Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 20:01
Static task
static1
Behavioral task
behavioral1
Sample
9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe
Resource
win10-20230220-en
General
-
Target
9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe
-
Size
673KB
-
MD5
74c5f5008b880ee81954365795082dcd
-
SHA1
819f511278c489eed49ffe379d83e529001bdc8c
-
SHA256
9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49
-
SHA512
e00a4c3150ba8ce6896f04ffceb8c8a3d4c68e052a21f4213a2f89d71354682ba20a58120579756f74c4c06b4df76c58a0c17a476f99c63b8c16d96a3c56f446
-
SSDEEP
12288:3MrCy90ERdCTqBps3D4DnsXtITHozFKCXu9Ha5NfBRVJR30Obcr4mLtYQmFdc:hyzlk3UnsXeHQ/uta5lBRVJR7b5utlmg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2642.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2642.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4104-178-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/4104-179-0x0000000002560000-0x00000000025A4000-memory.dmp family_redline behavioral1/memory/4104-180-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-181-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-183-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-185-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-187-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-189-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-191-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-193-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-195-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-197-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-199-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-201-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-203-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-205-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-207-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-209-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-211-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-213-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4104-259-0x0000000004B90000-0x0000000004BA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un910039.exepro2642.exequ1923.exesi815897.exepid process 3388 un910039.exe 3324 pro2642.exe 4104 qu1923.exe 3860 si815897.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2642.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2642.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exeun910039.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un910039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un910039.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2642.exequ1923.exesi815897.exepid process 3324 pro2642.exe 3324 pro2642.exe 4104 qu1923.exe 4104 qu1923.exe 3860 si815897.exe 3860 si815897.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2642.exequ1923.exesi815897.exedescription pid process Token: SeDebugPrivilege 3324 pro2642.exe Token: SeDebugPrivilege 4104 qu1923.exe Token: SeDebugPrivilege 3860 si815897.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exeun910039.exedescription pid process target process PID 3244 wrote to memory of 3388 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe un910039.exe PID 3244 wrote to memory of 3388 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe un910039.exe PID 3244 wrote to memory of 3388 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe un910039.exe PID 3388 wrote to memory of 3324 3388 un910039.exe pro2642.exe PID 3388 wrote to memory of 3324 3388 un910039.exe pro2642.exe PID 3388 wrote to memory of 3324 3388 un910039.exe pro2642.exe PID 3388 wrote to memory of 4104 3388 un910039.exe qu1923.exe PID 3388 wrote to memory of 4104 3388 un910039.exe qu1923.exe PID 3388 wrote to memory of 4104 3388 un910039.exe qu1923.exe PID 3244 wrote to memory of 3860 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe si815897.exe PID 3244 wrote to memory of 3860 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe si815897.exe PID 3244 wrote to memory of 3860 3244 9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe si815897.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe"C:\Users\Admin\AppData\Local\Temp\9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exeFilesize
175KB
MD565cceed8c5d0d439c78e2286dc558769
SHA164ab3124cf5dcea557a8f9d395a41c57dd6da1f9
SHA256e66c4cdcb09f6c233b0092e1437a30800c31218286ed3fba76029391e70eb4d3
SHA5125f033404f2b25c709bc78954363837c7c8b47e96c89774cb7669a5b5ec54fc5992d894234278e64f5fac37c1b86f3577961fa1d583d44bf47688165edc0c0da8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exeFilesize
175KB
MD565cceed8c5d0d439c78e2286dc558769
SHA164ab3124cf5dcea557a8f9d395a41c57dd6da1f9
SHA256e66c4cdcb09f6c233b0092e1437a30800c31218286ed3fba76029391e70eb4d3
SHA5125f033404f2b25c709bc78954363837c7c8b47e96c89774cb7669a5b5ec54fc5992d894234278e64f5fac37c1b86f3577961fa1d583d44bf47688165edc0c0da8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exeFilesize
531KB
MD5ba12d46cfa4fc4ce51e0508aad916d14
SHA195262d3a68a3a683e2f51521a7e613e63d76e1fd
SHA256b0eee4118a1783d3cf4d544f275a442114271b1552d93b598b9749a48cb3d152
SHA51228fddf791872ed90fe58abc8e8ad1d75db9a8092edb562f975be8a38de28e85573aa3353d6c64c50256fd0c42c0f05b4c4e35016b49e8dbd47523176ec1719ba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exeFilesize
531KB
MD5ba12d46cfa4fc4ce51e0508aad916d14
SHA195262d3a68a3a683e2f51521a7e613e63d76e1fd
SHA256b0eee4118a1783d3cf4d544f275a442114271b1552d93b598b9749a48cb3d152
SHA51228fddf791872ed90fe58abc8e8ad1d75db9a8092edb562f975be8a38de28e85573aa3353d6c64c50256fd0c42c0f05b4c4e35016b49e8dbd47523176ec1719ba
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exeFilesize
260KB
MD572a204e58ebc39c8eb4160c75c88102e
SHA12f3820abe28c71b875d07e9ea682144c035306bc
SHA256199a8172865bb5b784db064c7d3226fef0ad3771a8613c591c272aff2fac0719
SHA512fb18bdbf1ff080787b1d2e0b074b14f45a661b2a52e92a175f085bb0debcce12e1da93266316efcf8165ea387f0c4e707d4ea9bf85b767466ca1aa9dda666566
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exeFilesize
260KB
MD572a204e58ebc39c8eb4160c75c88102e
SHA12f3820abe28c71b875d07e9ea682144c035306bc
SHA256199a8172865bb5b784db064c7d3226fef0ad3771a8613c591c272aff2fac0719
SHA512fb18bdbf1ff080787b1d2e0b074b14f45a661b2a52e92a175f085bb0debcce12e1da93266316efcf8165ea387f0c4e707d4ea9bf85b767466ca1aa9dda666566
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exeFilesize
318KB
MD56bbd836dd179890e074464aa881f5bc1
SHA1cc55d3a6942b6f0fe5292b8a11d12a4219e9a9d0
SHA256e2daca44ce104beee46810677f49941ba049776c2760a3b388382457e3899e13
SHA51280db8481ebace67bfba42dee550be53988bece0d3b4acb3eb89e8ba80c3cc2f0c6655cf97bb34919adffcbe510445050221b30aeaaaf03a297dee273df43aaa2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exeFilesize
318KB
MD56bbd836dd179890e074464aa881f5bc1
SHA1cc55d3a6942b6f0fe5292b8a11d12a4219e9a9d0
SHA256e2daca44ce104beee46810677f49941ba049776c2760a3b388382457e3899e13
SHA51280db8481ebace67bfba42dee550be53988bece0d3b4acb3eb89e8ba80c3cc2f0c6655cf97bb34919adffcbe510445050221b30aeaaaf03a297dee273df43aaa2
-
memory/3324-136-0x00000000005E0000-0x000000000060D000-memory.dmpFilesize
180KB
-
memory/3324-137-0x0000000002130000-0x000000000214A000-memory.dmpFilesize
104KB
-
memory/3324-138-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/3324-139-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/3324-140-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/3324-141-0x0000000004CD0000-0x00000000051CE000-memory.dmpFilesize
5.0MB
-
memory/3324-142-0x00000000025B0000-0x00000000025C8000-memory.dmpFilesize
96KB
-
memory/3324-143-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-144-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-146-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-148-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-150-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-154-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-152-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-156-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-158-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-170-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-168-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-166-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-164-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-162-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-160-0x00000000025B0000-0x00000000025C2000-memory.dmpFilesize
72KB
-
memory/3324-171-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3324-173-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3860-1112-0x00000000001D0000-0x0000000000202000-memory.dmpFilesize
200KB
-
memory/3860-1114-0x0000000004D50000-0x0000000004D60000-memory.dmpFilesize
64KB
-
memory/3860-1113-0x0000000004C10000-0x0000000004C5B000-memory.dmpFilesize
300KB
-
memory/4104-181-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-259-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-183-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-185-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-187-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-189-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-191-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-193-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-195-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-197-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-199-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-201-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-203-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-205-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-207-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-209-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-211-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-213-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-258-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/4104-180-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4104-261-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-263-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1090-0x00000000056B0000-0x0000000005CB6000-memory.dmpFilesize
6.0MB
-
memory/4104-1091-0x00000000050A0000-0x00000000051AA000-memory.dmpFilesize
1.0MB
-
memory/4104-1092-0x0000000004B70000-0x0000000004B82000-memory.dmpFilesize
72KB
-
memory/4104-1093-0x00000000051B0000-0x00000000051EE000-memory.dmpFilesize
248KB
-
memory/4104-1094-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/4104-1095-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1097-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1098-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1099-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1100-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/4104-1101-0x0000000005530000-0x0000000005596000-memory.dmpFilesize
408KB
-
memory/4104-1102-0x0000000006340000-0x0000000006502000-memory.dmpFilesize
1.8MB
-
memory/4104-1103-0x0000000006510000-0x0000000006A3C000-memory.dmpFilesize
5.2MB
-
memory/4104-179-0x0000000002560000-0x00000000025A4000-memory.dmpFilesize
272KB
-
memory/4104-178-0x00000000024B0000-0x00000000024F6000-memory.dmpFilesize
280KB
-
memory/4104-1104-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4104-1105-0x0000000006CB0000-0x0000000006D26000-memory.dmpFilesize
472KB
-
memory/4104-1106-0x0000000006D40000-0x0000000006D90000-memory.dmpFilesize
320KB