Analysis
-
max time kernel
53s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 22:32
Static task
static1
Behavioral task
behavioral1
Sample
cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe
Resource
win10-20230220-en
General
-
Target
cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe
-
Size
659KB
-
MD5
d292e6876bd486d31e64083282eb5bac
-
SHA1
ca06a29774e5d016b8dac35f7295c086f8da7a17
-
SHA256
cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1
-
SHA512
c2332578a9f336f3cd67a9da8cbf6108e9161edad03e6559cc86b30a3393ea52f95bafe268d6baf4b8191082d8820babfab3ab2e0f831e072c6f4b67b0bd9529
-
SSDEEP
12288:rMrUy90lSog82wBtZ78Jm0TChqDVTEt59VrwCfwCfdBft/juesVHX:Ty5M2wuJXDDV4t5XJf9fDB5sV3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7099.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7099.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3140-174-0x00000000049B0000-0x00000000049F6000-memory.dmp family_redline behavioral1/memory/3140-175-0x0000000004A30000-0x0000000004A74000-memory.dmp family_redline behavioral1/memory/3140-177-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-176-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-179-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-181-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-183-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-185-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-187-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-189-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-191-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-193-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-195-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-197-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-199-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-201-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-205-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-209-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-211-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-213-0x0000000004A30000-0x0000000004A6F000-memory.dmp family_redline behavioral1/memory/3140-1096-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un144281.exepro7099.exequ5596.exesi709304.exepid process 4456 un144281.exe 4980 pro7099.exe 3140 qu5596.exe 3740 si709304.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7099.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7099.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exeun144281.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un144281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un144281.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7099.exequ5596.exesi709304.exepid process 4980 pro7099.exe 4980 pro7099.exe 3140 qu5596.exe 3140 qu5596.exe 3740 si709304.exe 3740 si709304.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7099.exequ5596.exesi709304.exedescription pid process Token: SeDebugPrivilege 4980 pro7099.exe Token: SeDebugPrivilege 3140 qu5596.exe Token: SeDebugPrivilege 3740 si709304.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exeun144281.exedescription pid process target process PID 3152 wrote to memory of 4456 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe un144281.exe PID 3152 wrote to memory of 4456 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe un144281.exe PID 3152 wrote to memory of 4456 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe un144281.exe PID 4456 wrote to memory of 4980 4456 un144281.exe pro7099.exe PID 4456 wrote to memory of 4980 4456 un144281.exe pro7099.exe PID 4456 wrote to memory of 4980 4456 un144281.exe pro7099.exe PID 4456 wrote to memory of 3140 4456 un144281.exe qu5596.exe PID 4456 wrote to memory of 3140 4456 un144281.exe qu5596.exe PID 4456 wrote to memory of 3140 4456 un144281.exe qu5596.exe PID 3152 wrote to memory of 3740 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe si709304.exe PID 3152 wrote to memory of 3740 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe si709304.exe PID 3152 wrote to memory of 3740 3152 cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe si709304.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe"C:\Users\Admin\AppData\Local\Temp\cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exeFilesize
175KB
MD50fa97d8087d481b72a5496441d7bfbda
SHA1f02aec923be0424c76e2c8253dfd795590cc9a63
SHA256d184e31839ed9d266061a0e276be775c0389a2ec20886f6a45fbed8ee05bc68d
SHA5125c0e50722764c416dffb9ebdd7e719a5334f735bebdc5f05d6ee9ab7aed5a10f865d24f321dcdb6c987917c65884e1698aa259a63406de74c1e1fe74867dc601
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exeFilesize
175KB
MD50fa97d8087d481b72a5496441d7bfbda
SHA1f02aec923be0424c76e2c8253dfd795590cc9a63
SHA256d184e31839ed9d266061a0e276be775c0389a2ec20886f6a45fbed8ee05bc68d
SHA5125c0e50722764c416dffb9ebdd7e719a5334f735bebdc5f05d6ee9ab7aed5a10f865d24f321dcdb6c987917c65884e1698aa259a63406de74c1e1fe74867dc601
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exeFilesize
517KB
MD5d0f479855b34a7fa9b9f3e90ffa85d9b
SHA1aebb62ed1f5f42b6ff16b496c416802acfcd9fee
SHA25685ced6b79e111808f1365b2f7a9eba71af434ba01045679460394b9b48e32987
SHA51249a2b823dd4d7d3cf4760ce3d61496ed7bd8b70dfa7b39916def5bcf59fc9f8e7dafb4eb0f75b42cb6f6d16f11969f48b601c49f9660f626ece51e4a5b6fac29
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exeFilesize
517KB
MD5d0f479855b34a7fa9b9f3e90ffa85d9b
SHA1aebb62ed1f5f42b6ff16b496c416802acfcd9fee
SHA25685ced6b79e111808f1365b2f7a9eba71af434ba01045679460394b9b48e32987
SHA51249a2b823dd4d7d3cf4760ce3d61496ed7bd8b70dfa7b39916def5bcf59fc9f8e7dafb4eb0f75b42cb6f6d16f11969f48b601c49f9660f626ece51e4a5b6fac29
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exeFilesize
237KB
MD5163527450f5b6cc30b17b1abe16ee67b
SHA14ff2d244f0754371a4c8b4710fa5c3a286c73523
SHA256b7a0301915c5af8f7f346f67c117e934ffa431c04a522c643c9dcb46e4206794
SHA5124c595e9461c5ff55b3a682277619de0e4d9f12601e028f6e814f69fd9ad17e157c2dbe09cedad53a601a1f991c438e8d171220aa6cb6b37f9a1d97c57a5a2c84
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exeFilesize
237KB
MD5163527450f5b6cc30b17b1abe16ee67b
SHA14ff2d244f0754371a4c8b4710fa5c3a286c73523
SHA256b7a0301915c5af8f7f346f67c117e934ffa431c04a522c643c9dcb46e4206794
SHA5124c595e9461c5ff55b3a682277619de0e4d9f12601e028f6e814f69fd9ad17e157c2dbe09cedad53a601a1f991c438e8d171220aa6cb6b37f9a1d97c57a5a2c84
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exeFilesize
295KB
MD5675b770e922b4d5ba7d19f7e9510e887
SHA118a0a47d7fb0fc9ca6f11036d10edfcf2be47b66
SHA2566dd4b4490b7619cd4810a4c23d74fef6b4d16204c96b3beb80e6285c6d53d2e2
SHA5128eaa9c6cb6f1f20fa2aef3e032fdb539932e707aff9a4faa35473d2d3b1ba61ea166dd1ab90e9a475e4df19feb1fcaff54ccb0eb39320d0e1fa96be9ce82e4df
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exeFilesize
295KB
MD5675b770e922b4d5ba7d19f7e9510e887
SHA118a0a47d7fb0fc9ca6f11036d10edfcf2be47b66
SHA2566dd4b4490b7619cd4810a4c23d74fef6b4d16204c96b3beb80e6285c6d53d2e2
SHA5128eaa9c6cb6f1f20fa2aef3e032fdb539932e707aff9a4faa35473d2d3b1ba61ea166dd1ab90e9a475e4df19feb1fcaff54ccb0eb39320d0e1fa96be9ce82e4df
-
memory/3140-1086-0x0000000005780000-0x0000000005D86000-memory.dmpFilesize
6.0MB
-
memory/3140-1088-0x00000000052D0000-0x00000000052E2000-memory.dmpFilesize
72KB
-
memory/3140-203-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/3140-204-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-208-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-206-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-1101-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-191-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-1100-0x0000000006890000-0x0000000006DBC000-memory.dmpFilesize
5.2MB
-
memory/3140-1099-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/3140-1098-0x0000000006630000-0x0000000006680000-memory.dmpFilesize
320KB
-
memory/3140-1097-0x00000000065A0000-0x0000000006616000-memory.dmpFilesize
472KB
-
memory/3140-1096-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-193-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-1095-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-1094-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/3140-1093-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/3140-195-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-1091-0x0000000005440000-0x000000000548B000-memory.dmpFilesize
300KB
-
memory/3140-1090-0x00000000052F0000-0x000000000532E000-memory.dmpFilesize
248KB
-
memory/3140-1089-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/3140-209-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-174-0x00000000049B0000-0x00000000049F6000-memory.dmpFilesize
280KB
-
memory/3140-175-0x0000000004A30000-0x0000000004A74000-memory.dmpFilesize
272KB
-
memory/3140-177-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-176-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-179-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-181-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-183-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-185-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-187-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-189-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-1087-0x0000000005190000-0x000000000529A000-memory.dmpFilesize
1.0MB
-
memory/3140-213-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-211-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-197-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-199-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-201-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3140-205-0x0000000004A30000-0x0000000004A6F000-memory.dmpFilesize
252KB
-
memory/3740-1107-0x00000000005A0000-0x00000000005D2000-memory.dmpFilesize
200KB
-
memory/3740-1108-0x0000000004FE0000-0x000000000502B000-memory.dmpFilesize
300KB
-
memory/3740-1109-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/3740-1111-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/4980-165-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-166-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4980-159-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-134-0x0000000004990000-0x00000000049A0000-memory.dmpFilesize
64KB
-
memory/4980-147-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-135-0x0000000004990000-0x00000000049A0000-memory.dmpFilesize
64KB
-
memory/4980-136-0x00000000049A0000-0x0000000004E9E000-memory.dmpFilesize
5.0MB
-
memory/4980-169-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4980-167-0x0000000004990000-0x00000000049A0000-memory.dmpFilesize
64KB
-
memory/4980-137-0x0000000004EE0000-0x0000000004EF8000-memory.dmpFilesize
96KB
-
memory/4980-163-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-161-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-157-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-155-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-153-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-151-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-149-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-145-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-133-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4980-132-0x00000000023F0000-0x000000000240A000-memory.dmpFilesize
104KB
-
memory/4980-143-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-141-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-139-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB
-
memory/4980-138-0x0000000004EE0000-0x0000000004EF2000-memory.dmpFilesize
72KB