Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 21:38
Static task
static1
Behavioral task
behavioral1
Sample
1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe
Resource
win10v2004-20230221-en
General
-
Target
1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe
-
Size
696KB
-
MD5
0f7cd930c6a23ee856c0c32a5fe4d741
-
SHA1
678d0cd2697a22694a8422e677d4470feade0d75
-
SHA256
1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a
-
SHA512
eb9f9ff0b99ce19d65a0dee35cd430020b7db4ad3521dea6281fbee3033aacbc5cca5685744ba31ed6fdab895bc936d49d09ecf73ee403dee6ecc2b4a3189656
-
SSDEEP
12288:sMrEy90zd7AdEW830havnL3NBB9ES3qETql69/OnKLzWSoTyVEotm2/TmqrsH1:4yU9A6OML9BB9oETql6AKMyCEx/T8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro5954.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5954.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5954.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/264-194-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-195-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-197-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-199-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-201-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-205-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-203-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-207-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-209-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-211-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-213-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-215-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-217-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-219-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-221-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-223-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-225-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/264-227-0x0000000007150000-0x000000000718F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un130097.exepro5954.exequ6824.exesi437269.exepid process 2336 un130097.exe 2616 pro5954.exe 264 qu6824.exe 3300 si437269.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5954.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5954.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exeun130097.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un130097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un130097.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2600 2616 WerFault.exe pro5954.exe 1312 264 WerFault.exe qu6824.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5954.exequ6824.exesi437269.exepid process 2616 pro5954.exe 2616 pro5954.exe 264 qu6824.exe 264 qu6824.exe 3300 si437269.exe 3300 si437269.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5954.exequ6824.exesi437269.exedescription pid process Token: SeDebugPrivilege 2616 pro5954.exe Token: SeDebugPrivilege 264 qu6824.exe Token: SeDebugPrivilege 3300 si437269.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exeun130097.exedescription pid process target process PID 3040 wrote to memory of 2336 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe un130097.exe PID 3040 wrote to memory of 2336 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe un130097.exe PID 3040 wrote to memory of 2336 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe un130097.exe PID 2336 wrote to memory of 2616 2336 un130097.exe pro5954.exe PID 2336 wrote to memory of 2616 2336 un130097.exe pro5954.exe PID 2336 wrote to memory of 2616 2336 un130097.exe pro5954.exe PID 2336 wrote to memory of 264 2336 un130097.exe qu6824.exe PID 2336 wrote to memory of 264 2336 un130097.exe qu6824.exe PID 2336 wrote to memory of 264 2336 un130097.exe qu6824.exe PID 3040 wrote to memory of 3300 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe si437269.exe PID 3040 wrote to memory of 3300 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe si437269.exe PID 3040 wrote to memory of 3300 3040 1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe si437269.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe"C:\Users\Admin\AppData\Local\Temp\1b652b0dfd6b09a07c93af1257a87a8664ee75b45aef7b8ab733797298a3024a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130097.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5954.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 11084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437269.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2616 -ip 26161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 264 -ip 2641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437269.exeFilesize
175KB
MD5c19a6759ec0726417b5f855913f23737
SHA11eb69a0d4c0823a9c8ad3eecef94a8f90428f40f
SHA2563d504bd1d201439ebf09e183c4ef4f5ceb251f118454756f12ded5cc8848509f
SHA5127a247545373bcdddc09b58e3818160795aadd69649b53157d21458a7984d7977f7b62367c805ab7946a3964f864c469bda43926812cb7d2d65b324129f304b06
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437269.exeFilesize
175KB
MD5c19a6759ec0726417b5f855913f23737
SHA11eb69a0d4c0823a9c8ad3eecef94a8f90428f40f
SHA2563d504bd1d201439ebf09e183c4ef4f5ceb251f118454756f12ded5cc8848509f
SHA5127a247545373bcdddc09b58e3818160795aadd69649b53157d21458a7984d7977f7b62367c805ab7946a3964f864c469bda43926812cb7d2d65b324129f304b06
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130097.exeFilesize
554KB
MD5b61ac30b22de31caf38b53cc7fc08234
SHA18b2f3c7ccd6cee1ea5710bda8c921032262f9e71
SHA256c7c1d7baa29a4b283e1ee7594f392370c71a989ff67d71ae57fbfe0e5b0e73c4
SHA512da061c3bc12981c751e5124451d29b14bd7c337edaf8aae0d776789c94d0b86b106a04211323a0fe741f310589bd09aab8d780d2e64e36a8b584b441a0b488e1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130097.exeFilesize
554KB
MD5b61ac30b22de31caf38b53cc7fc08234
SHA18b2f3c7ccd6cee1ea5710bda8c921032262f9e71
SHA256c7c1d7baa29a4b283e1ee7594f392370c71a989ff67d71ae57fbfe0e5b0e73c4
SHA512da061c3bc12981c751e5124451d29b14bd7c337edaf8aae0d776789c94d0b86b106a04211323a0fe741f310589bd09aab8d780d2e64e36a8b584b441a0b488e1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5954.exeFilesize
345KB
MD57a74ebbb0ee579b31c3a6684c127a016
SHA14af05f88d008e0eb4d059669315e9bbde42be64b
SHA25694db2c6a5217673550d1a24eb536164a19e69618a0b19529df075e120fc5adb2
SHA5122c1397569959ff97b94cf11f2c201374865fe64f52d5e3b2872c6f75472a6d70928018eb54a27c271b50dcb23b25d73dd181d8b992e49978c4001c78a9213604
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5954.exeFilesize
345KB
MD57a74ebbb0ee579b31c3a6684c127a016
SHA14af05f88d008e0eb4d059669315e9bbde42be64b
SHA25694db2c6a5217673550d1a24eb536164a19e69618a0b19529df075e120fc5adb2
SHA5122c1397569959ff97b94cf11f2c201374865fe64f52d5e3b2872c6f75472a6d70928018eb54a27c271b50dcb23b25d73dd181d8b992e49978c4001c78a9213604
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exeFilesize
403KB
MD555cadb33142013140c9cca3f90d975a4
SHA1788d95de4c2317f32d27ebbdab1d4c4a9405037c
SHA25641c927c497d13c8ddebd9fbdd5324eae1c2bab92fb9a76ced67a0fd36ca94adb
SHA512c1c7d8419a21339e194d4d752d178d6711cc32e0bdeae16c25aa7a7e63d8fbcfe58c3d88c1801231c49b5baf17792ba154bf9842b2d4c3b7af9282e1db472b69
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exeFilesize
403KB
MD555cadb33142013140c9cca3f90d975a4
SHA1788d95de4c2317f32d27ebbdab1d4c4a9405037c
SHA25641c927c497d13c8ddebd9fbdd5324eae1c2bab92fb9a76ced67a0fd36ca94adb
SHA512c1c7d8419a21339e194d4d752d178d6711cc32e0bdeae16c25aa7a7e63d8fbcfe58c3d88c1801231c49b5baf17792ba154bf9842b2d4c3b7af9282e1db472b69
-
memory/264-227-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/264-1115-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-1114-0x0000000009410000-0x000000000993C000-memory.dmpFilesize
5.2MB
-
memory/264-1113-0x0000000009200000-0x00000000093C2000-memory.dmpFilesize
1.8MB
-
memory/264-1112-0x00000000091A0000-0x00000000091F0000-memory.dmpFilesize
320KB
-
memory/264-1111-0x0000000009110000-0x0000000009186000-memory.dmpFilesize
472KB
-
memory/264-1110-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-1109-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-1108-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/264-1107-0x00000000083D0000-0x0000000008436000-memory.dmpFilesize
408KB
-
memory/264-1105-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-1104-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/264-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/264-1101-0x0000000007950000-0x0000000007F68000-memory.dmpFilesize
6.1MB
-
memory/264-439-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-225-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-223-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-221-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-219-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-217-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-215-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-213-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-191-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/264-193-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-192-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/264-194-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-195-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-197-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-199-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-201-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-205-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-203-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-207-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-209-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/264-211-0x0000000007150000-0x000000000718F000-memory.dmpFilesize
252KB
-
memory/2616-177-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-163-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-151-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-185-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-184-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-183-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-181-0x0000000000400000-0x0000000002B83000-memory.dmpFilesize
39.5MB
-
memory/2616-150-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-180-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-179-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-155-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-178-0x0000000004A00000-0x0000000004A10000-memory.dmpFilesize
64KB
-
memory/2616-186-0x0000000000400000-0x0000000002B83000-memory.dmpFilesize
39.5MB
-
memory/2616-175-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-159-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-171-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-169-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-167-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-165-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-153-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-161-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-173-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-157-0x0000000004980000-0x0000000004992000-memory.dmpFilesize
72KB
-
memory/2616-149-0x00000000072D0000-0x0000000007874000-memory.dmpFilesize
5.6MB
-
memory/2616-148-0x0000000002D80000-0x0000000002DAD000-memory.dmpFilesize
180KB
-
memory/3300-1121-0x0000000000FC0000-0x0000000000FF2000-memory.dmpFilesize
200KB
-
memory/3300-1122-0x0000000005BB0000-0x0000000005BC0000-memory.dmpFilesize
64KB