Analysis
-
max time kernel
106s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:05
Static task
static1
Behavioral task
behavioral1
Sample
aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe
Resource
win10v2004-20230220-en
General
-
Target
aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe
-
Size
689KB
-
MD5
3d147c085cfc7a2e022d1e0411010035
-
SHA1
65ce20985fdcfff0f98dec52c3bf391474d6a6e1
-
SHA256
aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d
-
SHA512
e3a37d5f9767e147182fbca860f2c89d3cee90b8bf195dfab4f3136e06989d5078d4980ad8e1023998b04d53406ae5b4a8dbf972e9a1b6e58952d5eb165720ef
-
SSDEEP
12288:+MrMy907rgKwSLAd8uYueZ0Mx19GWukeUVQRAxZYjmJovGFexfigFK4J/O1Ne45J:myjaAidrzD3gmJoyexagMV5rAK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2331.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2331.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2464-192-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-194-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-198-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-200-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-202-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-204-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-206-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-208-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-210-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-212-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-214-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-216-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-218-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-220-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-222-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-224-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-226-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2464-228-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un703629.exepro2331.exequ4375.exesi523911.exepid process 4652 un703629.exe 428 pro2331.exe 2464 qu4375.exe 4872 si523911.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2331.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2331.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un703629.exeaaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un703629.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un703629.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4432 428 WerFault.exe pro2331.exe 5028 2464 WerFault.exe qu4375.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2331.exequ4375.exesi523911.exepid process 428 pro2331.exe 428 pro2331.exe 2464 qu4375.exe 2464 qu4375.exe 4872 si523911.exe 4872 si523911.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2331.exequ4375.exesi523911.exedescription pid process Token: SeDebugPrivilege 428 pro2331.exe Token: SeDebugPrivilege 2464 qu4375.exe Token: SeDebugPrivilege 4872 si523911.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exeun703629.exedescription pid process target process PID 4484 wrote to memory of 4652 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe un703629.exe PID 4484 wrote to memory of 4652 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe un703629.exe PID 4484 wrote to memory of 4652 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe un703629.exe PID 4652 wrote to memory of 428 4652 un703629.exe pro2331.exe PID 4652 wrote to memory of 428 4652 un703629.exe pro2331.exe PID 4652 wrote to memory of 428 4652 un703629.exe pro2331.exe PID 4652 wrote to memory of 2464 4652 un703629.exe qu4375.exe PID 4652 wrote to memory of 2464 4652 un703629.exe qu4375.exe PID 4652 wrote to memory of 2464 4652 un703629.exe qu4375.exe PID 4484 wrote to memory of 4872 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe si523911.exe PID 4484 wrote to memory of 4872 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe si523911.exe PID 4484 wrote to memory of 4872 4484 aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe si523911.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe"C:\Users\Admin\AppData\Local\Temp\aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 13404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 428 -ip 4281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2464 -ip 24641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exeFilesize
175KB
MD5628c5a57c643e30fc1f635a4f037faf8
SHA1af8855fa2ec1bbfe5d28f435999979150faee674
SHA2562cb454ca01884ed200ee06dddc44efefba1f12297ac04ea9cf45bc0bba7a7cea
SHA51251b57d24a0750f4d5ce23648cb72ba4429bb47d8d5a6cdce2f16b37fd3fd969e11888825069d35f37e44c71ca94e8ad098e89d1b7d2b3c290a9f711e46a03be6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exeFilesize
175KB
MD5628c5a57c643e30fc1f635a4f037faf8
SHA1af8855fa2ec1bbfe5d28f435999979150faee674
SHA2562cb454ca01884ed200ee06dddc44efefba1f12297ac04ea9cf45bc0bba7a7cea
SHA51251b57d24a0750f4d5ce23648cb72ba4429bb47d8d5a6cdce2f16b37fd3fd969e11888825069d35f37e44c71ca94e8ad098e89d1b7d2b3c290a9f711e46a03be6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exeFilesize
547KB
MD5d1bed3b809b9af68eb234dde01bd5a9e
SHA1107de6e0e887db95d3b01c502ba788446aa632a6
SHA256870bbf0adc78fffcd66597a2f80c79301398e74d3831e9372d7346a8bd7d609f
SHA512717b67c02d21145c612678ad70ffd335a8bf07459179f288b90f68be87a2a00bbd4c8eebaccae4a5df7d4186dc55b56644d882706a4ba9079abaf5b1116c8cd1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exeFilesize
547KB
MD5d1bed3b809b9af68eb234dde01bd5a9e
SHA1107de6e0e887db95d3b01c502ba788446aa632a6
SHA256870bbf0adc78fffcd66597a2f80c79301398e74d3831e9372d7346a8bd7d609f
SHA512717b67c02d21145c612678ad70ffd335a8bf07459179f288b90f68be87a2a00bbd4c8eebaccae4a5df7d4186dc55b56644d882706a4ba9079abaf5b1116c8cd1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exeFilesize
291KB
MD5e967db616c139d649676d47dd9eeccb5
SHA1378d110eb64926ba398e76aee269b307ce73e2bd
SHA2563068b1892cb95b8bc30d49d86723706ed50ddde7ae6c90652cf0f2b23f79f65f
SHA512a86cf938d77216b30c1494a901d51ccf50cd2f0c875a91fa8392858e97e1c29fe24e17dc663fedcc5e767958e45a7834ab5dc04ee712b8554dd97c4819148296
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exeFilesize
291KB
MD5e967db616c139d649676d47dd9eeccb5
SHA1378d110eb64926ba398e76aee269b307ce73e2bd
SHA2563068b1892cb95b8bc30d49d86723706ed50ddde7ae6c90652cf0f2b23f79f65f
SHA512a86cf938d77216b30c1494a901d51ccf50cd2f0c875a91fa8392858e97e1c29fe24e17dc663fedcc5e767958e45a7834ab5dc04ee712b8554dd97c4819148296
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exeFilesize
345KB
MD5fed6b068c35f66c6be35190afa5550ec
SHA168d2abd37a83ec4cbcc99d857b3546959a4833c8
SHA256bd9a19d034606e0b9353795669b576a18476bf1c01dfebd17d2c9d72ffa69148
SHA512caa9c0b9099cbb971f3f85f59c5feaabcfda3bf1ae44d7d40a8164a64ff2b672f6cc4f8e99339dfe93d6172c4e1c95051255b8b583d9c271342f036c82152c6d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exeFilesize
345KB
MD5fed6b068c35f66c6be35190afa5550ec
SHA168d2abd37a83ec4cbcc99d857b3546959a4833c8
SHA256bd9a19d034606e0b9353795669b576a18476bf1c01dfebd17d2c9d72ffa69148
SHA512caa9c0b9099cbb971f3f85f59c5feaabcfda3bf1ae44d7d40a8164a64ff2b672f6cc4f8e99339dfe93d6172c4e1c95051255b8b583d9c271342f036c82152c6d
-
memory/428-148-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/428-149-0x0000000004D80000-0x0000000005324000-memory.dmpFilesize
5.6MB
-
memory/428-150-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-151-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-153-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-155-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-157-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-159-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-161-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-163-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-167-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-165-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-169-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-171-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-175-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-173-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-177-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/428-178-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-179-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-180-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/428-183-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-184-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-185-0x0000000002850000-0x0000000002860000-memory.dmpFilesize
64KB
-
memory/428-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/2464-194-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-224-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-193-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-192-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-195-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-198-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-197-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-200-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-202-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-204-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-206-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-208-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-210-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-212-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-214-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-216-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-218-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-220-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-222-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-191-0x0000000001B10000-0x0000000001B5B000-memory.dmpFilesize
300KB
-
memory/2464-226-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-228-0x00000000065B0000-0x00000000065EF000-memory.dmpFilesize
252KB
-
memory/2464-1101-0x0000000006770000-0x0000000006D88000-memory.dmpFilesize
6.1MB
-
memory/2464-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmpFilesize
1.0MB
-
memory/2464-1103-0x0000000006F50000-0x0000000006F62000-memory.dmpFilesize
72KB
-
memory/2464-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmpFilesize
240KB
-
memory/2464-1105-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-1106-0x0000000007260000-0x00000000072F2000-memory.dmpFilesize
584KB
-
memory/2464-1107-0x0000000007300000-0x0000000007366000-memory.dmpFilesize
408KB
-
memory/2464-1109-0x0000000007B40000-0x0000000007BB6000-memory.dmpFilesize
472KB
-
memory/2464-1110-0x0000000007BD0000-0x0000000007C20000-memory.dmpFilesize
320KB
-
memory/2464-1111-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-1112-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-1113-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/2464-1114-0x0000000007D50000-0x0000000007F12000-memory.dmpFilesize
1.8MB
-
memory/2464-1115-0x0000000007F20000-0x000000000844C000-memory.dmpFilesize
5.2MB
-
memory/2464-1116-0x0000000003A50000-0x0000000003A60000-memory.dmpFilesize
64KB
-
memory/4872-1122-0x0000000000EC0000-0x0000000000EF2000-memory.dmpFilesize
200KB
-
memory/4872-1123-0x0000000005800000-0x0000000005810000-memory.dmpFilesize
64KB