Analysis
-
max time kernel
52s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 19:32
Static task
static1
Behavioral task
behavioral1
Sample
585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe
Resource
win10-20230220-en
General
-
Target
585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe
-
Size
673KB
-
MD5
3efa40677eca7c9e23e2545803128750
-
SHA1
26f3e0c417ba44138a480b8c21b4b8b02503fa33
-
SHA256
585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d
-
SHA512
5bd5a9dde28011a2aff18beceec28409ef7227c6cec46a72e97a688ec8b5800c7caae5ac5ac92bafe9f488f84455590478b159e526776e33160757f84bc8a1c4
-
SSDEEP
12288:aMr4y90JjHBxABdrZWuRlCW9RebJ+okMaDKwVLdLOborUmPBUwc4cpj:OyKnA3reOGEdLWIobXyBUSGj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4134.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4748-181-0x0000000002100000-0x0000000002146000-memory.dmp family_redline behavioral1/memory/4748-182-0x0000000002410000-0x0000000002454000-memory.dmp family_redline behavioral1/memory/4748-183-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-184-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-186-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-188-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-190-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-192-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-194-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-196-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-200-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-198-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-202-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-206-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-204-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-208-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-210-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-212-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-214-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-216-0x0000000002410000-0x000000000244F000-memory.dmp family_redline behavioral1/memory/4748-359-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un811520.exepro4134.exequ0896.exesi123211.exepid process 2592 un811520.exe 2688 pro4134.exe 4748 qu0896.exe 4428 si123211.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4134.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4134.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exeun811520.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un811520.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un811520.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4134.exequ0896.exesi123211.exepid process 2688 pro4134.exe 2688 pro4134.exe 4748 qu0896.exe 4748 qu0896.exe 4428 si123211.exe 4428 si123211.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4134.exequ0896.exesi123211.exedescription pid process Token: SeDebugPrivilege 2688 pro4134.exe Token: SeDebugPrivilege 4748 qu0896.exe Token: SeDebugPrivilege 4428 si123211.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exeun811520.exedescription pid process target process PID 1012 wrote to memory of 2592 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe un811520.exe PID 1012 wrote to memory of 2592 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe un811520.exe PID 1012 wrote to memory of 2592 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe un811520.exe PID 2592 wrote to memory of 2688 2592 un811520.exe pro4134.exe PID 2592 wrote to memory of 2688 2592 un811520.exe pro4134.exe PID 2592 wrote to memory of 2688 2592 un811520.exe pro4134.exe PID 2592 wrote to memory of 4748 2592 un811520.exe qu0896.exe PID 2592 wrote to memory of 4748 2592 un811520.exe qu0896.exe PID 2592 wrote to memory of 4748 2592 un811520.exe qu0896.exe PID 1012 wrote to memory of 4428 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe si123211.exe PID 1012 wrote to memory of 4428 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe si123211.exe PID 1012 wrote to memory of 4428 1012 585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe si123211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe"C:\Users\Admin\AppData\Local\Temp\585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exeFilesize
175KB
MD52a3d506fa1df72e552ac6fe2dface171
SHA11152109b0b781b6f976c6f6850fc28c2213d4cac
SHA25620375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f
SHA512b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exeFilesize
175KB
MD52a3d506fa1df72e552ac6fe2dface171
SHA11152109b0b781b6f976c6f6850fc28c2213d4cac
SHA25620375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f
SHA512b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exeFilesize
530KB
MD5658ebce48a5b0828e5ad01fa6479b35e
SHA18e7fac720a7841fa876852f778c08996e97bf616
SHA2566022d7e15fa7f7ec51736604f162f19f819812188e1bf39750631c5c9ae987b8
SHA512388ccaf1f52413a7c95ef124aae9be8730e4dde6914e67a1d128430987f385e9006b9f7d2bfb135db6cc7901816ade67638b9b9dc02cb29c176e42f6f3245a11
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exeFilesize
530KB
MD5658ebce48a5b0828e5ad01fa6479b35e
SHA18e7fac720a7841fa876852f778c08996e97bf616
SHA2566022d7e15fa7f7ec51736604f162f19f819812188e1bf39750631c5c9ae987b8
SHA512388ccaf1f52413a7c95ef124aae9be8730e4dde6914e67a1d128430987f385e9006b9f7d2bfb135db6cc7901816ade67638b9b9dc02cb29c176e42f6f3245a11
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exeFilesize
260KB
MD5890b2f900a6e0b3813495e052b7c6209
SHA186412b8497d67f839c1ad4f3237edf8c71e5081a
SHA256291926507ae48f25be00aef1f01084016cb0a309bf5e2b2a02280fbf1c2f8350
SHA512e387b8b4f502343971fe923fc54ef624acde5643837abbb86fe667f5cf8b6d5ba0a4a3247ce0651ab75c1a44b5f4e78a340cf71c94eb09c406b682628edcb8be
