Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe
Resource
win10v2004-20230220-en
General
-
Target
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe
-
Size
690KB
-
MD5
101c9294987ed6ea6d7a7cbe8daa0bdf
-
SHA1
6975b7475d651e7bda25bf665ce9716651dc144e
-
SHA256
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044
-
SHA512
1c1715804c35d76dac709d787a66ee2f79fb3a97d309e7f4251cb2d1656c3fb26aa55ad939afd3bfab1267ce619dcaf524261d5b002415bce3d80f46c2c43ed8
-
SSDEEP
12288:iMrIy90kw0SdLMqXkuavkPCTk5XmCmsviFfLfig7e+wKTOc/:eyxkLMqXk1vzTeWCufLagalk/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0114.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0114.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1372-191-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-190-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-193-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-195-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-202-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-198-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-207-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-205-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-209-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-211-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-213-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-215-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-217-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-219-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-221-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-223-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-225-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-227-0x0000000006020000-0x000000000605F000-memory.dmp family_redline behavioral1/memory/1372-1112-0x0000000006190000-0x00000000061A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un347060.exepro0114.exequ9949.exesi787895.exepid process 3164 un347060.exe 4904 pro0114.exe 1372 qu9949.exe 3872 si787895.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0114.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0114.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un347060.exe842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un347060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un347060.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1192 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 872 4904 WerFault.exe pro0114.exe 3888 1372 WerFault.exe qu9949.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0114.exequ9949.exesi787895.exepid process 4904 pro0114.exe 4904 pro0114.exe 1372 qu9949.exe 1372 qu9949.exe 3872 si787895.exe 3872 si787895.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0114.exequ9949.exesi787895.exedescription pid process Token: SeDebugPrivilege 4904 pro0114.exe Token: SeDebugPrivilege 1372 qu9949.exe Token: SeDebugPrivilege 3872 si787895.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exeun347060.exedescription pid process target process PID 3832 wrote to memory of 3164 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe un347060.exe PID 3832 wrote to memory of 3164 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe un347060.exe PID 3832 wrote to memory of 3164 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe un347060.exe PID 3164 wrote to memory of 4904 3164 un347060.exe pro0114.exe PID 3164 wrote to memory of 4904 3164 un347060.exe pro0114.exe PID 3164 wrote to memory of 4904 3164 un347060.exe pro0114.exe PID 3164 wrote to memory of 1372 3164 un347060.exe qu9949.exe PID 3164 wrote to memory of 1372 3164 un347060.exe qu9949.exe PID 3164 wrote to memory of 1372 3164 un347060.exe qu9949.exe PID 3832 wrote to memory of 3872 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe si787895.exe PID 3832 wrote to memory of 3872 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe si787895.exe PID 3832 wrote to memory of 3872 3832 842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe si787895.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe"C:\Users\Admin\AppData\Local\Temp\842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0114.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9949.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9949.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 19244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787895.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787895.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1372 -ip 13721⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787895.exeFilesize
175KB
MD505b4a2490a65c3a767349d7caa660c15
SHA1640472350e3ce7163c0d0281186fd736b012d11e
SHA25624afb5363874f79f281f491a9ce43a7ef3dca63c77434dd428a2d3bf11966966
SHA512b6e5c91357c84ca16fc767ebeeb917a8cf97838d8fc001db7f9a6af8723c7f3edf7f14991528a99a8c8a84a232bf29e8d8a64d6a502dc62b8262d488ce26e456
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787895.exeFilesize
175KB
MD505b4a2490a65c3a767349d7caa660c15
SHA1640472350e3ce7163c0d0281186fd736b012d11e
SHA25624afb5363874f79f281f491a9ce43a7ef3dca63c77434dd428a2d3bf11966966
SHA512b6e5c91357c84ca16fc767ebeeb917a8cf97838d8fc001db7f9a6af8723c7f3edf7f14991528a99a8c8a84a232bf29e8d8a64d6a502dc62b8262d488ce26e456
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347060.exeFilesize
548KB
MD5307e3f3305c72ce78701bc6855363f67
SHA164ab44d536cd97ec6fc73f8920a5998506b94587
SHA25616f5cf1debed6f8ca1aa0523d88cd58abea78d4ecd3965a4a560476c11cd6fde
SHA512c3759551586638e841bdc33b103f6f2d860ad1e7aae122c895ae9b5ea7ff040fd1f782a1ebe51bcc712cb4ae106a85757b72be63a0ede1e81a7942cc20d4b250
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347060.exeFilesize
548KB
MD5307e3f3305c72ce78701bc6855363f67
SHA164ab44d536cd97ec6fc73f8920a5998506b94587
SHA25616f5cf1debed6f8ca1aa0523d88cd58abea78d4ecd3965a4a560476c11cd6fde
SHA512c3759551586638e841bdc33b103f6f2d860ad1e7aae122c895ae9b5ea7ff040fd1f782a1ebe51bcc712cb4ae106a85757b72be63a0ede1e81a7942cc20d4b250
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0114.exeFilesize
291KB
MD58d50d2decdbf8f786a6c78a4e2d862e5
SHA1fa01e9347ac2b7e9d5ef59c89fdb3c70fd3fa8fb
SHA256cd7a87c07b93f1909f52a0ad280619cda4feee47f3904975e837ce1001097b4e
SHA512ad91b581fb7afad8862aeb82c5becbdea696e4cf208c3a430c4c1ea6f501c1ece416a576e2034cf7b9d0f017c7d66d833faffd0edf5999b530880118df555bd0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0114.exeFilesize
291KB
MD58d50d2decdbf8f786a6c78a4e2d862e5
SHA1fa01e9347ac2b7e9d5ef59c89fdb3c70fd3fa8fb
SHA256cd7a87c07b93f1909f52a0ad280619cda4feee47f3904975e837ce1001097b4e
SHA512ad91b581fb7afad8862aeb82c5becbdea696e4cf208c3a430c4c1ea6f501c1ece416a576e2034cf7b9d0f017c7d66d833faffd0edf5999b530880118df555bd0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9949.exeFilesize
345KB
MD5690deb1aaa3bd40470752f01e86f02dc
SHA1a4fd2bb684ad3aa7a9362c971839f42c0b742912
SHA2566918be227b9ebbc4c3ef1818ae0ca22b43a1d1ac42ca8080ea67c4fd4ac09b10
SHA5123b5963f6444d61dc975bfbd7105d7b454d94303b0fca87fbd419a29b20f24d4184e7b88975a9a990f8c0cd8a963a734b6952e8a88c99950324dd589ed6e29083
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9949.exeFilesize
345KB
MD5690deb1aaa3bd40470752f01e86f02dc
SHA1a4fd2bb684ad3aa7a9362c971839f42c0b742912
SHA2566918be227b9ebbc4c3ef1818ae0ca22b43a1d1ac42ca8080ea67c4fd4ac09b10
SHA5123b5963f6444d61dc975bfbd7105d7b454d94303b0fca87fbd419a29b20f24d4184e7b88975a9a990f8c0cd8a963a734b6952e8a88c99950324dd589ed6e29083
-
memory/1372-227-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-1102-0x0000000006160000-0x0000000006172000-memory.dmpFilesize
72KB
-
memory/1372-1115-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-1114-0x0000000008430000-0x0000000008480000-memory.dmpFilesize
320KB
-
memory/1372-1113-0x00000000083A0000-0x0000000008416000-memory.dmpFilesize
472KB
-
memory/1372-1112-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-1111-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-1110-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-1108-0x0000000007C00000-0x000000000812C000-memory.dmpFilesize
5.2MB
-
memory/1372-1107-0x0000000007A30000-0x0000000007BF2000-memory.dmpFilesize
1.8MB
-
memory/1372-1106-0x0000000007920000-0x00000000079B2000-memory.dmpFilesize
584KB
-
memory/1372-1105-0x0000000007260000-0x00000000072C6000-memory.dmpFilesize
408KB
-
memory/1372-1104-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-1103-0x0000000006F80000-0x0000000006FBC000-memory.dmpFilesize
240KB
-
memory/1372-1101-0x0000000006E70000-0x0000000006F7A000-memory.dmpFilesize
1.0MB
-
memory/1372-1100-0x0000000006850000-0x0000000006E68000-memory.dmpFilesize
6.1MB
-
memory/1372-225-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-223-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-221-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-219-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-217-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-215-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-191-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-190-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-193-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-195-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-197-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/1372-199-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-201-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-203-0x0000000006190000-0x00000000061A0000-memory.dmpFilesize
64KB
-
memory/1372-202-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-198-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-207-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-205-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-209-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-211-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/1372-213-0x0000000006020000-0x000000000605F000-memory.dmpFilesize
252KB
-
memory/3872-1121-0x0000000000FC0000-0x0000000000FF2000-memory.dmpFilesize
200KB
-
memory/3872-1122-0x00000000058D0000-0x00000000058E0000-memory.dmpFilesize
64KB
-
memory/4904-172-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-148-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/4904-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/4904-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4904-150-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-180-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-178-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-155-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/4904-176-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-174-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-154-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/4904-164-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-166-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-168-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-162-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-160-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-153-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/4904-157-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/4904-158-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-151-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/4904-170-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4904-185-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4904-149-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB