Analysis
-
max time kernel
53s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe
Resource
win10-20230220-en
General
-
Target
4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe
-
Size
673KB
-
MD5
05c12f87e63f1241ed3663f41b5ea905
-
SHA1
7c6a335f97cb0788ce20abbf4bc9213647b727c3
-
SHA256
4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc
-
SHA512
7963a1555a17f12527fe33882565707dcdb46cf3c840b660d35ca3cf45f1185a4810e93809d0252d8cccbb752d8d541aa35a8961b953e48b47161c7077b9b381
-
SSDEEP
12288:3MrUy90r7wF1w1iyo80XTjlLGTSITHopFKCHudyZG3ZD/ObGrwmSibzLGs6y:Hyk7w3w1PyXfwTvHePudIGJabNXizG0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5679.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5679.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/3880-178-0x0000000002190000-0x00000000021D6000-memory.dmp family_redline behavioral1/memory/3880-179-0x0000000004A80000-0x0000000004AC4000-memory.dmp family_redline behavioral1/memory/3880-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3880-338-0x0000000004B70000-0x0000000004B80000-memory.dmp family_redline behavioral1/memory/3880-340-0x0000000004B70000-0x0000000004B80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un208286.exepro5679.exequ9794.exesi013569.exepid process 2544 un208286.exe 2604 pro5679.exe 3880 qu9794.exe 5060 si013569.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5679.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5679.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exeun208286.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un208286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un208286.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5679.exequ9794.exesi013569.exepid process 2604 pro5679.exe 2604 pro5679.exe 3880 qu9794.exe 3880 qu9794.exe 5060 si013569.exe 5060 si013569.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5679.exequ9794.exesi013569.exedescription pid process Token: SeDebugPrivilege 2604 pro5679.exe Token: SeDebugPrivilege 3880 qu9794.exe Token: SeDebugPrivilege 5060 si013569.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exeun208286.exedescription pid process target process PID 2504 wrote to memory of 2544 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe un208286.exe PID 2504 wrote to memory of 2544 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe un208286.exe PID 2504 wrote to memory of 2544 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe un208286.exe PID 2544 wrote to memory of 2604 2544 un208286.exe pro5679.exe PID 2544 wrote to memory of 2604 2544 un208286.exe pro5679.exe PID 2544 wrote to memory of 2604 2544 un208286.exe pro5679.exe PID 2544 wrote to memory of 3880 2544 un208286.exe qu9794.exe PID 2544 wrote to memory of 3880 2544 un208286.exe qu9794.exe PID 2544 wrote to memory of 3880 2544 un208286.exe qu9794.exe PID 2504 wrote to memory of 5060 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe si013569.exe PID 2504 wrote to memory of 5060 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe si013569.exe PID 2504 wrote to memory of 5060 2504 4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe si013569.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe"C:\Users\Admin\AppData\Local\Temp\4d76d5a41b1a4e5483a8b07b17b409580fdda81404c6cbcc3ea250f585a93ffc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208286.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9794.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si013569.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si013569.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si013569.exeFilesize
175KB
MD5c051a9f1ba819b43742e3ae8419255ba
SHA1f4fe813c5002c18477deefe03a7f944b7e0ca91f
SHA25670ba5d87f340d1f071ecef4592ede002d4330a7b7245e8bb2a504357ee996a17
SHA512f1a03075fa7f94df8387cf4ff7ee80c228e80ed52d87d9d3906c7034443df2190b02994c42656d3d6891050b9b68153ccd6e6e5ba6d8b8087e57042cd36248b9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si013569.exeFilesize
175KB
MD5c051a9f1ba819b43742e3ae8419255ba
SHA1f4fe813c5002c18477deefe03a7f944b7e0ca91f
SHA25670ba5d87f340d1f071ecef4592ede002d4330a7b7245e8bb2a504357ee996a17
SHA512f1a03075fa7f94df8387cf4ff7ee80c228e80ed52d87d9d3906c7034443df2190b02994c42656d3d6891050b9b68153ccd6e6e5ba6d8b8087e57042cd36248b9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208286.exeFilesize
531KB
MD528771a97355a01bbe1f020233208fdf6
SHA19d3788aba2afa495470822b76e047111155c5210
SHA2564392755cfb24fb8e73652496fa81105c9fac2081ea82ecf2fc78bfb33d247453
SHA512bff19c3f75aa51dbbbb4b194f9f573c6651af46e3724d91dcbbc854ab47f3ee522f55e33ce437c80fb75557b493d52b18d51a85f96ef17f7aa5571861021c532
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208286.exeFilesize
531KB
MD528771a97355a01bbe1f020233208fdf6
SHA19d3788aba2afa495470822b76e047111155c5210
SHA2564392755cfb24fb8e73652496fa81105c9fac2081ea82ecf2fc78bfb33d247453
SHA512bff19c3f75aa51dbbbb4b194f9f573c6651af46e3724d91dcbbc854ab47f3ee522f55e33ce437c80fb75557b493d52b18d51a85f96ef17f7aa5571861021c532
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exeFilesize
260KB
MD5620ec1cc483561fb6b769519efb80eb2
SHA1c3dd8c0ad65bdf02117c1a20c9d2bdcf8d3c8b3b
SHA2560951c13842ff42d6dcc2b3254a5e7bba64a5ee19ae9b32a0fc23e59147e23fee
SHA51297239c56c289869f39459700297db0f8dec3e4da8f6fe9dda346713face31b5a783d054e68fd0a6348d106df6a22ff047a25c24236b80a1a5b12d9e040e91406
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exeFilesize
260KB
MD5620ec1cc483561fb6b769519efb80eb2
SHA1c3dd8c0ad65bdf02117c1a20c9d2bdcf8d3c8b3b
SHA2560951c13842ff42d6dcc2b3254a5e7bba64a5ee19ae9b32a0fc23e59147e23fee
SHA51297239c56c289869f39459700297db0f8dec3e4da8f6fe9dda346713face31b5a783d054e68fd0a6348d106df6a22ff047a25c24236b80a1a5b12d9e040e91406
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9794.exeFilesize
318KB
MD5760c107b54ecd131a63ba32aabff4505
SHA153901b9f9dfb0d2effee380fea029848ca85ed0f
SHA256b1f24748026d3f81953c0d53d00f201e359c99089ad68c17bf8cb0c2010f90b4
SHA512b631526d889f4b2126dc8f2f580aee3d5b14c6dfbb9b2e20b496d79f237c9a185bb0e8a468067821d909e64e1fd93404931ab6fee5401e7c50ad0c4faca6d509
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9794.exeFilesize
318KB
MD5760c107b54ecd131a63ba32aabff4505
SHA153901b9f9dfb0d2effee380fea029848ca85ed0f
SHA256b1f24748026d3f81953c0d53d00f201e359c99089ad68c17bf8cb0c2010f90b4
SHA512b631526d889f4b2126dc8f2f580aee3d5b14c6dfbb9b2e20b496d79f237c9a185bb0e8a468067821d909e64e1fd93404931ab6fee5401e7c50ad0c4faca6d509
-
memory/2604-136-0x0000000002020000-0x000000000203A000-memory.dmpFilesize
104KB
-
memory/2604-137-0x0000000004BD0000-0x00000000050CE000-memory.dmpFilesize
5.0MB
-
memory/2604-138-0x0000000002510000-0x0000000002528000-memory.dmpFilesize
96KB
-
memory/2604-139-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-140-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-146-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-144-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-148-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-156-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-162-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-164-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-165-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/2604-169-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2604-168-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-170-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2604-166-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2604-160-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-158-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-154-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-152-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-150-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-142-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/2604-171-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2604-173-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3880-178-0x0000000002190000-0x00000000021D6000-memory.dmpFilesize
280KB
-
memory/3880-179-0x0000000004A80000-0x0000000004AC4000-memory.dmpFilesize
272KB
-
memory/3880-180-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-181-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-183-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-185-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-187-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-189-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-191-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-193-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-195-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-197-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-199-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-201-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-203-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-205-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-207-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-209-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-211-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-213-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3880-338-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-336-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/3880-342-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-340-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1090-0x0000000005080000-0x0000000005686000-memory.dmpFilesize
6.0MB
-
memory/3880-1091-0x0000000005690000-0x000000000579A000-memory.dmpFilesize
1.0MB
-
memory/3880-1092-0x00000000057A0000-0x00000000057B2000-memory.dmpFilesize
72KB
-
memory/3880-1093-0x00000000057C0000-0x00000000057FE000-memory.dmpFilesize
248KB
-
memory/3880-1094-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/3880-1095-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1097-0x0000000005AA0000-0x0000000005B06000-memory.dmpFilesize
408KB
-
memory/3880-1098-0x0000000006160000-0x00000000061F2000-memory.dmpFilesize
584KB
-
memory/3880-1099-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1100-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1101-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1102-0x00000000020A0000-0x0000000002116000-memory.dmpFilesize
472KB
-
memory/3880-1103-0x0000000007600000-0x0000000007650000-memory.dmpFilesize
320KB
-
memory/3880-1104-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/3880-1105-0x0000000007650000-0x0000000007812000-memory.dmpFilesize
1.8MB
-
memory/3880-1106-0x0000000007820000-0x0000000007D4C000-memory.dmpFilesize
5.2MB
-
memory/5060-1112-0x0000000000150000-0x0000000000182000-memory.dmpFilesize
200KB
-
memory/5060-1113-0x0000000004B90000-0x0000000004BDB000-memory.dmpFilesize
300KB
-
memory/5060-1114-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/5060-1115-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB