Analysis
-
max time kernel
57s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 19:53
Static task
static1
Behavioral task
behavioral1
Sample
9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe
Resource
win10-20230220-en
General
-
Target
9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe
-
Size
672KB
-
MD5
16c507619dbdf237b60f2257412d02c3
-
SHA1
e2a23df8139d0aa744fc548a963974c4096e85d4
-
SHA256
9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8
-
SHA512
d60adc53294edc6d3cce20329604b30236e2384eca11a4d21c648c2c8cde1c9fcbbd0c63a1a15b9c8ef47c147f05be139bbcbd458845e76ec037c4a0a3497713
-
SSDEEP
12288:+MrUy90WhiMbsxFJ8WuifL/+0woBBosQOb8rym1epyPYzs:Oy3iMAbXtnrxbnsepy3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2317.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2317.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1412-173-0x0000000000770000-0x00000000007B6000-memory.dmp family_redline behavioral1/memory/1412-174-0x00000000024D0000-0x0000000002514000-memory.dmp family_redline behavioral1/memory/1412-175-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-178-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-176-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-180-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-182-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-184-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-186-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-188-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-190-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-192-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-194-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-196-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-198-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-200-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-202-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-204-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-206-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/1412-208-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un455193.exepro2317.exequ8787.exesi477100.exepid process 4968 un455193.exe 2124 pro2317.exe 1412 qu8787.exe 4580 si477100.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2317.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2317.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exeun455193.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un455193.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un455193.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2317.exequ8787.exesi477100.exepid process 2124 pro2317.exe 2124 pro2317.exe 1412 qu8787.exe 1412 qu8787.exe 4580 si477100.exe 4580 si477100.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2317.exequ8787.exesi477100.exedescription pid process Token: SeDebugPrivilege 2124 pro2317.exe Token: SeDebugPrivilege 1412 qu8787.exe Token: SeDebugPrivilege 4580 si477100.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exeun455193.exedescription pid process target process PID 4668 wrote to memory of 4968 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe un455193.exe PID 4668 wrote to memory of 4968 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe un455193.exe PID 4668 wrote to memory of 4968 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe un455193.exe PID 4968 wrote to memory of 2124 4968 un455193.exe pro2317.exe PID 4968 wrote to memory of 2124 4968 un455193.exe pro2317.exe PID 4968 wrote to memory of 2124 4968 un455193.exe pro2317.exe PID 4968 wrote to memory of 1412 4968 un455193.exe qu8787.exe PID 4968 wrote to memory of 1412 4968 un455193.exe qu8787.exe PID 4968 wrote to memory of 1412 4968 un455193.exe qu8787.exe PID 4668 wrote to memory of 4580 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe si477100.exe PID 4668 wrote to memory of 4580 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe si477100.exe PID 4668 wrote to memory of 4580 4668 9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe si477100.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe"C:\Users\Admin\AppData\Local\Temp\9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exeFilesize
175KB
MD596a0a0a068d686ec9621f3b0622f61cc
SHA101d7100238ca7db848e9c6f314409f7b0f8b8de8
SHA256b4dec2d608708428a62d8da0af4534e32ab9c86f0639497a93a61a37d46fc5e2
SHA51231130f95a4294623d04d8a107e54ef6ec9764e20ebef9adbbbde9dcf97e5b7d8075b9c6d3b713c44494f3d540ed497d710f8adaf6803cf2d4d5129c6d4933ea3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exeFilesize
175KB
MD596a0a0a068d686ec9621f3b0622f61cc
SHA101d7100238ca7db848e9c6f314409f7b0f8b8de8
SHA256b4dec2d608708428a62d8da0af4534e32ab9c86f0639497a93a61a37d46fc5e2
SHA51231130f95a4294623d04d8a107e54ef6ec9764e20ebef9adbbbde9dcf97e5b7d8075b9c6d3b713c44494f3d540ed497d710f8adaf6803cf2d4d5129c6d4933ea3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exeFilesize
530KB
MD5b5bfd17bebcd1208571996a3013b219f
SHA1587fccc81a59e4125f66d9ae7b779296e4e3a611
SHA256684a02d030c597052792431b98492a87bbab617bdc0c46b6cce3cc16ff983ab8
SHA51228077a1640c7832a726553758863572ec7c3782c234e719d75496adb328903e03437c5e801dde12d176fc89f8635b625dc8dcc08ac9ae9ce94e4595bc690b647
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exeFilesize
530KB
MD5b5bfd17bebcd1208571996a3013b219f
SHA1587fccc81a59e4125f66d9ae7b779296e4e3a611
SHA256684a02d030c597052792431b98492a87bbab617bdc0c46b6cce3cc16ff983ab8
SHA51228077a1640c7832a726553758863572ec7c3782c234e719d75496adb328903e03437c5e801dde12d176fc89f8635b625dc8dcc08ac9ae9ce94e4595bc690b647
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exeFilesize
260KB
MD53207f1dc33437c112077489a1e1551c5
SHA1cde0d8905fea98daa62f0cd1baceaf6695de5b3a
SHA256b9957fd4d48c124ed15fff1024d46bed87c01654938fc5ed6afc5f7df0911b8b
SHA512bb665385854b59f4d15080c7c937e2a0277ffbde7e7805b4f56478fa8a30ed817a1a6d1879ccdb041ca64cd065356b6e206a09b45fefe907e2c103ca9370df92
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exeFilesize
260KB
MD53207f1dc33437c112077489a1e1551c5
SHA1cde0d8905fea98daa62f0cd1baceaf6695de5b3a
SHA256b9957fd4d48c124ed15fff1024d46bed87c01654938fc5ed6afc5f7df0911b8b
SHA512bb665385854b59f4d15080c7c937e2a0277ffbde7e7805b4f56478fa8a30ed817a1a6d1879ccdb041ca64cd065356b6e206a09b45fefe907e2c103ca9370df92
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exeFilesize
318KB
MD587ddc80b1dafcf584d607a4f520a34c5
SHA12911b2065bd271b3569fd132078020d288841889
SHA2564a936972aae17290e713d786dcc13dc2f293724167d30eb18c3975683b4987cb
SHA5121cee5203538bf1366f25e12d80201e473af981e4faa60f74d05eda464afcf79c0bdadea4a027822e42a9cc41f5ece9bec56d71d40d77974ca4df765bbf6da362
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exeFilesize
318KB
MD587ddc80b1dafcf584d607a4f520a34c5
SHA12911b2065bd271b3569fd132078020d288841889
SHA2564a936972aae17290e713d786dcc13dc2f293724167d30eb18c3975683b4987cb
SHA5121cee5203538bf1366f25e12d80201e473af981e4faa60f74d05eda464afcf79c0bdadea4a027822e42a9cc41f5ece9bec56d71d40d77974ca4df765bbf6da362
-
memory/1412-1088-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-1089-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/1412-1101-0x0000000009390000-0x00000000093E0000-memory.dmpFilesize
320KB
-
memory/1412-1100-0x0000000009310000-0x0000000009386000-memory.dmpFilesize
472KB
-
memory/1412-1099-0x0000000008D20000-0x000000000924C000-memory.dmpFilesize
5.2MB
-
memory/1412-1098-0x0000000008B50000-0x0000000008D12000-memory.dmpFilesize
1.8MB
-
memory/1412-1097-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-1096-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-1095-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-1094-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-1092-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/1412-1091-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/1412-1090-0x0000000005A90000-0x0000000005ADB000-memory.dmpFilesize
300KB
-
memory/1412-192-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-1087-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/1412-1086-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/1412-1085-0x0000000005180000-0x0000000005786000-memory.dmpFilesize
6.0MB
-
memory/1412-436-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-434-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-430-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/1412-432-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/1412-208-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-173-0x0000000000770000-0x00000000007B6000-memory.dmpFilesize
280KB
-
memory/1412-174-0x00000000024D0000-0x0000000002514000-memory.dmpFilesize
272KB
-
memory/1412-194-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-178-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-176-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-180-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-182-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-184-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-186-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-188-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-206-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-190-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-175-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-196-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-198-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-200-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-202-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1412-204-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/2124-168-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2124-140-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-135-0x0000000004A10000-0x0000000004F0E000-memory.dmpFilesize
5.0MB
-
memory/2124-150-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-166-0x0000000002250000-0x0000000002260000-memory.dmpFilesize
64KB
-
memory/2124-165-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2124-164-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-160-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-162-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-133-0x0000000002250000-0x0000000002260000-memory.dmpFilesize
64KB
-
memory/2124-148-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-156-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-154-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-134-0x0000000002250000-0x0000000002260000-memory.dmpFilesize
64KB
-
memory/2124-142-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-136-0x00000000022A0000-0x00000000022B8000-memory.dmpFilesize
96KB
-
memory/2124-146-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-144-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-158-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-152-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-138-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-137-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/2124-132-0x0000000000590000-0x00000000005BD000-memory.dmpFilesize
180KB
-
memory/2124-131-0x00000000021A0000-0x00000000021BA000-memory.dmpFilesize
104KB
-
memory/4580-1107-0x0000000000190000-0x00000000001C2000-memory.dmpFilesize
200KB
-
memory/4580-1108-0x0000000004BD0000-0x0000000004C1B000-memory.dmpFilesize
300KB
-
memory/4580-1109-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/4580-1110-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB