Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 10:19
Static task
static1
Behavioral task
behavioral1
Sample
4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe
Resource
win10-20230220-en
General
-
Target
4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe
-
Size
699KB
-
MD5
04369ad905b3fd71bc450e1c372d5fed
-
SHA1
838ba1d729d94d16c75afd6b288c984dff033609
-
SHA256
4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239
-
SHA512
867cd9ab74f55ac93d385c5920be7453d6b4297d979689017133b0c73910781d4644d73172d79a08af8b8fa99bec98cd4e60e4b01ce7e4ce349565d7c2c23bc9
-
SSDEEP
12288:uMrvy90PrsSMhHU06/yjylYTlkVxcckvfMCnZDJmzFEYrM+CwyfwHJm6hiGjqyxN:RySnMiyjvxWcNvbn5J8hM0owsLGjVv9T
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro6589.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2848-181-0x0000000004C00000-0x0000000004C46000-memory.dmp family_redline behavioral1/memory/2848-182-0x0000000007610000-0x0000000007654000-memory.dmp family_redline behavioral1/memory/2848-184-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-186-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-183-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-188-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-190-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-194-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-192-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-198-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-202-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-204-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-206-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-208-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-210-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-212-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-214-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-216-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-218-0x0000000007610000-0x000000000764F000-memory.dmp family_redline behavioral1/memory/2848-220-0x0000000007610000-0x000000000764F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un693252.exepro6589.exequ7926.exesi329266.exepid process 4032 un693252.exe 4292 pro6589.exe 2848 qu7926.exe 4596 si329266.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6589.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6589.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exeun693252.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un693252.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un693252.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6589.exequ7926.exesi329266.exepid process 4292 pro6589.exe 4292 pro6589.exe 2848 qu7926.exe 2848 qu7926.exe 4596 si329266.exe 4596 si329266.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6589.exequ7926.exesi329266.exedescription pid process Token: SeDebugPrivilege 4292 pro6589.exe Token: SeDebugPrivilege 2848 qu7926.exe Token: SeDebugPrivilege 4596 si329266.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exeun693252.exedescription pid process target process PID 2896 wrote to memory of 4032 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe un693252.exe PID 2896 wrote to memory of 4032 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe un693252.exe PID 2896 wrote to memory of 4032 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe un693252.exe PID 4032 wrote to memory of 4292 4032 un693252.exe pro6589.exe PID 4032 wrote to memory of 4292 4032 un693252.exe pro6589.exe PID 4032 wrote to memory of 4292 4032 un693252.exe pro6589.exe PID 4032 wrote to memory of 2848 4032 un693252.exe qu7926.exe PID 4032 wrote to memory of 2848 4032 un693252.exe qu7926.exe PID 4032 wrote to memory of 2848 4032 un693252.exe qu7926.exe PID 2896 wrote to memory of 4596 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe si329266.exe PID 2896 wrote to memory of 4596 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe si329266.exe PID 2896 wrote to memory of 4596 2896 4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe si329266.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe"C:\Users\Admin\AppData\Local\Temp\4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exeFilesize
175KB
MD541623a8dddb5d19472c96ea68f063cb3
SHA111b6c7b6b20b2fa25f5b842aa5572558a3d9bf06
SHA256a38c45f0bae4486ae45a752b287e587791f8233b0df797ea0c47bd632cff808a
SHA5129650cf41516b7dc6ad3c86a5f9c0771489b8f5e10ecadcb0704bfc30ce31133f5b0f0db761f1ed88c625ec43feab1ca6d0a81ba2b077da2e35800c86a4a3d4fa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exeFilesize
175KB
MD541623a8dddb5d19472c96ea68f063cb3
SHA111b6c7b6b20b2fa25f5b842aa5572558a3d9bf06
SHA256a38c45f0bae4486ae45a752b287e587791f8233b0df797ea0c47bd632cff808a
SHA5129650cf41516b7dc6ad3c86a5f9c0771489b8f5e10ecadcb0704bfc30ce31133f5b0f0db761f1ed88c625ec43feab1ca6d0a81ba2b077da2e35800c86a4a3d4fa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exeFilesize
558KB
MD5c910fbec2d120c8162569c157164cd3c
SHA15371ed55c0df2e35aa0dadd6c95d8d726413e22d
SHA25664199de5437474450ad19f3b1a70d56c779a59a576c5be720e7fa51ced90b26e
SHA5121bcbf6d4b558c0ad2455d344c8b46df209a7d848e6224fd8ea9a38a277e8c7830b9b256f8f99ec42eca6e185a27822e3964433592321f7fb499d11521e77743e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exeFilesize
558KB
MD5c910fbec2d120c8162569c157164cd3c
SHA15371ed55c0df2e35aa0dadd6c95d8d726413e22d
SHA25664199de5437474450ad19f3b1a70d56c779a59a576c5be720e7fa51ced90b26e
SHA5121bcbf6d4b558c0ad2455d344c8b46df209a7d848e6224fd8ea9a38a277e8c7830b9b256f8f99ec42eca6e185a27822e3964433592321f7fb499d11521e77743e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exeFilesize
322KB
MD558bea7d0275985ccd2bdd36fe8c7562b
SHA161e8d547da0814709bb636368697e2645e808d81
SHA256cb7b9927073250bb7c8e3c9352074e46d26724e31b143522ec8a740904430301
SHA5128cd2abac9717c8aab9c069d869edb8bf00e74dc1de4ed7b0cd3e352145d2b78a3c9a99a33ff603e9cca7746d71e81af564327e4f50156d6b804f6781ddae4ad9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exeFilesize
322KB
MD558bea7d0275985ccd2bdd36fe8c7562b
SHA161e8d547da0814709bb636368697e2645e808d81
SHA256cb7b9927073250bb7c8e3c9352074e46d26724e31b143522ec8a740904430301
SHA5128cd2abac9717c8aab9c069d869edb8bf00e74dc1de4ed7b0cd3e352145d2b78a3c9a99a33ff603e9cca7746d71e81af564327e4f50156d6b804f6781ddae4ad9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exeFilesize
406KB
MD5036415dea39928ac7398645196727613
SHA11dd10c955bbe067c5580922c5d6564e303e861df
SHA256d01f705ef98abaab024148a351d39d2755310daf0567e69674236129f7bfc05e
SHA51285302119b7018841ba6d39309dd84af0bfcaf5fd83c3f4c6e2c574c227e143a4db026ddb793596cc3773e930863011f20c570cf211ff2733f00ca561972ed287
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exeFilesize
406KB
MD5036415dea39928ac7398645196727613
SHA11dd10c955bbe067c5580922c5d6564e303e861df
SHA256d01f705ef98abaab024148a351d39d2755310daf0567e69674236129f7bfc05e
SHA51285302119b7018841ba6d39309dd84af0bfcaf5fd83c3f4c6e2c574c227e143a4db026ddb793596cc3773e930863011f20c570cf211ff2733f00ca561972ed287
-
memory/2848-1093-0x0000000007CC0000-0x00000000082C6000-memory.dmpFilesize
6.0MB
-
memory/2848-220-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-192-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-1108-0x0000000008F70000-0x000000000949C000-memory.dmpFilesize
5.2MB
-
memory/2848-1107-0x0000000008DA0000-0x0000000008F62000-memory.dmpFilesize
1.8MB
-
memory/2848-198-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-1106-0x0000000008D30000-0x0000000008D80000-memory.dmpFilesize
320KB
-
memory/2848-1105-0x0000000008CA0000-0x0000000008D16000-memory.dmpFilesize
472KB
-
memory/2848-1104-0x0000000007C10000-0x0000000007C76000-memory.dmpFilesize
408KB
-
memory/2848-199-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-1103-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-1102-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-1101-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-1100-0x0000000007B70000-0x0000000007C02000-memory.dmpFilesize
584KB
-
memory/2848-1098-0x00000000079E0000-0x0000000007A2B000-memory.dmpFilesize
300KB
-
memory/2848-1096-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-1097-0x0000000007890000-0x00000000078CE000-memory.dmpFilesize
248KB
-
memory/2848-1095-0x0000000007870000-0x0000000007882000-memory.dmpFilesize
72KB
-
memory/2848-1094-0x0000000007730000-0x000000000783A000-memory.dmpFilesize
1.0MB
-
memory/2848-201-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-218-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-216-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-214-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-212-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-210-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-181-0x0000000004C00000-0x0000000004C46000-memory.dmpFilesize
280KB
-
memory/2848-182-0x0000000007610000-0x0000000007654000-memory.dmpFilesize
272KB
-
memory/2848-184-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-186-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-183-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-188-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-190-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-194-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-196-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/2848-208-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-206-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-204-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/2848-197-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/2848-202-0x0000000007610000-0x000000000764F000-memory.dmpFilesize
252KB
-
memory/4292-171-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4292-154-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-146-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-136-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4292-139-0x0000000004A00000-0x0000000004A18000-memory.dmpFilesize
96KB
-
memory/4292-140-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4292-176-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4292-175-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4292-173-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4292-172-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4292-138-0x00000000072C0000-0x00000000077BE000-memory.dmpFilesize
5.0MB
-
memory/4292-141-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4292-170-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-168-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-166-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-164-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-162-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-160-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-158-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-156-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-152-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-150-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-148-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-144-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-143-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4292-137-0x00000000047A0000-0x00000000047BA000-memory.dmpFilesize
104KB
-
memory/4292-142-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4596-1114-0x0000000000660000-0x0000000000692000-memory.dmpFilesize
200KB
-
memory/4596-1115-0x0000000004F70000-0x0000000004FBB000-memory.dmpFilesize
300KB
-
memory/4596-1116-0x00000000051F0000-0x0000000005200000-memory.dmpFilesize
64KB