory/3884-1108-0x0000000008F60000-0x000000000948C000-memory.dmpFilesize
5.2MB
-
memory/3884-1109-0x0000000004900000-0x0000000004910000-memory.dmpFilesize
64KB
-
memory/4504-1115-0x0000000000E60000-0x0000000000E92000-memory.dmpFilesize
200KB
-
memory/4504-1116-0x0000000005720000-0x000000000576B000-memory.dmpFilesize
300KB
-
memory/4504-1117-0x0000000005710000-0x0000000005720000-memory.dmpFilesize
64KB