Analysis
-
max time kernel
52s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:18
Static task
static1
Behavioral task
behavioral1
Sample
c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe
Resource
win10-20230220-en
General
-
Target
c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe
-
Size
658KB
-
MD5
82645623cd8a8c1fe423d8eabec8c3c0
-
SHA1
b651b262be6bc099a7f109921f134c9ed368911e
-
SHA256
c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0
-
SHA512
42e897e330d3ec2b2982f2494c8ac6fb82422f17d884b99babed6e187523ca1811935a1c02048477a3d9081aec3f143d3116e9dbce0e6d57ed9f3bbd4ac89806
-
SSDEEP
12288:5MrLy90aPE/s3lzI1e16t1CUQe4cDnAU44OzWKsE8v8fswcuVh:yyLH0g16tsR4AF4XKahO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6454.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6454.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4808-177-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/4808-178-0x00000000023D0000-0x0000000002414000-memory.dmp family_redline behavioral1/memory/4808-180-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-182-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-179-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-184-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-186-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-188-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-190-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-192-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-194-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-196-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-198-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-200-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-202-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-204-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-206-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-208-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-210-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/4808-212-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un172937.exepro6454.exequ9151.exesi031923.exepid process 3540 un172937.exe 4672 pro6454.exe 4808 qu9151.exe 4436 si031923.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6454.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6454.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exeun172937.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un172937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un172937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6454.exequ9151.exesi031923.exepid process 4672 pro6454.exe 4672 pro6454.exe 4808 qu9151.exe 4808 qu9151.exe 4436 si031923.exe 4436 si031923.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6454.exequ9151.exesi031923.exedescription pid process Token: SeDebugPrivilege 4672 pro6454.exe Token: SeDebugPrivilege 4808 qu9151.exe Token: SeDebugPrivilege 4436 si031923.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exeun172937.exedescription pid process target process PID 1596 wrote to memory of 3540 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe un172937.exe PID 1596 wrote to memory of 3540 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe un172937.exe PID 1596 wrote to memory of 3540 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe un172937.exe PID 3540 wrote to memory of 4672 3540 un172937.exe pro6454.exe PID 3540 wrote to memory of 4672 3540 un172937.exe pro6454.exe PID 3540 wrote to memory of 4672 3540 un172937.exe pro6454.exe PID 3540 wrote to memory of 4808 3540 un172937.exe qu9151.exe PID 3540 wrote to memory of 4808 3540 un172937.exe qu9151.exe PID 3540 wrote to memory of 4808 3540 un172937.exe qu9151.exe PID 1596 wrote to memory of 4436 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe si031923.exe PID 1596 wrote to memory of 4436 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe si031923.exe PID 1596 wrote to memory of 4436 1596 c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe si031923.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe"C:\Users\Admin\AppData\Local\Temp\c673eea2ae9f0cead4e21d7aef1063bb1bc44ca09d3d6c52eb8ce251bda926c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6454.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031923.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031923.exeFilesize
175KB
MD55e5c9834f153d4f913633c667ce6e807
SHA15a5264ae23df9eaa62a5ecb25744f4cf43f65da5
SHA2561d3eb8c9cc1db4f884a3abfe8a4cfceb3b31bd8ea59c680f661705ea549d7c51
SHA5129bf76bbcbf50ea535426483945a145f39a94256b83f6d86c9e0ff311e5f2eab2faa9c0700087b4f072dec5b49e9cb9dfd764f9cbdb6e6a841038172de34af65d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031923.exeFilesize
175KB
MD55e5c9834f153d4f913633c667ce6e807
SHA15a5264ae23df9eaa62a5ecb25744f4cf43f65da5
SHA2561d3eb8c9cc1db4f884a3abfe8a4cfceb3b31bd8ea59c680f661705ea549d7c51
SHA5129bf76bbcbf50ea535426483945a145f39a94256b83f6d86c9e0ff311e5f2eab2faa9c0700087b4f072dec5b49e9cb9dfd764f9cbdb6e6a841038172de34af65d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172937.exeFilesize
516KB
MD54093f47d90e657c5bc2fba5333c2ce68
SHA1948cb571f29e662aa743648fbda633c7f6449afa
SHA2566dc388ae1ea295dfa704a47eed91a70cce50ed56b2be6555a69fb5435a7d2bfc
SHA51268618097fb2d149955db3ee67bf37846cb4099b48c7548dbef830d5bc8b5e659a87bf1817ef5e10d3ffd96fea2766245494d8c7e45e74729c32cbf43a33e984a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172937.exeFilesize
516KB
MD54093f47d90e657c5bc2fba5333c2ce68
SHA1948cb571f29e662aa743648fbda633c7f6449afa
SHA2566dc388ae1ea295dfa704a47eed91a70cce50ed56b2be6555a69fb5435a7d2bfc
SHA51268618097fb2d149955db3ee67bf37846cb4099b48c7548dbef830d5bc8b5e659a87bf1817ef5e10d3ffd96fea2766245494d8c7e45e74729c32cbf43a33e984a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6454.exeFilesize
235KB
MD513f2c95b33d63f49fff8adf99e7b157b
SHA199a7ae8ba421fd0b62818782c2571dcd020e83ea
SHA2561bcfd3cb424578d8d868f16ced0adf834a8210cde8b43b12b14c728204454126
SHA512d8cf05f652f9a041db7b01a3aa8133ccf0eb268a506cdf6a9eaf90cd0b0cab9f8f2d147fa86feb303d70adc7ff6dfabb55e41e7c8caeb24c87efd9faefbf8227
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6454.exeFilesize
235KB
MD513f2c95b33d63f49fff8adf99e7b157b
SHA199a7ae8ba421fd0b62818782c2571dcd020e83ea
SHA2561bcfd3cb424578d8d868f16ced0adf834a8210cde8b43b12b14c728204454126
SHA512d8cf05f652f9a041db7b01a3aa8133ccf0eb268a506cdf6a9eaf90cd0b0cab9f8f2d147fa86feb303d70adc7ff6dfabb55e41e7c8caeb24c87efd9faefbf8227
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exeFilesize
294KB
MD54e03a38ebc8e0d6d3348af3c4c42e8ee
SHA15582afa5f9ae3dcf7887c196bfc7b44d96208a3f
SHA256da69b2e8aa26950b6ad82b9cad49c3d5635608d7df441228df12d31a00039902
SHA512c4e3ee0616dae1204bc9476a27d77576366afc90241ab851027d6b2ade6be3dcbc31d45581c62c8fff06bd6d2ff5c4d222fb372f47c60c256879e578d3925275
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exeFilesize
294KB
MD54e03a38ebc8e0d6d3348af3c4c42e8ee
SHA15582afa5f9ae3dcf7887c196bfc7b44d96208a3f
SHA256da69b2e8aa26950b6ad82b9cad49c3d5635608d7df441228df12d31a00039902
SHA512c4e3ee0616dae1204bc9476a27d77576366afc90241ab851027d6b2ade6be3dcbc31d45581c62c8fff06bd6d2ff5c4d222fb372f47c60c256879e578d3925275
-
memory/4436-1110-0x0000000000310000-0x0000000000342000-memory.dmpFilesize
200KB
-
memory/4436-1111-0x0000000004BF0000-0x0000000004C3B000-memory.dmpFilesize
300KB
-
memory/4436-1112-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/4672-142-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-154-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-136-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-137-0x0000000004AE0000-0x0000000004FDE000-memory.dmpFilesize
5.0MB
-
memory/4672-138-0x00000000049D0000-0x00000000049E8000-memory.dmpFilesize
96KB
-
memory/4672-139-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-140-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-134-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-144-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-146-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-148-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-150-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-152-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-135-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-156-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-158-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-160-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-162-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-164-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-166-0x00000000049D0000-0x00000000049E2000-memory.dmpFilesize
72KB
-
memory/4672-167-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4672-168-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-169-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-170-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4672-172-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4672-133-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4672-132-0x0000000002030000-0x000000000204A000-memory.dmpFilesize
104KB
-
memory/4808-180-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-256-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-179-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-184-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-186-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-188-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-190-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-192-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-194-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-196-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-198-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-200-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-202-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-204-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-206-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-208-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-210-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-212-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-255-0x00000000005B0000-0x00000000005FB000-memory.dmpFilesize
300KB
-
memory/4808-182-0x00000000023D0000-0x000000000240F000-memory.dmpFilesize
252KB
-
memory/4808-258-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-260-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-1089-0x0000000005140000-0x0000000005746000-memory.dmpFilesize
6.0MB
-
memory/4808-1090-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/4808-1091-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-1092-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/4808-1093-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/4808-1094-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/4808-1095-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/4808-1096-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/4808-1097-0x0000000006340000-0x00000000063B6000-memory.dmpFilesize
472KB
-
memory/4808-1098-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/4808-1100-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-1101-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-178-0x00000000023D0000-0x0000000002414000-memory.dmpFilesize
272KB
-
memory/4808-177-0x00000000022E0000-0x0000000002326000-memory.dmpFilesize
280KB
-
memory/4808-1102-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4808-1103-0x00000000066C0000-0x0000000006882000-memory.dmpFilesize
1.8MB
-
memory/4808-1104-0x0000000006890000-0x0000000006DBC000-memory.dmpFilesize
5.2MB