Analysis
-
max time kernel
53s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 20:03
Static task
static1
Behavioral task
behavioral1
Sample
592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe
Resource
win10-20230220-en
General
-
Target
592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe
-
Size
657KB
-
MD5
f1ff39901712575b2b8ffe0af54eb85a
-
SHA1
f21b9d7fb398cc6779d9f4e9a65f5dbdd8bd95c0
-
SHA256
592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7
-
SHA512
1fd9a551657e6835ace423403de128041e4f7a8792b05b72b42711d12d9688db46241b487e9b347951cc75f5bd3bac5b2e2858edb94bfefe73bf17058b6e9fb4
-
SSDEEP
12288:TMrYy90IIiXYqVCHat+6kWCPQLt8RnU2We44WzWKVA8vCBO:Xy3tdHhqVWX4PKgO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2833.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2833.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2828-180-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/2828-181-0x00000000024C0000-0x0000000002504000-memory.dmp family_redline behavioral1/memory/2828-184-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-186-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-189-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-183-0x0000000002500000-0x0000000002510000-memory.dmp family_redline behavioral1/memory/2828-191-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-193-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-195-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-197-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-199-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-201-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-203-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-205-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-207-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-209-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-211-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-213-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-215-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-217-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline behavioral1/memory/2828-219-0x00000000024C0000-0x00000000024FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un381522.exepro2833.exequ1812.exesi476435.exepid process 3384 un381522.exe 4244 pro2833.exe 2828 qu1812.exe 4904 si476435.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2833.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2833.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exeun381522.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un381522.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un381522.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2833.exequ1812.exesi476435.exepid process 4244 pro2833.exe 4244 pro2833.exe 2828 qu1812.exe 2828 qu1812.exe 4904 si476435.exe 4904 si476435.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2833.exequ1812.exesi476435.exedescription pid process Token: SeDebugPrivilege 4244 pro2833.exe Token: SeDebugPrivilege 2828 qu1812.exe Token: SeDebugPrivilege 4904 si476435.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exeun381522.exedescription pid process target process PID 4044 wrote to memory of 3384 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe un381522.exe PID 4044 wrote to memory of 3384 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe un381522.exe PID 4044 wrote to memory of 3384 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe un381522.exe PID 3384 wrote to memory of 4244 3384 un381522.exe pro2833.exe PID 3384 wrote to memory of 4244 3384 un381522.exe pro2833.exe PID 3384 wrote to memory of 4244 3384 un381522.exe pro2833.exe PID 3384 wrote to memory of 2828 3384 un381522.exe qu1812.exe PID 3384 wrote to memory of 2828 3384 un381522.exe qu1812.exe PID 3384 wrote to memory of 2828 3384 un381522.exe qu1812.exe PID 4044 wrote to memory of 4904 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe si476435.exe PID 4044 wrote to memory of 4904 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe si476435.exe PID 4044 wrote to memory of 4904 4044 592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe si476435.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe"C:\Users\Admin\AppData\Local\Temp\592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exeFilesize
175KB
MD501408dfc7a8a176df578dbdd2efa2fdd
SHA192881097ab167c519e52f7bef8fe3dd067d499a8
SHA256f672221e0517fd59051cb20cbd5d98365d5340316bada6b95d7ebefe3ec0723e
SHA512238dfab24af8777f6f7856d5587a00b6f0bbb351d6d925a9add88c06cb0ea95c4713606e75092d243e947602c7e965de3cdb53789a1a50ecc07f49f98ba2527d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exeFilesize
175KB
MD501408dfc7a8a176df578dbdd2efa2fdd
SHA192881097ab167c519e52f7bef8fe3dd067d499a8
SHA256f672221e0517fd59051cb20cbd5d98365d5340316bada6b95d7ebefe3ec0723e
SHA512238dfab24af8777f6f7856d5587a00b6f0bbb351d6d925a9add88c06cb0ea95c4713606e75092d243e947602c7e965de3cdb53789a1a50ecc07f49f98ba2527d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exeFilesize
515KB
MD58267dd2c4b1ac00e631f5a027e1acdcf
SHA1467157c64134dfa0af2d58b69b8b7604266dcdf7
SHA25626bad643bb8eddf794af7c07350ab763247671d9fdfee14cc5fa9e75d46851c8
SHA5121ef3f1d3a1d68ac0566f581d983f2c59ddee6d14916ca05323dd20be8694ef552e00a9ea5a026e436675cdf9a22b1f5c4c63fd639ac8fb16ea6ac59b153e1f85
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exeFilesize
515KB
MD58267dd2c4b1ac00e631f5a027e1acdcf
SHA1467157c64134dfa0af2d58b69b8b7604266dcdf7
SHA25626bad643bb8eddf794af7c07350ab763247671d9fdfee14cc5fa9e75d46851c8
SHA5121ef3f1d3a1d68ac0566f581d983f2c59ddee6d14916ca05323dd20be8694ef552e00a9ea5a026e436675cdf9a22b1f5c4c63fd639ac8fb16ea6ac59b153e1f85
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exeFilesize
235KB
MD5d06a340edb8798aa42a7d69ae7907c57
SHA1bd31ace68355920dfc462d60f1b349eff056c7be
SHA2562527fb2ca4350090f2bcb7805197a894ec7e37915eccf476d2e8c137543ecbcf
SHA51212705f0cabfe515aa6e85a08fb70444663083589b670502a48e4ec78676e962124843f0fe4eb12368096d522dea376ae5b4e7afa2adc85260cb965ee06fe0582
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exeFilesize
235KB
MD5d06a340edb8798aa42a7d69ae7907c57
SHA1bd31ace68355920dfc462d60f1b349eff056c7be
SHA2562527fb2ca4350090f2bcb7805197a894ec7e37915eccf476d2e8c137543ecbcf
SHA51212705f0cabfe515aa6e85a08fb70444663083589b670502a48e4ec78676e962124843f0fe4eb12368096d522dea376ae5b4e7afa2adc85260cb965ee06fe0582
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exeFilesize
294KB
MD51ca1a4a02f6aab95c37c156b69007102
SHA17378f07f15f90dd227bee55d1cf53f0e14633751
SHA2562682843448838c59c832738360e957a9680c491f2ad175b736ae5fcb99c3d877
SHA5129a69865b91c2e903c7285b0d79425f25e873c1f9f3c8abc3a347df54ef06670b8b4cd0d3e317af88d034d400ee179a538761a155c5f19c504badffc88d83bd5f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exeFilesize
294KB
MD51ca1a4a02f6aab95c37c156b69007102
SHA17378f07f15f90dd227bee55d1cf53f0e14633751
SHA2562682843448838c59c832738360e957a9680c491f2ad175b736ae5fcb99c3d877
SHA5129a69865b91c2e903c7285b0d79425f25e873c1f9f3c8abc3a347df54ef06670b8b4cd0d3e317af88d034d400ee179a538761a155c5f19c504badffc88d83bd5f
-
memory/2828-1093-0x0000000005190000-0x000000000529A000-memory.dmpFilesize
1.0MB
-
memory/2828-1092-0x0000000005750000-0x0000000005D56000-memory.dmpFilesize
6.0MB
-
memory/2828-193-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-1108-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/2828-1107-0x00000000065C0000-0x0000000006782000-memory.dmpFilesize
1.8MB
-
memory/2828-195-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-1106-0x0000000006550000-0x00000000065A0000-memory.dmpFilesize
320KB
-
memory/2828-1105-0x00000000064C0000-0x0000000006536000-memory.dmpFilesize
472KB
-
memory/2828-1104-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-197-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-1103-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/2828-1102-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/2828-1101-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-1100-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-1099-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-1097-0x0000000005440000-0x000000000548B000-memory.dmpFilesize
300KB
-
memory/2828-1096-0x00000000052F0000-0x000000000532E000-memory.dmpFilesize
248KB
-
memory/2828-1095-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-1094-0x00000000052D0000-0x00000000052E2000-memory.dmpFilesize
72KB
-
memory/2828-205-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-219-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-217-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-215-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-213-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-180-0x0000000002240000-0x0000000002286000-memory.dmpFilesize
280KB
-
memory/2828-181-0x00000000024C0000-0x0000000002504000-memory.dmpFilesize
272KB
-
memory/2828-182-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/2828-184-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-186-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-187-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-189-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-185-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-183-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2828-191-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-211-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-209-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-207-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-199-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-201-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/2828-203-0x00000000024C0000-0x00000000024FF000-memory.dmpFilesize
252KB
-
memory/4244-171-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4244-154-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-146-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-136-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4244-139-0x0000000004B10000-0x000000000500E000-memory.dmpFilesize
5.0MB
-
memory/4244-140-0x00000000049D0000-0x00000000049E8000-memory.dmpFilesize
96KB
-
memory/4244-175-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4244-173-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4244-172-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4244-138-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4244-141-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4244-170-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-168-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-166-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-164-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-162-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-160-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-158-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-156-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-152-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-150-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-148-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-144-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-143-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4244-137-0x0000000002430000-0x000000000244A000-memory.dmpFilesize
104KB
-
memory/4244-142-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4904-1114-0x0000000000150000-0x0000000000182000-memory.dmpFilesize
200KB
-
memory/4904-1115-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/4904-1116-0x0000000004B90000-0x0000000004BDB000-memory.dmpFilesize
300KB