Analysis
-
max time kernel
54s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:34
Static task
static1
Behavioral task
behavioral1
Sample
9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe
Resource
win10v2004-20230220-en
General
-
Target
9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe
-
Size
688KB
-
MD5
ed19fa8cf0bb072378a4b4af82ea4673
-
SHA1
bbaa739374ce9ae33ca407c96fe2fde10da96e55
-
SHA256
9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4
-
SHA512
460c3b8b1731ab35fb6a0fcd5d04f7597afb9baeb2beeaa09b371095d8415e4e24ea90b241fd352254cc93205338f6c33417375165e7a713e6bb92a129b018e2
-
SSDEEP
12288:3MrNy90oFHZuUQmWHdkQqiyP65hLuvVo9L7K9Ur81FLndDomJSvQF6afig/v7oBu:myxpQFdkJvCfaa56yLmJSY6aag/v8sBX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3075.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3075.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3075.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1300-186-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-187-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-189-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-191-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-193-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-195-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-197-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-199-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-201-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-203-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-205-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-207-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-209-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-211-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-213-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-215-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-217-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-220-0x0000000003BA0000-0x0000000003BDF000-memory.dmp family_redline behavioral1/memory/1300-1103-0x0000000003720000-0x0000000003730000-memory.dmp family_redline behavioral1/memory/1300-1104-0x0000000003720000-0x0000000003730000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un194475.exepro3075.exequ6444.exesi645110.exepid process 3676 un194475.exe 4980 pro3075.exe 1300 qu6444.exe 3124 si645110.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3075.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3075.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un194475.exe9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un194475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un194475.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4584 4980 WerFault.exe pro3075.exe 1480 1300 WerFault.exe qu6444.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3075.exequ6444.exesi645110.exepid process 4980 pro3075.exe 4980 pro3075.exe 1300 qu6444.exe 1300 qu6444.exe 3124 si645110.exe 3124 si645110.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3075.exequ6444.exesi645110.exedescription pid process Token: SeDebugPrivilege 4980 pro3075.exe Token: SeDebugPrivilege 1300 qu6444.exe Token: SeDebugPrivilege 3124 si645110.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exeun194475.exedescription pid process target process PID 4400 wrote to memory of 3676 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe un194475.exe PID 4400 wrote to memory of 3676 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe un194475.exe PID 4400 wrote to memory of 3676 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe un194475.exe PID 3676 wrote to memory of 4980 3676 un194475.exe pro3075.exe PID 3676 wrote to memory of 4980 3676 un194475.exe pro3075.exe PID 3676 wrote to memory of 4980 3676 un194475.exe pro3075.exe PID 3676 wrote to memory of 1300 3676 un194475.exe qu6444.exe PID 3676 wrote to memory of 1300 3676 un194475.exe qu6444.exe PID 3676 wrote to memory of 1300 3676 un194475.exe qu6444.exe PID 4400 wrote to memory of 3124 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe si645110.exe PID 4400 wrote to memory of 3124 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe si645110.exe PID 4400 wrote to memory of 3124 4400 9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe si645110.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe"C:\Users\Admin\AppData\Local\Temp\9abfe10cd6d6fc663c731e0d0e19fb31aac9d19de45bf07ad72137743a53b0f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3075.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10644⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6444.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645110.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645110.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4980 -ip 49801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1300 -ip 13001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645110.exeFilesize
175KB
MD5b3b9353dd23a0a8339c25f0dc1cd4b03
SHA190565984ba5d2ac374458514d76750175a99b7d9
SHA256a82f9a6a88bb728084fc17c845252aad31a83681cdf4e5c52ca36bdea3cf30ee
SHA512ad8cbc20fe7b65bafab28cf53d040cddceb9f64affd007f72fd8cc4b66dc386a70d711725d8520d26f960ad295c032450173a1dc9035aeb2af3484f3213be5a7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645110.exeFilesize
175KB
MD5b3b9353dd23a0a8339c25f0dc1cd4b03
SHA190565984ba5d2ac374458514d76750175a99b7d9
SHA256a82f9a6a88bb728084fc17c845252aad31a83681cdf4e5c52ca36bdea3cf30ee
SHA512ad8cbc20fe7b65bafab28cf53d040cddceb9f64affd007f72fd8cc4b66dc386a70d711725d8520d26f960ad295c032450173a1dc9035aeb2af3484f3213be5a7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194475.exeFilesize
547KB
MD5cba01280a3060bdf09a870cc5c6292ae
SHA15c257371146eb5ea0dfa0da05a1bb2db6f424724
SHA256215e958e8783cb9a44418c51607569e4ad72b8efd675929a314014a36a8b87cb
SHA512ab03d1a7c57f4fb9692a9df86a8d41a95035ab22d99f87e4460b28e9455c905e218fff511f8d29e9eff68d6ca7c0bd7611884cd0fbb729b4af2a0f283e138818
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194475.exeFilesize
547KB
MD5cba01280a3060bdf09a870cc5c6292ae
SHA15c257371146eb5ea0dfa0da05a1bb2db6f424724
SHA256215e958e8783cb9a44418c51607569e4ad72b8efd675929a314014a36a8b87cb
SHA512ab03d1a7c57f4fb9692a9df86a8d41a95035ab22d99f87e4460b28e9455c905e218fff511f8d29e9eff68d6ca7c0bd7611884cd0fbb729b4af2a0f283e138818
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3075.exeFilesize
291KB
MD5ff5cb4ad398387964b2f340b8966841d
SHA1399eedfa0390a4997c8ecc72d8bf07dbcc0f0ef0
SHA256556d1f81ba0a2b08ef46d5a49ed0fa11f4db3605b9846793df6c5b8575a67aa7
SHA5129cd93cdd49a6a8385629ab30efb7c2ad75c804aaa00e12f31b705311612458f6023c4355971a02a00efd79115fbd2ba1f0f46b16aa923cf3b9221ec43bf20af6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3075.exeFilesize
291KB
MD5ff5cb4ad398387964b2f340b8966841d
SHA1399eedfa0390a4997c8ecc72d8bf07dbcc0f0ef0
SHA256556d1f81ba0a2b08ef46d5a49ed0fa11f4db3605b9846793df6c5b8575a67aa7
SHA5129cd93cdd49a6a8385629ab30efb7c2ad75c804aaa00e12f31b705311612458f6023c4355971a02a00efd79115fbd2ba1f0f46b16aa923cf3b9221ec43bf20af6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6444.exeFilesize
345KB
MD5f96a553638eef641219f6c75d630d1ce
SHA156b8e6a3831876c7a07e156de1ef8844469265b1
SHA256f2dfabbe2a11fc366c3fcc0ceda08531d10e3ae6c8ba090a3f53f8ed631edc09
SHA51279c7c8bc8c9edbb03b66665344ee59e3a9017450e8e5b6215a8161e634ee17a192039b11cf14a6cd6cef521962b2efbe060d5be937cfa6ed1a399fe254a1a01f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6444.exeFilesize
345KB
MD5f96a553638eef641219f6c75d630d1ce
SHA156b8e6a3831876c7a07e156de1ef8844469265b1
SHA256f2dfabbe2a11fc366c3fcc0ceda08531d10e3ae6c8ba090a3f53f8ed631edc09
SHA51279c7c8bc8c9edbb03b66665344ee59e3a9017450e8e5b6215a8161e634ee17a192039b11cf14a6cd6cef521962b2efbe060d5be937cfa6ed1a399fe254a1a01f
-
memory/1300-1096-0x0000000006630000-0x0000000006C48000-memory.dmpFilesize
6.1MB
-
memory/1300-1099-0x0000000006E30000-0x0000000006E6C000-memory.dmpFilesize
240KB
-
memory/1300-1111-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-1110-0x0000000003970000-0x00000000039C0000-memory.dmpFilesize
320KB
-
memory/1300-1109-0x0000000007A20000-0x0000000007A96000-memory.dmpFilesize
472KB
-
memory/1300-1108-0x0000000008D60000-0x000000000928C000-memory.dmpFilesize
5.2MB
-
memory/1300-1107-0x0000000008B80000-0x0000000008D42000-memory.dmpFilesize
1.8MB
-
memory/1300-1106-0x00000000071C0000-0x0000000007226000-memory.dmpFilesize
408KB
-
memory/1300-1105-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/1300-1104-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-1103-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-1102-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-1100-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-1098-0x0000000006E10000-0x0000000006E22000-memory.dmpFilesize
72KB
-
memory/1300-1097-0x0000000006CD0000-0x0000000006DDA000-memory.dmpFilesize
1.0MB
-
memory/1300-225-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-223-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-221-0x0000000003720000-0x0000000003730000-memory.dmpFilesize
64KB
-
memory/1300-186-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-187-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-189-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-191-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-193-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-195-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-197-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-199-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-201-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-203-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-205-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-207-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-209-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-211-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-213-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-215-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-217-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/1300-219-0x0000000001A30000-0x0000000001A7B000-memory.dmpFilesize
300KB
-
memory/1300-220-0x0000000003BA0000-0x0000000003BDF000-memory.dmpFilesize
252KB
-
memory/3124-1117-0x0000000000B00000-0x0000000000B32000-memory.dmpFilesize
200KB
-
memory/3124-1118-0x0000000005730000-0x0000000005740000-memory.dmpFilesize
64KB
-
memory/4980-170-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-168-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-179-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4980-178-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-154-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-176-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-174-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-172-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-152-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-150-0x0000000004E60000-0x0000000005404000-memory.dmpFilesize
5.6MB
-
memory/4980-166-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-164-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-162-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-160-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-158-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-156-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB
-
memory/4980-149-0x00000000024D0000-0x00000000024E0000-memory.dmpFilesize
64KB
-
memory/4980-148-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/4980-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4980-151-0x0000000002970000-0x0000000002982000-memory.dmpFilesize
72KB