Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:14
Static task
static1
Behavioral task
behavioral1
Sample
505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe
Resource
win10v2004-20230220-en
General
-
Target
505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe
-
Size
689KB
-
MD5
91d41e0c880bed94fd4d7fb5eea6ecd0
-
SHA1
cc70d5e6436e2be9bf424ced0e426a614f04cf3f
-
SHA256
505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f
-
SHA512
39813d26b4f012d40aff5e9c407dcd3c5f9947e699c34c5ee3fb55038c2814d2a5a5f83b46379aec0c3d87ca90c2b7781f2d6c7a78f1ce82a6bc2c4e88337937
-
SSDEEP
12288:8MrEy909Y/vEswR2fnLZbGwMvUpyF65hLuwBlihKxWl5LvbFu1figf4KxSOv7fqX:Iy6YEjRaLZbGwMcgYfaaiEIRu1agmOvg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5301.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5301.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5301.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4948-193-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-196-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-194-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-198-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-200-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-202-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-204-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-206-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-208-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-210-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-212-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-214-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-216-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-218-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-220-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-222-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-224-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4948-226-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un797306.exepro5301.exequ8286.exesi406962.exepid process 2808 un797306.exe 1292 pro5301.exe 4948 qu8286.exe 2040 si406962.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5301.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5301.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exeun797306.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un797306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un797306.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5076 1292 WerFault.exe pro5301.exe 1372 4948 WerFault.exe qu8286.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5301.exequ8286.exesi406962.exepid process 1292 pro5301.exe 1292 pro5301.exe 4948 qu8286.exe 4948 qu8286.exe 2040 si406962.exe 2040 si406962.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5301.exequ8286.exesi406962.exedescription pid process Token: SeDebugPrivilege 1292 pro5301.exe Token: SeDebugPrivilege 4948 qu8286.exe Token: SeDebugPrivilege 2040 si406962.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exeun797306.exedescription pid process target process PID 1044 wrote to memory of 2808 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe un797306.exe PID 1044 wrote to memory of 2808 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe un797306.exe PID 1044 wrote to memory of 2808 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe un797306.exe PID 2808 wrote to memory of 1292 2808 un797306.exe pro5301.exe PID 2808 wrote to memory of 1292 2808 un797306.exe pro5301.exe PID 2808 wrote to memory of 1292 2808 un797306.exe pro5301.exe PID 2808 wrote to memory of 4948 2808 un797306.exe qu8286.exe PID 2808 wrote to memory of 4948 2808 un797306.exe qu8286.exe PID 2808 wrote to memory of 4948 2808 un797306.exe qu8286.exe PID 1044 wrote to memory of 2040 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe si406962.exe PID 1044 wrote to memory of 2040 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe si406962.exe PID 1044 wrote to memory of 2040 1044 505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe si406962.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe"C:\Users\Admin\AppData\Local\Temp\505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 18444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1292 -ip 12921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 49481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exeFilesize
175KB
MD503b1a088082820999116e38c20fba500
SHA1f05021e90d08d8a9f71bdfdf27f3da17c3d865bc
SHA256db94ecd7fa2a3c5c2410c8454b5d31b55c005f695fb7c2e32fe4d47270a76819
SHA512e6905ee8dfd823a7dec46d75986da2227d8df3ad20c08f5eb7a0e78bc95c09a887a50843c0051b9264eec9ccc63ee52fe55c10518448e310c93734146f7b96ce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exeFilesize
175KB
MD503b1a088082820999116e38c20fba500
SHA1f05021e90d08d8a9f71bdfdf27f3da17c3d865bc
SHA256db94ecd7fa2a3c5c2410c8454b5d31b55c005f695fb7c2e32fe4d47270a76819
SHA512e6905ee8dfd823a7dec46d75986da2227d8df3ad20c08f5eb7a0e78bc95c09a887a50843c0051b9264eec9ccc63ee52fe55c10518448e310c93734146f7b96ce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exeFilesize
548KB
MD57240cd2bbc5c21ab3b6da743c71cc86e
SHA108c048b1fb828708517e656993924dee49de49d8
SHA256c3cbe991e338d0dafb705cb9c06c8084bf848acfa3027b44743ee54dd101841f
SHA51268c9cfe38beaf7f88f6a46e3034ca789a19e8caed19b72fad435d4fdb5ced2e99db052ff33605b10274707afee58f334a817083bd08c10f854f13143a4164adf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exeFilesize
548KB
MD57240cd2bbc5c21ab3b6da743c71cc86e
SHA108c048b1fb828708517e656993924dee49de49d8
SHA256c3cbe991e338d0dafb705cb9c06c8084bf848acfa3027b44743ee54dd101841f
SHA51268c9cfe38beaf7f88f6a46e3034ca789a19e8caed19b72fad435d4fdb5ced2e99db052ff33605b10274707afee58f334a817083bd08c10f854f13143a4164adf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exeFilesize
291KB
MD5fa69d50b715610d9dc6daa0436863627
SHA189a66b31521144429f061faf868425e71f13701e
SHA2567e7331229234bbab6b726273a12baf5d509a96ab9354e95fea7191430808be12
SHA512f17d96f7c3f168695d7dd26c23893593e67c863e80c8783180b95886f0787457354baa9f67d09c41efebc43ff55cae9158e86160a8874a3367fd7dee2bb60d76
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exeFilesize
291KB
MD5fa69d50b715610d9dc6daa0436863627
SHA189a66b31521144429f061faf868425e71f13701e
SHA2567e7331229234bbab6b726273a12baf5d509a96ab9354e95fea7191430808be12
SHA512f17d96f7c3f168695d7dd26c23893593e67c863e80c8783180b95886f0787457354baa9f67d09c41efebc43ff55cae9158e86160a8874a3367fd7dee2bb60d76
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exeFilesize
345KB
MD5c14188251e89434b2fb51b483623a518
SHA1541e4939a43ba661de35cba04bf2e29d53628059
SHA256e91851aea3c21b44787b9a7c6f11278b7726108c8bf256d1f38d5b49cbdc847d
SHA512796397b366aaa5346b3be853b675c12a32a4d72c5d5209b49c424f217ee212241ce75a40ce5b0bbbd571902ad7ea1d714f074e47db583c397149cac4c2139a41
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exeFilesize
345KB
MD5c14188251e89434b2fb51b483623a518
SHA1541e4939a43ba661de35cba04bf2e29d53628059
SHA256e91851aea3c21b44787b9a7c6f11278b7726108c8bf256d1f38d5b49cbdc847d
SHA512796397b366aaa5346b3be853b675c12a32a4d72c5d5209b49c424f217ee212241ce75a40ce5b0bbbd571902ad7ea1d714f074e47db583c397149cac4c2139a41
-
memory/1292-148-0x0000000004C60000-0x0000000005204000-memory.dmpFilesize
5.6MB
-
memory/1292-149-0x00000000020F0000-0x000000000211D000-memory.dmpFilesize
180KB
-
memory/1292-150-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1292-151-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1292-152-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1292-153-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-154-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-156-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-158-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-160-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-162-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-164-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-166-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-168-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-170-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-172-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-174-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-176-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-178-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-180-0x0000000002750000-0x0000000002762000-memory.dmpFilesize
72KB
-
memory/1292-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1292-182-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1292-183-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1292-185-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/2040-1120-0x00000000009B0000-0x00000000009E2000-memory.dmpFilesize
200KB
-
memory/2040-1121-0x0000000005260000-0x0000000005270000-memory.dmpFilesize
64KB
-
memory/4948-191-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-222-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-193-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-196-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-194-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-198-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-200-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-202-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-204-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-206-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-208-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-210-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-212-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-214-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-216-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-218-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-220-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-192-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-224-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-226-0x0000000006590000-0x00000000065CF000-memory.dmpFilesize
252KB
-
memory/4948-1099-0x0000000006630000-0x0000000006C48000-memory.dmpFilesize
6.1MB
-
memory/4948-1100-0x0000000006CD0000-0x0000000006DDA000-memory.dmpFilesize
1.0MB
-
memory/4948-1101-0x0000000006E10000-0x0000000006E22000-memory.dmpFilesize
72KB
-
memory/4948-1102-0x0000000006E30000-0x0000000006E6C000-memory.dmpFilesize
240KB
-
memory/4948-1103-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-1105-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/4948-1106-0x00000000071C0000-0x0000000007226000-memory.dmpFilesize
408KB
-
memory/4948-1107-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-1108-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-1109-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB
-
memory/4948-1110-0x00000000078E0000-0x0000000007AA2000-memory.dmpFilesize
1.8MB
-
memory/4948-1111-0x0000000007AC0000-0x0000000007FEC000-memory.dmpFilesize
5.2MB
-
memory/4948-190-0x00000000033F0000-0x000000000343B000-memory.dmpFilesize
300KB
-
memory/4948-1112-0x0000000008390000-0x0000000008406000-memory.dmpFilesize
472KB
-
memory/4948-1113-0x0000000008410000-0x0000000008460000-memory.dmpFilesize
320KB
-
memory/4948-1114-0x0000000003AB0000-0x0000000003AC0000-memory.dmpFilesize
64KB