Analysis
-
max time kernel
84s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:29
Static task
static1
Behavioral task
behavioral1
Sample
fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe
Resource
win10v2004-20230221-en
General
-
Target
fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe
-
Size
688KB
-
MD5
c514f6a448114a625bf3467e762c29e8
-
SHA1
1aac59eb46cc8e80b2f723b2bff405d7c950915f
-
SHA256
fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91
-
SHA512
2ff5bd4494e5195d2cee49eccb8b8d8529f01be0594ec8f8350b1efee61278b8a136cd0d35529c1442ef6987247f74a7ea1de5a0a2993deff3153c5b85e098d2
-
SSDEEP
12288:aMrIy90PceEEgLn1gya65hLuubK34uShcMi9UmTmJ8vqFqZfig00V0gB1oADIHpj:2yYaEg1xpfaubKIukpuTmJ8GqZagN2Hl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6510.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6510.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6510.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1320-190-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-191-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-193-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-195-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-197-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-199-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-201-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-207-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-204-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-211-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-213-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-215-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-217-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-219-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-221-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-223-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-225-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-227-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/1320-1111-0x0000000006080000-0x0000000006090000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un929576.exepro6510.exequ9615.exesi284209.exepid process 4512 un929576.exe 4932 pro6510.exe 1320 qu9615.exe 4516 si284209.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6510.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6510.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un929576.exefd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un929576.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un929576.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2404 4932 WerFault.exe pro6510.exe 4828 1320 WerFault.exe qu9615.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6510.exequ9615.exesi284209.exepid process 4932 pro6510.exe 4932 pro6510.exe 1320 qu9615.exe 1320 qu9615.exe 4516 si284209.exe 4516 si284209.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6510.exequ9615.exesi284209.exedescription pid process Token: SeDebugPrivilege 4932 pro6510.exe Token: SeDebugPrivilege 1320 qu9615.exe Token: SeDebugPrivilege 4516 si284209.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exeun929576.exedescription pid process target process PID 4100 wrote to memory of 4512 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe un929576.exe PID 4100 wrote to memory of 4512 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe un929576.exe PID 4100 wrote to memory of 4512 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe un929576.exe PID 4512 wrote to memory of 4932 4512 un929576.exe pro6510.exe PID 4512 wrote to memory of 4932 4512 un929576.exe pro6510.exe PID 4512 wrote to memory of 4932 4512 un929576.exe pro6510.exe PID 4512 wrote to memory of 1320 4512 un929576.exe qu9615.exe PID 4512 wrote to memory of 1320 4512 un929576.exe qu9615.exe PID 4512 wrote to memory of 1320 4512 un929576.exe qu9615.exe PID 4100 wrote to memory of 4516 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe si284209.exe PID 4100 wrote to memory of 4516 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe si284209.exe PID 4100 wrote to memory of 4516 4100 fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe si284209.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe"C:\Users\Admin\AppData\Local\Temp\fd1058ff675505c1e4246ff15e28f1803fdf1c2d0ed5ec01581a94f973914e91.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un929576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un929576.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6510.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6510.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9615.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284209.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284209.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4932 -ip 49321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1320 -ip 13201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284209.exeFilesize
175KB
MD55ad937160d32df14e9935b171af47b1f
SHA1bd756756c8c9bf4654fd2495cb620b9088dfb872
SHA256a3a982c5c156fbb2bb3838f72772329b41e8a6220e3fc04cace80b3cdd3ce992
SHA5124572d389ac1c6a7dea677737252acdee28c258302c6d13f17183f50b782353bc9c25d15951135d47031a9a53c4a1060eaab7b240bb6676c54b82d548ca1f257c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284209.exeFilesize
175KB
MD55ad937160d32df14e9935b171af47b1f
SHA1bd756756c8c9bf4654fd2495cb620b9088dfb872
SHA256a3a982c5c156fbb2bb3838f72772329b41e8a6220e3fc04cace80b3cdd3ce992
SHA5124572d389ac1c6a7dea677737252acdee28c258302c6d13f17183f50b782353bc9c25d15951135d47031a9a53c4a1060eaab7b240bb6676c54b82d548ca1f257c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un929576.exeFilesize
547KB
MD5f56d143d224ade10d72a2c3f3b83c3ed
SHA16a6119eb7b5d29eef77db1ce0896f30c8c35816c
SHA256af6eca97a111e239a4664ab58bc719683706377927f4a1899d2f37cf2d0079a8
SHA512bcfb8b2d413a5122969de7f8ebfab7142441423643122b30dd362b79355d4d5c6cace739a3244b443fb25869eccf188891e23101b660d111791f1e49b99e8b17
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un929576.exeFilesize
547KB
MD5f56d143d224ade10d72a2c3f3b83c3ed
SHA16a6119eb7b5d29eef77db1ce0896f30c8c35816c
SHA256af6eca97a111e239a4664ab58bc719683706377927f4a1899d2f37cf2d0079a8
SHA512bcfb8b2d413a5122969de7f8ebfab7142441423643122b30dd362b79355d4d5c6cace739a3244b443fb25869eccf188891e23101b660d111791f1e49b99e8b17
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6510.exeFilesize
291KB
MD52cad756e708ca31c230f8cb7b261fb39
SHA1fba2893b43bbaa25abbfc159b85b2289f40908f9
SHA256417b7788e3b913727812fabab4ab367bb1b50022553beccadb28ede79429dae3
SHA51264a68d383227a44e4bcbd1f282922e6a094a5abaab5a2fc134f7100440c641e4cff94ab968dac3ce11cdc522fbfbe04ee54202b421ac922743bcba005660a8ac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6510.exeFilesize
291KB
MD52cad756e708ca31c230f8cb7b261fb39
SHA1fba2893b43bbaa25abbfc159b85b2289f40908f9
SHA256417b7788e3b913727812fabab4ab367bb1b50022553beccadb28ede79429dae3
SHA51264a68d383227a44e4bcbd1f282922e6a094a5abaab5a2fc134f7100440c641e4cff94ab968dac3ce11cdc522fbfbe04ee54202b421ac922743bcba005660a8ac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9615.exeFilesize
345KB
MD5d762446dca1ce3f2db03dbff1dc0efcf
SHA1d99b4999b77c1ad8a63d0bf298f94359d79b656b
SHA2569c28f4bdad9fd5dbb29d3f9ebd776b0d60034d40978184825fdc17c1c3a434bb
SHA51260f8fcf68828956eebfe20cec7dd4526dd5a260c731b95f754aff56529311ce03b773ee5f73784b585fa8ebe57fb016ae5c63b76d8c1b18e1b42c2f4145fc4fe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9615.exeFilesize
345KB
MD5d762446dca1ce3f2db03dbff1dc0efcf
SHA1d99b4999b77c1ad8a63d0bf298f94359d79b656b
SHA2569c28f4bdad9fd5dbb29d3f9ebd776b0d60034d40978184825fdc17c1c3a434bb
SHA51260f8fcf68828956eebfe20cec7dd4526dd5a260c731b95f754aff56529311ce03b773ee5f73784b585fa8ebe57fb016ae5c63b76d8c1b18e1b42c2f4145fc4fe
-
memory/1320-227-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-1102-0x0000000006E10000-0x0000000006E22000-memory.dmpFilesize
72KB
-
memory/1320-1115-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-1114-0x00000000081A0000-0x00000000081F0000-memory.dmpFilesize
320KB
-
memory/1320-1113-0x0000000008110000-0x0000000008186000-memory.dmpFilesize
472KB
-
memory/1320-1112-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-1111-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-1110-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-1109-0x0000000007AC0000-0x0000000007FEC000-memory.dmpFilesize
5.2MB
-
memory/1320-1107-0x00000000078F0000-0x0000000007AB2000-memory.dmpFilesize
1.8MB
-
memory/1320-1106-0x00000000077E0000-0x0000000007872000-memory.dmpFilesize
584KB
-
memory/1320-1105-0x0000000007120000-0x0000000007186000-memory.dmpFilesize
408KB
-
memory/1320-1104-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmpFilesize
240KB
-
memory/1320-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmpFilesize
1.0MB
-
memory/1320-1100-0x0000000006640000-0x0000000006C58000-memory.dmpFilesize
6.1MB
-
memory/1320-225-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-223-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-221-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-219-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-217-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-215-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-190-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-191-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-193-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-195-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-197-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-199-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-201-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-203-0x0000000001C10000-0x0000000001C5B000-memory.dmpFilesize
300KB
-
memory/1320-207-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-204-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-206-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-208-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-211-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/1320-210-0x0000000006080000-0x0000000006090000-memory.dmpFilesize
64KB
-
memory/1320-213-0x0000000006000000-0x000000000603F000-memory.dmpFilesize
252KB
-
memory/4516-1121-0x0000000000280000-0x00000000002B2000-memory.dmpFilesize
200KB
-
memory/4516-1122-0x0000000004E80000-0x0000000004E90000-memory.dmpFilesize
64KB
-
memory/4932-172-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-148-0x0000000004C80000-0x0000000005224000-memory.dmpFilesize
5.6MB
-
memory/4932-182-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4932-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4932-151-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4932-180-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-178-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-153-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-176-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-174-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-150-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4932-183-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4932-164-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-166-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-168-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-162-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-160-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-158-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-156-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-154-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-149-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/4932-170-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/4932-185-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4932-152-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB