Analysis
-
max time kernel
64s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:27
Static task
static1
Behavioral task
behavioral1
Sample
32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe
Resource
win10-20230220-en
General
-
Target
32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe
-
Size
657KB
-
MD5
00328bacdb23f7f6e97d201d5ea0d485
-
SHA1
acfea07f9f8444c04fb55e861ce32a172fce60dd
-
SHA256
32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194
-
SHA512
b381b37b38f3debe11d8834c117108b41203d17b0afa3f26675c555a69ee3b0298401b02b6bcbe01c8c59ef1141dabab317ae97d1008317ea7b89cdb2fa1887c
-
SSDEEP
12288:SMrDy90YYBwhZb1BncVRDtIQe5l9uWBLt84MWE8Q44azWKNC8vBQn4GtyE:1yoBm1SDt7eZhEP854jKY4Sx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0066.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0066.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-179-0x00000000020D0000-0x0000000002116000-memory.dmp family_redline behavioral1/memory/4824-182-0x00000000022C0000-0x0000000002304000-memory.dmp family_redline behavioral1/memory/4824-184-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-183-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-186-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-188-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-190-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-192-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-194-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-196-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-199-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-201-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-203-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-205-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-207-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-209-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-211-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-213-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-215-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-217-0x00000000022C0000-0x00000000022FF000-memory.dmp family_redline behavioral1/memory/4824-1100-0x0000000004DD0000-0x0000000004DE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un724967.exepro0066.exequ5713.exesi816472.exepid process 4468 un724967.exe 4924 pro0066.exe 4824 qu5713.exe 3088 si816472.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0066.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0066.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exeun724967.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un724967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un724967.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0066.exequ5713.exesi816472.exepid process 4924 pro0066.exe 4924 pro0066.exe 4824 qu5713.exe 4824 qu5713.exe 3088 si816472.exe 3088 si816472.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0066.exequ5713.exesi816472.exedescription pid process Token: SeDebugPrivilege 4924 pro0066.exe Token: SeDebugPrivilege 4824 qu5713.exe Token: SeDebugPrivilege 3088 si816472.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exeun724967.exedescription pid process target process PID 3624 wrote to memory of 4468 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe un724967.exe PID 3624 wrote to memory of 4468 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe un724967.exe PID 3624 wrote to memory of 4468 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe un724967.exe PID 4468 wrote to memory of 4924 4468 un724967.exe pro0066.exe PID 4468 wrote to memory of 4924 4468 un724967.exe pro0066.exe PID 4468 wrote to memory of 4924 4468 un724967.exe pro0066.exe PID 4468 wrote to memory of 4824 4468 un724967.exe qu5713.exe PID 4468 wrote to memory of 4824 4468 un724967.exe qu5713.exe PID 4468 wrote to memory of 4824 4468 un724967.exe qu5713.exe PID 3624 wrote to memory of 3088 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe si816472.exe PID 3624 wrote to memory of 3088 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe si816472.exe PID 3624 wrote to memory of 3088 3624 32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe si816472.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe"C:\Users\Admin\AppData\Local\Temp\32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exeFilesize
175KB
MD53621b1505d42d0433113a3c61e52612e
SHA1f2e2c4a4f132b4f26be78f4f1b421198e2752113
SHA2568b578dad213dfa7a504cc8feb63ab2d68da21f8211a26125b4bdb1c30c65bbb0
SHA5129923f9deded577d14db501184631bd05e64470eb5273d1ef55252f9c2f12db0fceafeed48fe24d997ec652fd36bf18c8cbafa41f00afb3283ffc6bc1084f63a9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exeFilesize
175KB
MD53621b1505d42d0433113a3c61e52612e
SHA1f2e2c4a4f132b4f26be78f4f1b421198e2752113
SHA2568b578dad213dfa7a504cc8feb63ab2d68da21f8211a26125b4bdb1c30c65bbb0
SHA5129923f9deded577d14db501184631bd05e64470eb5273d1ef55252f9c2f12db0fceafeed48fe24d997ec652fd36bf18c8cbafa41f00afb3283ffc6bc1084f63a9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exeFilesize
515KB
MD5c960832f904b85dd871eb33c0fb180dd
SHA15630513a75be0a4646b2ccc8e2b90f54c5fe1c0f
SHA256c2ee8e6c6af0442d5bf2d5eefdd4411244a7d952f6de2c6491c7f801b4f949b8
SHA5123c7ebdcb412527adb1e3a8a4ad028ca0aee123b7a0c9d4a3753dcd69c258b5976f013150deb59d79c0835ea307ccf6ea9cb396263a5cbc1c772e60030624a001
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exeFilesize
515KB
MD5c960832f904b85dd871eb33c0fb180dd
SHA15630513a75be0a4646b2ccc8e2b90f54c5fe1c0f
SHA256c2ee8e6c6af0442d5bf2d5eefdd4411244a7d952f6de2c6491c7f801b4f949b8
SHA5123c7ebdcb412527adb1e3a8a4ad028ca0aee123b7a0c9d4a3753dcd69c258b5976f013150deb59d79c0835ea307ccf6ea9cb396263a5cbc1c772e60030624a001
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exeFilesize
235KB
MD502b4741c9b5eaf5a73c25453243a0868
SHA1c01a160057d0781a680f5747564e0ee8e391dc35
SHA256c77c3cd7f7fde6de8034e67338516c0c2a651bb32873740ed4e60be131752d03
SHA512e736dd265f7694f4913950f9e951a98aa6b41536b7f6bee0b8a5552d8d46918b6213ddba5b8a2785b078ae878a228e78822488f490da02ff8d519c0afbf2cb5c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exeFilesize
235KB
MD502b4741c9b5eaf5a73c25453243a0868
SHA1c01a160057d0781a680f5747564e0ee8e391dc35
SHA256c77c3cd7f7fde6de8034e67338516c0c2a651bb32873740ed4e60be131752d03
SHA512e736dd265f7694f4913950f9e951a98aa6b41536b7f6bee0b8a5552d8d46918b6213ddba5b8a2785b078ae878a228e78822488f490da02ff8d519c0afbf2cb5c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exeFilesize
294KB
MD5f47700d06deaeadb23f0185b4f36f397
SHA162ed337214f07319e9072cc472c1d053c970f993
SHA256aa49a524d74b18603705c919d6dd8431e269be26549d6c0ee168bdccc7903a9e
SHA51276e5a1ac53689a3e9f94570e9f75fb1ed68adb69d4b68a89511fd4cb20b0b010e55565d42e542605f0ee0fd222266e3a314e4eb4eaf8f8e57bdab4de4ea6ef0e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exeFilesize
294KB
MD5f47700d06deaeadb23f0185b4f36f397
SHA162ed337214f07319e9072cc472c1d053c970f993
SHA256aa49a524d74b18603705c919d6dd8431e269be26549d6c0ee168bdccc7903a9e
SHA51276e5a1ac53689a3e9f94570e9f75fb1ed68adb69d4b68a89511fd4cb20b0b010e55565d42e542605f0ee0fd222266e3a314e4eb4eaf8f8e57bdab4de4ea6ef0e
-
memory/3088-1113-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/3088-1112-0x0000000005050000-0x000000000509B000-memory.dmpFilesize
300KB
-
memory/3088-1111-0x0000000000610000-0x0000000000642000-memory.dmpFilesize
200KB
-
memory/4824-1091-0x0000000004C90000-0x0000000004D9A000-memory.dmpFilesize
1.0MB
-
memory/4824-1094-0x0000000002790000-0x00000000027DB000-memory.dmpFilesize
300KB
-
memory/4824-1105-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-1104-0x0000000006750000-0x0000000006C7C000-memory.dmpFilesize
5.2MB
-
memory/4824-1103-0x0000000006580000-0x0000000006742000-memory.dmpFilesize
1.8MB
-
memory/4824-1102-0x00000000064F0000-0x0000000006540000-memory.dmpFilesize
320KB
-
memory/4824-1101-0x0000000006460000-0x00000000064D6000-memory.dmpFilesize
472KB
-
memory/4824-1100-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-1098-0x0000000005530000-0x0000000005596000-memory.dmpFilesize
408KB
-
memory/4824-1097-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/4824-1096-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-1095-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-1093-0x0000000002750000-0x000000000278E000-memory.dmpFilesize
248KB
-
memory/4824-1092-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/4824-1090-0x00000000058F0000-0x0000000005EF6000-memory.dmpFilesize
6.0MB
-
memory/4824-217-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-215-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-213-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-211-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-209-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-207-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-205-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-180-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/4824-179-0x00000000020D0000-0x0000000002116000-memory.dmpFilesize
280KB
-
memory/4824-181-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-182-0x00000000022C0000-0x0000000002304000-memory.dmpFilesize
272KB
-
memory/4824-184-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-183-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-186-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-188-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-190-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-192-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-194-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-197-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4824-196-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-199-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-201-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4824-203-0x00000000022C0000-0x00000000022FF000-memory.dmpFilesize
252KB
-
memory/4924-162-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-134-0x0000000002200000-0x000000000221A000-memory.dmpFilesize
104KB
-
memory/4924-136-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-172-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-171-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-170-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-169-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4924-168-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-138-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-166-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-164-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-142-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-174-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4924-141-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-144-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-156-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-154-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-152-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-150-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-148-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-146-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-158-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4924-140-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4924-139-0x00000000049D0000-0x00000000049E8000-memory.dmpFilesize
96KB
-
memory/4924-137-0x0000000004A50000-0x0000000004F4E000-memory.dmpFilesize
5.0MB
-
memory/4924-135-0x0000000000580000-0x00000000005AD000-memory.dmpFilesize
180KB
-
memory/4924-160-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB