Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 08:49
Static task
static1
Behavioral task
behavioral1
Sample
69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe
Resource
win10-20230220-en
General
-
Target
69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe
-
Size
683KB
-
MD5
e507f07a9bd67e0de2018372189fb405
-
SHA1
739f58391eb9010991f8281c8503a820b2920816
-
SHA256
69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb
-
SHA512
d3558e907424e71015b73e957deff0450240f17863e6ace5a8460194fdecd418fc9253161156ce9ec01ce7c725af365db189739d56038c8e842deeda0fdd1c7f
-
SSDEEP
12288:GMrYy90Emo6UBk26r2qr4uPE/Es6fEMVx1PlRJUcpmzLHqbE69Ls:KyZppi26yzVYx19RJxmzLKbE6q
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5460.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5460.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4948-177-0x0000000004B40000-0x0000000004B86000-memory.dmp family_redline behavioral1/memory/4948-179-0x0000000007110000-0x0000000007154000-memory.dmp family_redline behavioral1/memory/4948-183-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-184-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-186-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-188-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-190-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-194-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-192-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-196-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-198-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-200-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-202-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-204-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-206-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-208-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-210-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-212-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-214-0x0000000007110000-0x000000000714F000-memory.dmp family_redline behavioral1/memory/4948-216-0x0000000007110000-0x000000000714F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un094077.exepro5460.exequ0806.exesi880130.exepid process 5048 un094077.exe 820 pro5460.exe 4948 qu0806.exe 3464 si880130.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5460.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5460.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exeun094077.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un094077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un094077.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5460.exequ0806.exesi880130.exepid process 820 pro5460.exe 820 pro5460.exe 4948 qu0806.exe 4948 qu0806.exe 3464 si880130.exe 3464 si880130.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5460.exequ0806.exesi880130.exedescription pid process Token: SeDebugPrivilege 820 pro5460.exe Token: SeDebugPrivilege 4948 qu0806.exe Token: SeDebugPrivilege 3464 si880130.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exeun094077.exedescription pid process target process PID 4092 wrote to memory of 5048 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe un094077.exe PID 4092 wrote to memory of 5048 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe un094077.exe PID 4092 wrote to memory of 5048 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe un094077.exe PID 5048 wrote to memory of 820 5048 un094077.exe pro5460.exe PID 5048 wrote to memory of 820 5048 un094077.exe pro5460.exe PID 5048 wrote to memory of 820 5048 un094077.exe pro5460.exe PID 5048 wrote to memory of 4948 5048 un094077.exe qu0806.exe PID 5048 wrote to memory of 4948 5048 un094077.exe qu0806.exe PID 5048 wrote to memory of 4948 5048 un094077.exe qu0806.exe PID 4092 wrote to memory of 3464 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe si880130.exe PID 4092 wrote to memory of 3464 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe si880130.exe PID 4092 wrote to memory of 3464 4092 69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe si880130.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe"C:\Users\Admin\AppData\Local\Temp\69c685d39fe2608ff7aa08baf8f33a336a0bbda09a9b94d8a48106e650dadffb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5460.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0806.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880130.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880130.exeFilesize
175KB
MD51c1623ade6903d341ffb810cc42d98c6
SHA128d30c07b5923beb7f1950f08940193d70dab113
SHA256245adba867e6b594dad071fdda8ac9d91ae476409aaa593debc88d4ea8f8d90d
SHA512bb2fec58d809918a6965b0a1d61d6d47f3695a4cbdc8f8e3da597abc6714ef02069975817776823d44a50c0e30663e573ca2437ab7a2d3c157eff3b4606d5b0f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880130.exeFilesize
175KB
MD51c1623ade6903d341ffb810cc42d98c6
SHA128d30c07b5923beb7f1950f08940193d70dab113
SHA256245adba867e6b594dad071fdda8ac9d91ae476409aaa593debc88d4ea8f8d90d
SHA512bb2fec58d809918a6965b0a1d61d6d47f3695a4cbdc8f8e3da597abc6714ef02069975817776823d44a50c0e30663e573ca2437ab7a2d3c157eff3b4606d5b0f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094077.exeFilesize
541KB
MD52bf5c01169a704a70b6fcf9342ad6fbf
SHA15d1b1311e683c8f465ae927d3f13ff55972dde20
SHA256ef59175da1c52801d25f6757266962bb7ed7c017f91500216562f92372e08bda
SHA5129f263d876c51f9ff2f884d422d168fd7bfa9eac1d4badbd97852174f3e98c571038c2b082248ea63d90e091cac8484ae0a1b5fd0d8697526f7eeb09daf6db5ca
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094077.exeFilesize
541KB
MD52bf5c01169a704a70b6fcf9342ad6fbf
SHA15d1b1311e683c8f465ae927d3f13ff55972dde20
SHA256ef59175da1c52801d25f6757266962bb7ed7c017f91500216562f92372e08bda
SHA5129f263d876c51f9ff2f884d422d168fd7bfa9eac1d4badbd97852174f3e98c571038c2b082248ea63d90e091cac8484ae0a1b5fd0d8697526f7eeb09daf6db5ca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5460.exeFilesize
321KB
MD5eeec68f455e20a14d12c97530a35fdd1
SHA1b7cd0703294bf264bd73ae053189948af48807fe
SHA256935c641e65482da7004390b556c2c6a2ed755ad3243a53a5b42c37cc941255a2
SHA5125578b91514fcb7c748bb21b8f11d66f4e983e38c956c1ad39530d034e4c40057e830608392de692b168b8f9232d926517262a807273053d97cc08223ac954744
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5460.exeFilesize
321KB
MD5eeec68f455e20a14d12c97530a35fdd1
SHA1b7cd0703294bf264bd73ae053189948af48807fe
SHA256935c641e65482da7004390b556c2c6a2ed755ad3243a53a5b42c37cc941255a2
SHA5125578b91514fcb7c748bb21b8f11d66f4e983e38c956c1ad39530d034e4c40057e830608392de692b168b8f9232d926517262a807273053d97cc08223ac954744
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0806.exeFilesize
380KB
MD5b6c934c54e68b20f4784d4127e562cae
SHA124618f4154b4532d20ad087b8d493bfd7582afa1
SHA25607984fd338b50172a535c94bdbe5fe77af2227cf2758ae766b21dc18dcc9f576
SHA512b6fc8a763f637ca1577990625b65bb41626579c4f61d4d5b23f542342720e0b9ac4166e7b6c2500fb88884703fc36e5599110f4305eb29625101bc5c2aa18997
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0806.exeFilesize
380KB
MD5b6c934c54e68b20f4784d4127e562cae
SHA124618f4154b4532d20ad087b8d493bfd7582afa1
SHA25607984fd338b50172a535c94bdbe5fe77af2227cf2758ae766b21dc18dcc9f576
SHA512b6fc8a763f637ca1577990625b65bb41626579c4f61d4d5b23f542342720e0b9ac4166e7b6c2500fb88884703fc36e5599110f4305eb29625101bc5c2aa18997
-
memory/820-133-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/820-134-0x0000000004A80000-0x0000000004A9A000-memory.dmpFilesize
104KB
-
memory/820-135-0x0000000007060000-0x000000000755E000-memory.dmpFilesize
5.0MB
-
memory/820-136-0x00000000075B0000-0x00000000075C8000-memory.dmpFilesize
96KB
-
memory/820-137-0x0000000004850000-0x0000000004860000-memory.dmpFilesize
64KB
-
memory/820-138-0x0000000004850000-0x0000000004860000-memory.dmpFilesize
64KB
-
memory/820-139-0x0000000004850000-0x0000000004860000-memory.dmpFilesize
64KB
-
memory/820-140-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-141-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-143-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-145-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-147-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-149-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-151-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-153-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-155-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-157-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-159-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-161-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-163-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-165-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-167-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/820-168-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/820-169-0x0000000004850000-0x0000000004860000-memory.dmpFilesize
64KB
-
memory/820-170-0x0000000004850000-0x0000000004860000-memory.dmpFilesize
64KB
-
memory/820-172-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3464-1111-0x0000000000F60000-0x0000000000F92000-memory.dmpFilesize
200KB
-
memory/3464-1113-0x0000000005870000-0x0000000005880000-memory.dmpFilesize
64KB
-
memory/3464-1112-0x00000000059A0000-0x00000000059EB000-memory.dmpFilesize
300KB
-
memory/4948-180-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-212-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-181-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-182-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-183-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-184-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-186-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-188-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-190-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-194-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-192-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-196-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-198-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-200-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-202-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-204-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-206-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-208-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-210-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-179-0x0000000007110000-0x0000000007154000-memory.dmpFilesize
272KB
-
memory/4948-214-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-216-0x0000000007110000-0x000000000714F000-memory.dmpFilesize
252KB
-
memory/4948-1089-0x0000000007D00000-0x0000000008306000-memory.dmpFilesize
6.0MB
-
memory/4948-1090-0x0000000007720000-0x000000000782A000-memory.dmpFilesize
1.0MB
-
memory/4948-1091-0x0000000007860000-0x0000000007872000-memory.dmpFilesize
72KB
-
memory/4948-1092-0x0000000007880000-0x00000000078BE000-memory.dmpFilesize
248KB
-
memory/4948-1093-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-1094-0x00000000079D0000-0x0000000007A1B000-memory.dmpFilesize
300KB
-
memory/4948-1096-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-1097-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-1098-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-1099-0x0000000007B60000-0x0000000007BF2000-memory.dmpFilesize
584KB
-
memory/4948-1100-0x0000000007C00000-0x0000000007C66000-memory.dmpFilesize
408KB
-
memory/4948-1101-0x00000000088E0000-0x0000000008956000-memory.dmpFilesize
472KB
-
memory/4948-1102-0x0000000008970000-0x00000000089C0000-memory.dmpFilesize
320KB
-
memory/4948-178-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/4948-177-0x0000000004B40000-0x0000000004B86000-memory.dmpFilesize
280KB
-
memory/4948-1103-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4948-1104-0x0000000008D90000-0x0000000008F52000-memory.dmpFilesize
1.8MB
-
memory/4948-1105-0x0000000008F60000-0x000000000948C000-memory.dmpFilesize
5.2MB