Analysis
-
max time kernel
52s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 09:19
Static task
static1
Behavioral task
behavioral1
Sample
b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe
Resource
win10-20230220-en
General
-
Target
b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe
-
Size
683KB
-
MD5
8e21054137494dfa187772f0f7f3de4f
-
SHA1
c0284dfbc8b6f3d9be17407ab6bb8f1aafd248e0
-
SHA256
b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd
-
SHA512
cefb269793994236f2485807d2fc7f00167ae864bbafd6f9c7a8131aa4fb739e4a179e6a151af93d4e2773578f47049640b22c93d6a7833ae648b8741ee574af
-
SSDEEP
12288:uMr6y90XV1gwGXMcMM03jQrv1bjtfLhzMFI/6JvYUqTmEL3SyrI2f:Yyu12Mm1bFeFLvYpmELieI2f
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1608.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1608.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4452-178-0x0000000004740000-0x0000000004786000-memory.dmp family_redline behavioral1/memory/4452-179-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/4452-180-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-181-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-183-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-185-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-189-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-187-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-193-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-195-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-197-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-199-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-201-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-203-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-205-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-207-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-209-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-211-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-213-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4452-1098-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un071322.exepro1608.exequ9336.exesi643199.exepid process 4104 un071322.exe 4120 pro1608.exe 4452 qu9336.exe 2760 si643199.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1608.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1608.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un071322.exeb465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un071322.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un071322.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1608.exequ9336.exesi643199.exepid process 4120 pro1608.exe 4120 pro1608.exe 4452 qu9336.exe 4452 qu9336.exe 2760 si643199.exe 2760 si643199.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1608.exequ9336.exesi643199.exedescription pid process Token: SeDebugPrivilege 4120 pro1608.exe Token: SeDebugPrivilege 4452 qu9336.exe Token: SeDebugPrivilege 2760 si643199.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exeun071322.exedescription pid process target process PID 3848 wrote to memory of 4104 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe un071322.exe PID 3848 wrote to memory of 4104 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe un071322.exe PID 3848 wrote to memory of 4104 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe un071322.exe PID 4104 wrote to memory of 4120 4104 un071322.exe pro1608.exe PID 4104 wrote to memory of 4120 4104 un071322.exe pro1608.exe PID 4104 wrote to memory of 4120 4104 un071322.exe pro1608.exe PID 4104 wrote to memory of 4452 4104 un071322.exe qu9336.exe PID 4104 wrote to memory of 4452 4104 un071322.exe qu9336.exe PID 4104 wrote to memory of 4452 4104 un071322.exe qu9336.exe PID 3848 wrote to memory of 2760 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe si643199.exe PID 3848 wrote to memory of 2760 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe si643199.exe PID 3848 wrote to memory of 2760 3848 b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe si643199.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe"C:\Users\Admin\AppData\Local\Temp\b465190d951a5c1a3bf17351b6aa0797bbf07b90f7df802d9f19e89d877e67dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un071322.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un071322.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1608.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643199.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643199.exeFilesize
175KB
MD55a4039c36c200e716a6d8f167a02f200
SHA1211e482a60f258e1f1bb8e06f7131850018faf89
SHA2568c4902519e7490acee349095e6edbae7215f3672ba0addb8ccbf21ec8afe673a
SHA5120415b751babbf3b4705a23992e426a453cd952b8323a59d0a2835dbd95390cd679ba0718e41b551b55ca55f4c9248fbb6d69b4953970f339be22f02285bb9ae7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643199.exeFilesize
175KB
MD55a4039c36c200e716a6d8f167a02f200
SHA1211e482a60f258e1f1bb8e06f7131850018faf89
SHA2568c4902519e7490acee349095e6edbae7215f3672ba0addb8ccbf21ec8afe673a
SHA5120415b751babbf3b4705a23992e426a453cd952b8323a59d0a2835dbd95390cd679ba0718e41b551b55ca55f4c9248fbb6d69b4953970f339be22f02285bb9ae7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un071322.exeFilesize
541KB
MD5c955af853fc5780b6701ea5216c3a1d9
SHA106bdf4d3d78b81af88978f0cb02467cbca376336
SHA256d46c33ebb5787968dee2dfa1a26f93231a499647a3284c3d9d7a173439b7999a
SHA512544b434a0f8ef29b3306db78bf6a5e613daa79535fe26bc36e6e1b8ea8004ed0fa63940e8e5e29a42a9ab10e23a6200f83c0e56f4d447116937f0d1c9cb41cea
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un071322.exeFilesize
541KB
MD5c955af853fc5780b6701ea5216c3a1d9
SHA106bdf4d3d78b81af88978f0cb02467cbca376336
SHA256d46c33ebb5787968dee2dfa1a26f93231a499647a3284c3d9d7a173439b7999a
SHA512544b434a0f8ef29b3306db78bf6a5e613daa79535fe26bc36e6e1b8ea8004ed0fa63940e8e5e29a42a9ab10e23a6200f83c0e56f4d447116937f0d1c9cb41cea
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1608.exeFilesize
321KB
MD58bac3e4905e3f7f23e9f0dfdd294970d
SHA1e7929821fc21ce833cf28fad70d68ff75ab9df55
SHA2565dc4d0b2c9760157d5587045abb04652b0ad47c00a67032530df6d39c9ad0066
SHA51274356e047241624e4c091974599127c8b8a7fe4b957ac3bc4322d194edf3fc9fce83ad8d6f9166dcf2e143e56bc7c434fa25da6469016d2f996ffdddd4a7d8fa
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1608.exeFilesize
321KB
MD58bac3e4905e3f7f23e9f0dfdd294970d
SHA1e7929821fc21ce833cf28fad70d68ff75ab9df55
SHA2565dc4d0b2c9760157d5587045abb04652b0ad47c00a67032530df6d39c9ad0066
SHA51274356e047241624e4c091974599127c8b8a7fe4b957ac3bc4322d194edf3fc9fce83ad8d6f9166dcf2e143e56bc7c434fa25da6469016d2f996ffdddd4a7d8fa
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exeFilesize
380KB
MD531f742b13f181004c1f912eace7a71f1
SHA1f0a3eb5e39f5437b5888733207c6d8b006f8ea72
SHA2567cefaa47938f3e70608c1e920711e945e91d3eebaa57ba8608d75cfb9994d239
SHA512e8bb3e251c7008612e174fe749ae4b5d0fb2b872ef618e282bd856077aa08251a691148dcf8f4afca144a66d50f698a9d7dd9f3c5ebb99946f8e2d67642b5224
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exeFilesize
380KB
MD531f742b13f181004c1f912eace7a71f1
SHA1f0a3eb5e39f5437b5888733207c6d8b006f8ea72
SHA2567cefaa47938f3e70608c1e920711e945e91d3eebaa57ba8608d75cfb9994d239
SHA512e8bb3e251c7008612e174fe749ae4b5d0fb2b872ef618e282bd856077aa08251a691148dcf8f4afca144a66d50f698a9d7dd9f3c5ebb99946f8e2d67642b5224
-
memory/2760-1113-0x0000000005430000-0x000000000547B000-memory.dmpFilesize
300KB
-
memory/2760-1112-0x00000000009F0000-0x0000000000A22000-memory.dmpFilesize
200KB
-
memory/2760-1114-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/2760-1115-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/4120-142-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-156-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-138-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-134-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4120-139-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-140-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-137-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-144-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-146-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-148-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-150-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-152-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-154-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-135-0x0000000004920000-0x0000000004938000-memory.dmpFilesize
96KB
-
memory/4120-158-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-160-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-162-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-164-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-166-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/4120-167-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4120-168-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-169-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-172-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-171-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4120-136-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/4120-133-0x00000000071E0000-0x00000000076DE000-memory.dmpFilesize
5.0MB
-
memory/4120-132-0x0000000002DC0000-0x0000000002DDA000-memory.dmpFilesize
104KB
-
memory/4452-179-0x0000000004BF0000-0x0000000004C34000-memory.dmpFilesize
272KB
-
memory/4452-226-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-183-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-185-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-189-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-187-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-193-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-195-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-197-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-199-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-201-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-203-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-205-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-207-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-209-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-211-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-213-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-223-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-181-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-227-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1089-0x00000000076A0000-0x0000000007CA6000-memory.dmpFilesize
6.0MB
-
memory/4452-1090-0x0000000007D30000-0x0000000007E3A000-memory.dmpFilesize
1.0MB
-
memory/4452-1091-0x0000000007E70000-0x0000000007E82000-memory.dmpFilesize
72KB
-
memory/4452-1092-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1093-0x0000000007E90000-0x0000000007ECE000-memory.dmpFilesize
248KB
-
memory/4452-1094-0x0000000007FE0000-0x000000000802B000-memory.dmpFilesize
300KB
-
memory/4452-1096-0x0000000008170000-0x00000000081D6000-memory.dmpFilesize
408KB
-
memory/4452-1097-0x0000000008830000-0x00000000088C2000-memory.dmpFilesize
584KB
-
memory/4452-1098-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1099-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1100-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1101-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4452-1102-0x0000000009CC0000-0x0000000009D36000-memory.dmpFilesize
472KB
-
memory/4452-180-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/4452-178-0x0000000004740000-0x0000000004786000-memory.dmpFilesize
280KB
-
memory/4452-177-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/4452-1103-0x0000000009D50000-0x0000000009DA0000-memory.dmpFilesize
320KB
-
memory/4452-1104-0x0000000009DB0000-0x0000000009F72000-memory.dmpFilesize
1.8MB
-
memory/4452-1105-0x0000000009F80000-0x000000000A4AC000-memory.dmpFilesize
5.2MB