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exeFilesize
260KB
MD5890b2f900a6e0b3813495e052b7c6209
SHA186412b8497d67f839c1ad4f3237edf8c71e5081a
SHA256291926507ae48f25be00aef1f01084016cb0a309bf5e2b2a02280fbf1c2f8350
SHA512e387b8b4f502343971fe923fc54ef624acde5643837abbb86fe667f5cf8b6d5ba0a4a3247ce0651ab75c1a44b5f4e78a340cf71c94eb09c406b682628edcb8be
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exeFilesize
318KB
MD506a021eb4bb8e7afb3fe440416861ade
SHA1a01001199ac9e96bcb9fe8e10ac5e0025c562c0f
SHA25690a1ceaa09fb6605f41bba17a881598180c8cce13768aab8646bfd746dd4256c
SHA5122902ef10de18db01830adffec753fa2ac791aa764fcbcf94ce0b1898004207e95cb114b2c4a50335f9b7febd11f63cefd77cba1c3fdf8a7bb81c15703705fa4b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exeFilesize
318KB
MD506a021eb4bb8e7afb3fe440416861ade
SHA1a01001199ac9e96bcb9fe8e10ac5e0025c562c0f
SHA25690a1ceaa09fb6605f41bba17a881598180c8cce13768aab8646bfd746dd4256c
SHA5122902ef10de18db01830adffec753fa2ac791aa764fcbcf94ce0b1898004207e95cb114b2c4a50335f9b7febd11f63cefd77cba1c3fdf8a7bb81c15703705fa4b
-
memory/2688-164-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-160-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-138-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2688-139-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/2688-140-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-142-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-141-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-143-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-146-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-144-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-136-0x00000000007E0000-0x00000000007FA000-memory.dmpFilesize
104KB
-
memory/2688-170-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-168-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-166-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-162-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-137-0x0000000004BE0000-0x00000000050DE000-memory.dmpFilesize
5.0MB
-
memory/2688-158-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-156-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-154-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-152-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-150-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-148-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/2688-171-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2688-172-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-173-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-174-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/2688-176-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4428-1115-0x0000000000440000-0x0000000000472000-memory.dmpFilesize
200KB
-
memory/4428-1118-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4428-1117-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4428-1116-0x0000000004D20000-0x0000000004D6B000-memory.dmpFilesize
300KB
-
memory/4748-183-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-359-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-188-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-190-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-192-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-194-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-196-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-200-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-198-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-202-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-206-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-204-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-208-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-210-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-212-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-214-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-216-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-355-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/4748-357-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-186-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-361-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-1093-0x00000000057E0000-0x0000000005DE6000-memory.dmpFilesize
6.0MB
-
memory/4748-1094-0x00000000051D0000-0x00000000052DA000-memory.dmpFilesize
1.0MB
-
memory/4748-1095-0x0000000002620000-0x0000000002632000-memory.dmpFilesize
72KB
-
memory/4748-1096-0x0000000002640000-0x000000000267E000-memory.dmpFilesize
248KB
-
memory/4748-1097-0x0000000004C10000-0x0000000004C5B000-memory.dmpFilesize
300KB
-
memory/4748-1098-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-1100-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/4748-1101-0x0000000005530000-0x0000000005596000-memory.dmpFilesize
408KB
-
memory/4748-1102-0x0000000006330000-0x00000000063A6000-memory.dmpFilesize
472KB
-
memory/4748-1103-0x00000000063B0000-0x0000000006400000-memory.dmpFilesize
320KB
-
memory/4748-1104-0x0000000006430000-0x00000000065F2000-memory.dmpFilesize
1.8MB
-
memory/4748-1105-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-1106-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-184-0x0000000002410000-0x000000000244F000-memory.dmpFilesize
252KB
-
memory/4748-182-0x0000000002410000-0x0000000002454000-memory.dmpFilesize
272KB
-
memory/4748-181-0x0000000002100000-0x0000000002146000-memory.dmpFilesize
280KB
-
memory/4748-1107-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4748-1108-0x0000000006600000-0x0000000006B2C000-memory.dmpFilesize
5.2MB
-
memory/4748-1109-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB