Analysis
-
max time kernel
52s -
max time network
76s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 20:09
Static task
static1
Behavioral task
behavioral1
Sample
8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe
Resource
win10-20230220-en
General
-
Target
8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe
-
Size
673KB
-
MD5
fe1022d860e4e528e32ffcbcc660310e
-
SHA1
01ddc32efb278e620c734632ec957c7196f1d0cc
-
SHA256
8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64
-
SHA512
bf680a49e39900c3844d44608d26846e1a12ecc030fd79974a87c976569ddad7ab5415f0858d6326cfd28e74842752d7d11ebfeae7e7a26c315423c48c8b3341
-
SSDEEP
12288:oMrey90den2Nt18kh3t4rxCleW9R7bJ+oCwFReve6zLOborTmau+ElkrtkyYS:WyDWnh3t4r1OVErwACbcLu+5tpYS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5188.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5188.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5188.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5188.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5188.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5188.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4744-175-0x0000000002410000-0x0000000002456000-memory.dmp family_redline behavioral1/memory/4744-176-0x0000000004A30000-0x0000000004A74000-memory.dmp family_redline behavioral1/memory/4744-177-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-178-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-182-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-180-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-184-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-186-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-188-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-190-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-192-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-194-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-196-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-198-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-200-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-202-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-204-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-206-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-208-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/4744-210-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un571603.exepro5188.exequ4732.exesi606505.exepid process 4100 un571603.exe 1012 pro5188.exe 4744 qu4732.exe 4840 si606505.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5188.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5188.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5188.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exeun571603.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un571603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un571603.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5188.exequ4732.exesi606505.exepid process 1012 pro5188.exe 1012 pro5188.exe 4744 qu4732.exe 4744 qu4732.exe 4840 si606505.exe 4840 si606505.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5188.exequ4732.exesi606505.exedescription pid process Token: SeDebugPrivilege 1012 pro5188.exe Token: SeDebugPrivilege 4744 qu4732.exe Token: SeDebugPrivilege 4840 si606505.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exeun571603.exedescription pid process target process PID 8 wrote to memory of 4100 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe un571603.exe PID 8 wrote to memory of 4100 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe un571603.exe PID 8 wrote to memory of 4100 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe un571603.exe PID 4100 wrote to memory of 1012 4100 un571603.exe pro5188.exe PID 4100 wrote to memory of 1012 4100 un571603.exe pro5188.exe PID 4100 wrote to memory of 1012 4100 un571603.exe pro5188.exe PID 4100 wrote to memory of 4744 4100 un571603.exe qu4732.exe PID 4100 wrote to memory of 4744 4100 un571603.exe qu4732.exe PID 4100 wrote to memory of 4744 4100 un571603.exe qu4732.exe PID 8 wrote to memory of 4840 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe si606505.exe PID 8 wrote to memory of 4840 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe si606505.exe PID 8 wrote to memory of 4840 8 8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe si606505.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe"C:\Users\Admin\AppData\Local\Temp\8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exeFilesize
175KB
MD5f727263d187ee1e3fd424db10e5eb666
SHA1afbc6e83a7c33148b75d8a20561e682554a73da3
SHA2568aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94
SHA5125ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exeFilesize
175KB
MD5f727263d187ee1e3fd424db10e5eb666
SHA1afbc6e83a7c33148b75d8a20561e682554a73da3
SHA2568aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94
SHA5125ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exeFilesize
530KB
MD5e2f0bd36401843e2fb531f40bce97e0a
SHA1497d15bc7d41443d1561035053e38ee479bc45a3
SHA25650b150084ba04a769630c85d735d6bfd44b936637e552c1ce01f737d92957963
SHA512e8e17b6425f19a5e25a6e7878df471b170c8ae01629c0345427841785c373d6cc1a91c4c2765005d4cc2a728c1dc1b34fac7822eddacea46978428ca22325a2d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exeFilesize
530KB
MD5e2f0bd36401843e2fb531f40bce97e0a
SHA1497d15bc7d41443d1561035053e38ee479bc45a3
SHA25650b150084ba04a769630c85d735d6bfd44b936637e552c1ce01f737d92957963
SHA512e8e17b6425f19a5e25a6e7878df471b170c8ae01629c0345427841785c373d6cc1a91c4c2765005d4cc2a728c1dc1b34fac7822eddacea46978428ca22325a2d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exeFilesize
260KB
MD5a6ffc9d4e8f6763e9232f33815e72bb9
SHA1e6ae5dae1f493d45c0d635c21a71f4186c9add20
SHA2566d5465a491134d2a318e958aacefd58504d0fe4c7820974dc3c8a9f6b896640c
SHA512fcd88cc6b95225f36e111d8be6e4d607c4616760debe09c3191e5fa7bd861bfcf527014d89d9930c2dbd353d5417ef8cd8702eca92da897be9b653b69fc62de6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exeFilesize
260KB
MD5a6ffc9d4e8f6763e9232f33815e72bb9
SHA1e6ae5dae1f493d45c0d635c21a71f4186c9add20
SHA2566d5465a491134d2a318e958aacefd58504d0fe4c7820974dc3c8a9f6b896640c
SHA512fcd88cc6b95225f36e111d8be6e4d607c4616760debe09c3191e5fa7bd861bfcf527014d89d9930c2dbd353d5417ef8cd8702eca92da897be9b653b69fc62de6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exeFilesize
318KB
MD554f5eda53e3308f03783e28ef7e3b3df
SHA11d1817ec2fd622164213266da2f74a8ea2f6256e
SHA256a40a9fcb1a469a23e8b65254a77a6ca3855560b4e1b3578a34b956a1a17030c6
SHA512ccba589a563caca589c9004e08940f2fc5a47bc1495441878d3f92d861d327b36d8130c6fa44bae20b0d2619c23d7596889064ce8479acb92bdba2b31818f93a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exeFilesize
318KB
MD554f5eda53e3308f03783e28ef7e3b3df
SHA11d1817ec2fd622164213266da2f74a8ea2f6256e
SHA256a40a9fcb1a469a23e8b65254a77a6ca3855560b4e1b3578a34b956a1a17030c6
SHA512ccba589a563caca589c9004e08940f2fc5a47bc1495441878d3f92d861d327b36d8130c6fa44bae20b0d2619c23d7596889064ce8479acb92bdba2b31818f93a
-
memory/1012-135-0x0000000002140000-0x000000000215A000-memory.dmpFilesize
104KB
-
memory/1012-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/1012-137-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/1012-138-0x00000000049E0000-0x0000000004EDE000-memory.dmpFilesize
5.0MB
-
memory/1012-139-0x0000000004EF0000-0x0000000004F08000-memory.dmpFilesize
96KB
-
memory/1012-140-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-141-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-143-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-145-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-147-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-149-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-151-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-153-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-155-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-157-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-165-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-163-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-161-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-159-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-167-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/1012-168-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1012-170-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4744-175-0x0000000002410000-0x0000000002456000-memory.dmpFilesize
280KB
-
memory/4744-176-0x0000000004A30000-0x0000000004A74000-memory.dmpFilesize
272KB
-
memory/4744-177-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-178-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-182-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-180-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-184-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-186-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-188-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-190-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-192-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-194-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-196-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-198-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-200-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-202-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-204-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-206-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-208-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-210-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/4744-341-0x00000000005B0000-0x00000000005FB000-memory.dmpFilesize
300KB
-
memory/4744-344-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-347-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-349-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-1087-0x0000000005730000-0x0000000005D36000-memory.dmpFilesize
6.0MB
-
memory/4744-1088-0x0000000005190000-0x000000000529A000-memory.dmpFilesize
1.0MB
-
memory/4744-1089-0x00000000052D0000-0x00000000052E2000-memory.dmpFilesize
72KB
-
memory/4744-1091-0x00000000052F0000-0x000000000532E000-memory.dmpFilesize
248KB
-
memory/4744-1090-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-1092-0x0000000005440000-0x000000000548B000-memory.dmpFilesize
300KB
-
memory/4744-1093-0x00000000055D0000-0x0000000005636000-memory.dmpFilesize
408KB
-
memory/4744-1094-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/4744-1095-0x00000000063A0000-0x0000000006562000-memory.dmpFilesize
1.8MB
-
memory/4744-1097-0x0000000006570000-0x0000000006A9C000-memory.dmpFilesize
5.2MB
-
memory/4744-1098-0x0000000006BC0000-0x0000000006C36000-memory.dmpFilesize
472KB
-
memory/4744-1099-0x0000000006C40000-0x0000000006C90000-memory.dmpFilesize
320KB
-
memory/4744-1100-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-1101-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-1102-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4744-1103-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/4840-1109-0x0000000000970000-0x00000000009A2000-memory.dmpFilesize
200KB
-
memory/4840-1110-0x00000000053B0000-0x00000000053FB000-memory.dmpFilesize
300KB
-
memory/4840-1111-0x00000000051B0000-0x00000000051C0000-memory.dmpFilesize
64KB
-
memory/4840-1112-0x00000000051B0000-0x00000000051C0000-memory.dmpFilesize
64KB