Analysis
-
max time kernel
57s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 08:38
Static task
static1
Behavioral task
behavioral1
Sample
022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe
Resource
win10-20230220-en
General
-
Target
022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe
-
Size
686KB
-
MD5
e2710ba609de1d951678ac1e0b8d7b18
-
SHA1
b8e737c9ea3a870fd8753bc0b0e8d82e2d21a87d
-
SHA256
022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f
-
SHA512
57930d8967bc0fc737038443dccbd7ac4e7e715fc1e9dd3dae334839c424a0538f7823ff556af76e6dd44b15983dc08f6cd87910b7c10feede0297abfcbac5c6
-
SSDEEP
12288:gMrNy90QvpESxst9izGR6yjg8vA5OtMR2uDUd1uXI7r8fA1r:9yBvpt2tozGTjgL5gO9DKuXywf4r
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2812-181-0x0000000004AE0000-0x0000000004B26000-memory.dmp family_redline behavioral1/memory/2812-182-0x0000000007650000-0x0000000007694000-memory.dmp family_redline behavioral1/memory/2812-183-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-184-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-186-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-188-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-190-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-192-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-194-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-196-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-198-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-200-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-202-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-204-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-206-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-208-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-210-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-212-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-217-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-219-0x0000000007650000-0x000000000768F000-memory.dmp family_redline behavioral1/memory/2812-1104-0x0000000007140000-0x0000000007150000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un226450.exepro2420.exequ4712.exesi693769.exepid process 2608 un226450.exe 1508 pro2420.exe 2812 qu4712.exe 2900 si693769.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2420.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2420.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exeun226450.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un226450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un226450.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2420.exequ4712.exesi693769.exepid process 1508 pro2420.exe 1508 pro2420.exe 2812 qu4712.exe 2812 qu4712.exe 2900 si693769.exe 2900 si693769.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2420.exequ4712.exesi693769.exedescription pid process Token: SeDebugPrivilege 1508 pro2420.exe Token: SeDebugPrivilege 2812 qu4712.exe Token: SeDebugPrivilege 2900 si693769.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exeun226450.exedescription pid process target process PID 2100 wrote to memory of 2608 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe un226450.exe PID 2100 wrote to memory of 2608 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe un226450.exe PID 2100 wrote to memory of 2608 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe un226450.exe PID 2608 wrote to memory of 1508 2608 un226450.exe pro2420.exe PID 2608 wrote to memory of 1508 2608 un226450.exe pro2420.exe PID 2608 wrote to memory of 1508 2608 un226450.exe pro2420.exe PID 2608 wrote to memory of 2812 2608 un226450.exe qu4712.exe PID 2608 wrote to memory of 2812 2608 un226450.exe qu4712.exe PID 2608 wrote to memory of 2812 2608 un226450.exe qu4712.exe PID 2100 wrote to memory of 2900 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe si693769.exe PID 2100 wrote to memory of 2900 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe si693769.exe PID 2100 wrote to memory of 2900 2100 022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe si693769.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe"C:\Users\Admin\AppData\Local\Temp\022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exeFilesize
175KB
MD5e379d153fe5db50462570400bb833c1b
SHA1869abf85028f78c96c2bcf0aab6c210fd216ac52
SHA256a4f2d143023f1a748fe7477f9edb80b04a3ced9f335dd4e38f90eb98be0917f2
SHA5123bed30b273011b0c24baa783d30b8980788e34fafa6e3b7e50deddbd7da4c3c81d76fd52c59059fd1b00fca19489612a04ea367ba698ba5be7b2bcdce9c0be92
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exeFilesize
175KB
MD5e379d153fe5db50462570400bb833c1b
SHA1869abf85028f78c96c2bcf0aab6c210fd216ac52
SHA256a4f2d143023f1a748fe7477f9edb80b04a3ced9f335dd4e38f90eb98be0917f2
SHA5123bed30b273011b0c24baa783d30b8980788e34fafa6e3b7e50deddbd7da4c3c81d76fd52c59059fd1b00fca19489612a04ea367ba698ba5be7b2bcdce9c0be92
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exeFilesize
545KB
MD5dc6a531cbbbcedc99e32ff6090e6e3db
SHA1dcfd6ae71c020e1a5d530de0c948933b8978c0c2
SHA25675538c7f1a8b772c7f58c330511be6f421da5cc5f859bb05e710252d079bd7a1
SHA5129fa0326257627167d80237b7ecd23689908b3e192c2c1bd466a6dd940172854a70a449861e6fecc947c5475dfda082712e4a3f2e0318cbdb93555b5d350f1eda
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exeFilesize
545KB
MD5dc6a531cbbbcedc99e32ff6090e6e3db
SHA1dcfd6ae71c020e1a5d530de0c948933b8978c0c2
SHA25675538c7f1a8b772c7f58c330511be6f421da5cc5f859bb05e710252d079bd7a1
SHA5129fa0326257627167d80237b7ecd23689908b3e192c2c1bd466a6dd940172854a70a449861e6fecc947c5475dfda082712e4a3f2e0318cbdb93555b5d350f1eda
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exeFilesize
321KB
MD50524ab5dfdefcdbcf8fe67f9ef798a9c
SHA195a21c72b65d51b03a2a033e2ff4c8debf2b9689
SHA2567284e0d570e922446551422a14251ef343b68954724f9b3d8dc245be57f28083
SHA512356a4b246cadde50845720ad2133665d55724ba0c1146860591e5bed2cf55ffd92f4f22d3da66fce369fb747dcc922d08c1ab9c64e41758b5281ffee112d7995
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exeFilesize
321KB
MD50524ab5dfdefcdbcf8fe67f9ef798a9c
SHA195a21c72b65d51b03a2a033e2ff4c8debf2b9689
SHA2567284e0d570e922446551422a14251ef343b68954724f9b3d8dc245be57f28083
SHA512356a4b246cadde50845720ad2133665d55724ba0c1146860591e5bed2cf55ffd92f4f22d3da66fce369fb747dcc922d08c1ab9c64e41758b5281ffee112d7995
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exeFilesize
380KB
MD582781654dadcdc5f7fc19f218477e3ba
SHA18a85820bfe3cd0ecacbe9b593541367565499253
SHA2562e6c0211566b3c63204ad86ac82e3721fb9413926dd4aa103031041125918f8f
SHA512d6ee2d2b90800964492660e3a78552085e04dc8892844505e35b0dd86b96093df4d5192fd75f0c0172715b26c1f9cff3b7ee2e71c3f4d2c23d97076259271c90
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exeFilesize
380KB
MD582781654dadcdc5f7fc19f218477e3ba
SHA18a85820bfe3cd0ecacbe9b593541367565499253
SHA2562e6c0211566b3c63204ad86ac82e3721fb9413926dd4aa103031041125918f8f
SHA512d6ee2d2b90800964492660e3a78552085e04dc8892844505e35b0dd86b96093df4d5192fd75f0c0172715b26c1f9cff3b7ee2e71c3f4d2c23d97076259271c90
-
memory/1508-135-0x0000000002D90000-0x0000000002DAA000-memory.dmpFilesize
104KB
-
memory/1508-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/1508-137-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1508-138-0x0000000007260000-0x000000000775E000-memory.dmpFilesize
5.0MB
-
memory/1508-139-0x0000000004940000-0x0000000004958000-memory.dmpFilesize
96KB
-
memory/1508-140-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-141-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-149-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-147-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-145-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-143-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-151-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-153-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-155-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-157-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-159-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-161-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-163-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-165-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-167-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1508-168-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1508-169-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1508-170-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1508-171-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1508-175-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1508-173-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1508-174-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2812-180-0x0000000002DC0000-0x0000000002E0B000-memory.dmpFilesize
300KB
-
memory/2812-181-0x0000000004AE0000-0x0000000004B26000-memory.dmpFilesize
280KB
-
memory/2812-182-0x0000000007650000-0x0000000007694000-memory.dmpFilesize
272KB
-
memory/2812-183-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-184-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-186-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-188-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-190-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-192-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-194-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-196-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-198-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-200-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-202-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-204-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-206-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-208-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-210-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-213-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-212-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-216-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-217-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-215-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-219-0x0000000007650000-0x000000000768F000-memory.dmpFilesize
252KB
-
memory/2812-1092-0x0000000007DF0000-0x00000000083F6000-memory.dmpFilesize
6.0MB
-
memory/2812-1093-0x0000000007860000-0x000000000796A000-memory.dmpFilesize
1.0MB
-
memory/2812-1094-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/2812-1095-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB
-
memory/2812-1096-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/2812-1097-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-1099-0x0000000007CA0000-0x0000000007D32000-memory.dmpFilesize
584KB
-
memory/2812-1100-0x0000000007D40000-0x0000000007DA6000-memory.dmpFilesize
408KB
-
memory/2812-1101-0x0000000008A50000-0x0000000008C12000-memory.dmpFilesize
1.8MB
-
memory/2812-1102-0x0000000008C20000-0x000000000914C000-memory.dmpFilesize
5.2MB
-
memory/2812-1103-0x0000000009390000-0x0000000009406000-memory.dmpFilesize
472KB
-
memory/2812-1104-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-1106-0x0000000009410000-0x0000000009460000-memory.dmpFilesize
320KB
-
memory/2812-1105-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-1107-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2812-1108-0x0000000007140000-0x0000000007150000-memory.dmpFilesize
64KB
-
memory/2900-1114-0x0000000000160000-0x0000000000192000-memory.dmpFilesize
200KB
-
memory/2900-1115-0x0000000004A40000-0x0000000004A8B000-memory.dmpFilesize
300KB
-
memory/2900-1116-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB