Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:27
Static task
static1
Behavioral task
behavioral1
Sample
a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe
Resource
win10v2004-20230220-en
General
-
Target
a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe
-
Size
689KB
-
MD5
fa95fdf9dff79aa81f3ca1d254aad83a
-
SHA1
4965d669a3c16a6b4f8bc65810639b3301bade32
-
SHA256
a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c
-
SHA512
f2124588cc9b30aba464e4d5326904d44ec5dcba0189f1b855fd785b8874a53cd2d048712bd0d74909f654effc1cd5344ee42e4722b5ac3bdfebbc4960d4a5b2
-
SSDEEP
12288:rMrIy90nltSTNjw2Amxjoyo65hLu0FNUK3ruSB+f5110cb0zNucFmJbvZF5Pfigh:Xy8rS5txjpHfaFK7uo0SvmJbb5PagyWx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8890.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8890.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8890.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3900-191-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-192-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-194-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-196-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-198-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-200-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-202-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-204-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-206-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-208-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-210-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-212-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-214-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-216-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-218-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-222-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-220-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-224-0x0000000003970000-0x00000000039AF000-memory.dmp family_redline behavioral1/memory/3900-1108-0x00000000060E0000-0x00000000060F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un088196.exepro8890.exequ6068.exesi580501.exepid process 4272 un088196.exe 2204 pro8890.exe 3900 qu6068.exe 4384 si580501.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8890.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8890.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un088196.exea1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un088196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un088196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1080 2204 WerFault.exe pro8890.exe 4872 3900 WerFault.exe qu6068.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8890.exequ6068.exesi580501.exepid process 2204 pro8890.exe 2204 pro8890.exe 3900 qu6068.exe 3900 qu6068.exe 4384 si580501.exe 4384 si580501.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8890.exequ6068.exesi580501.exedescription pid process Token: SeDebugPrivilege 2204 pro8890.exe Token: SeDebugPrivilege 3900 qu6068.exe Token: SeDebugPrivilege 4384 si580501.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exeun088196.exedescription pid process target process PID 4248 wrote to memory of 4272 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe un088196.exe PID 4248 wrote to memory of 4272 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe un088196.exe PID 4248 wrote to memory of 4272 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe un088196.exe PID 4272 wrote to memory of 2204 4272 un088196.exe pro8890.exe PID 4272 wrote to memory of 2204 4272 un088196.exe pro8890.exe PID 4272 wrote to memory of 2204 4272 un088196.exe pro8890.exe PID 4272 wrote to memory of 3900 4272 un088196.exe qu6068.exe PID 4272 wrote to memory of 3900 4272 un088196.exe qu6068.exe PID 4272 wrote to memory of 3900 4272 un088196.exe qu6068.exe PID 4248 wrote to memory of 4384 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe si580501.exe PID 4248 wrote to memory of 4384 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe si580501.exe PID 4248 wrote to memory of 4384 4248 a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe si580501.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe"C:\Users\Admin\AppData\Local\Temp\a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 14524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2204 -ip 22041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3900 -ip 39001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exeFilesize
175KB
MD56441237e651727400651c715b803a1c8
SHA1ea99d82ff0f0e3de025187343c220e52c72c7683
SHA2569594c64edca74aeaa10896525ff1df94ccf8b9e510d5fecf6b1b302bca71c1f5
SHA512fd083dba77d608272135d102a16b3d002b3a98283e59cb4af5c7290bb203d3bf568fb1c3cc641ce2bdfff49e268bf958768ea4f089cfcdfc76d928252484e04a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exeFilesize
175KB
MD56441237e651727400651c715b803a1c8
SHA1ea99d82ff0f0e3de025187343c220e52c72c7683
SHA2569594c64edca74aeaa10896525ff1df94ccf8b9e510d5fecf6b1b302bca71c1f5
SHA512fd083dba77d608272135d102a16b3d002b3a98283e59cb4af5c7290bb203d3bf568fb1c3cc641ce2bdfff49e268bf958768ea4f089cfcdfc76d928252484e04a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exeFilesize
547KB
MD54f0ee84897540391e3339c91c49eaccd
SHA15ff052d5e9a1526f7aa6246fa3380d3faff2b936
SHA25649eed16a20b6010a79bbd23375a086cb1d3d3fee36d739feeb15d7fad48b015a
SHA5125116da8e2904adc09523a1bdad60c655688bdcff9a250bb786ea94f538d8c03ea4d36a56c0676ed1aa3fab5357668b5cf536e9b01832cb2c9a0d99e3289a6720
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exeFilesize
547KB
MD54f0ee84897540391e3339c91c49eaccd
SHA15ff052d5e9a1526f7aa6246fa3380d3faff2b936
SHA25649eed16a20b6010a79bbd23375a086cb1d3d3fee36d739feeb15d7fad48b015a
SHA5125116da8e2904adc09523a1bdad60c655688bdcff9a250bb786ea94f538d8c03ea4d36a56c0676ed1aa3fab5357668b5cf536e9b01832cb2c9a0d99e3289a6720
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exeFilesize
291KB
MD545ae137c3cc817779a687bd4bab9f84b
SHA12af546eb5f1388875a27a5e624b3e9f6423e664f
SHA256ef2e9341bd525fc3e359334ce20df5568ee7bb943c50e6c2481be0ac4aa2915f
SHA5123c468844d04dcd4fb3bfc745d4705e9811a978b2fe6726f11b4c3587785a7f367b1bb8f7a542b094ec4fb6f5c236985126cb73d75cdfdef9df46eea5586d7491
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exeFilesize
291KB
MD545ae137c3cc817779a687bd4bab9f84b
SHA12af546eb5f1388875a27a5e624b3e9f6423e664f
SHA256ef2e9341bd525fc3e359334ce20df5568ee7bb943c50e6c2481be0ac4aa2915f
SHA5123c468844d04dcd4fb3bfc745d4705e9811a978b2fe6726f11b4c3587785a7f367b1bb8f7a542b094ec4fb6f5c236985126cb73d75cdfdef9df46eea5586d7491
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exeFilesize
345KB
MD557499b400edc9c3273b35eafb0e5efc8
SHA197fc945e47db7035ce0caa97284e830aff525799
SHA256f0964ee9542641acde69b94f044f7e35b178ac5d2e6bfa98300aef7e7e2b22ab
SHA512e797fc40726a1120b6f848b58a44bde82794afaa5acb33863a4e62435118994e02873dcdd2570490bfb06c9f4c5a467474f8687682d9fd20d507ffd30349fe51
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exeFilesize
345KB
MD557499b400edc9c3273b35eafb0e5efc8
SHA197fc945e47db7035ce0caa97284e830aff525799
SHA256f0964ee9542641acde69b94f044f7e35b178ac5d2e6bfa98300aef7e7e2b22ab
SHA512e797fc40726a1120b6f848b58a44bde82794afaa5acb33863a4e62435118994e02873dcdd2570490bfb06c9f4c5a467474f8687682d9fd20d507ffd30349fe51
-
memory/2204-148-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/2204-149-0x0000000000710000-0x000000000073D000-memory.dmpFilesize
180KB
-
memory/2204-152-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-151-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-153-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/2204-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/2204-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/2204-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/3900-191-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-192-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-194-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-196-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-198-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-200-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-202-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-204-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-206-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-208-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-210-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-212-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-214-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-216-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-218-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-222-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-220-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-225-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/3900-224-0x0000000003970000-0x00000000039AF000-memory.dmpFilesize
252KB
-
memory/3900-226-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-228-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1100-0x00000000068A0000-0x0000000006EB8000-memory.dmpFilesize
6.1MB
-
memory/3900-1101-0x0000000006EC0000-0x0000000006FCA000-memory.dmpFilesize
1.0MB
-
memory/3900-1102-0x0000000006060000-0x0000000006072000-memory.dmpFilesize
72KB
-
memory/3900-1103-0x0000000006080000-0x00000000060BC000-memory.dmpFilesize
240KB
-
memory/3900-1104-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1105-0x0000000007260000-0x00000000072F2000-memory.dmpFilesize
584KB
-
memory/3900-1106-0x0000000007300000-0x0000000007366000-memory.dmpFilesize
408KB
-
memory/3900-1108-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1109-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1110-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1111-0x0000000007B00000-0x0000000007B76000-memory.dmpFilesize
472KB
-
memory/3900-1112-0x0000000007B90000-0x0000000007BE0000-memory.dmpFilesize
320KB
-
memory/3900-1113-0x00000000060E0000-0x00000000060F0000-memory.dmpFilesize
64KB
-
memory/3900-1114-0x0000000007D80000-0x0000000007F42000-memory.dmpFilesize
1.8MB
-
memory/3900-1115-0x0000000007F50000-0x000000000847C000-memory.dmpFilesize
5.2MB
-
memory/4384-1121-0x0000000000840000-0x0000000000872000-memory.dmpFilesize
200KB
-
memory/4384-1122-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB