Analysis
-
max time kernel
98s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:17
Static task
static1
Behavioral task
behavioral1
Sample
a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe
Resource
win10v2004-20230220-en
General
-
Target
a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe
-
Size
689KB
-
MD5
bbed096b238651c1f95f2abe09b02b66
-
SHA1
1e81cce81e952bd42b743c80b3b4f872133a69a8
-
SHA256
a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b
-
SHA512
ea3053429b8c9dbaf061896435672c6c3e047af76f7d9aaf33519fff907990cdb422cd595a9a011359eb42810ee817c60c89adca74136fd2e69efbaaf915dc97
-
SSDEEP
12288:ZMrSy90AcwpRbi5QDyOCwevemlMe5z3muMys65hLuGy4iwDodfR/0bj6WBrFv7Fi:3yfcoAvwevemlMeRFNzfaDfde6WBrFhi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6003.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2652-192-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-191-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-194-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-196-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-198-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-200-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-202-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-204-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-206-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-208-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-210-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-212-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-214-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-216-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-218-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-220-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-222-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-224-0x0000000003B00000-0x0000000003B3F000-memory.dmp family_redline behavioral1/memory/2652-1108-0x00000000037F0000-0x0000000003800000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un441927.exepro6003.exequ9897.exesi133615.exepid process 3360 un441927.exe 4424 pro6003.exe 2652 qu9897.exe 1216 si133615.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6003.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6003.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exeun441927.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un441927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un441927.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1744 4424 WerFault.exe pro6003.exe 2024 2652 WerFault.exe qu9897.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6003.exequ9897.exesi133615.exepid process 4424 pro6003.exe 4424 pro6003.exe 2652 qu9897.exe 2652 qu9897.exe 1216 si133615.exe 1216 si133615.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6003.exequ9897.exesi133615.exedescription pid process Token: SeDebugPrivilege 4424 pro6003.exe Token: SeDebugPrivilege 2652 qu9897.exe Token: SeDebugPrivilege 1216 si133615.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exeun441927.exedescription pid process target process PID 1916 wrote to memory of 3360 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe un441927.exe PID 1916 wrote to memory of 3360 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe un441927.exe PID 1916 wrote to memory of 3360 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe un441927.exe PID 3360 wrote to memory of 4424 3360 un441927.exe pro6003.exe PID 3360 wrote to memory of 4424 3360 un441927.exe pro6003.exe PID 3360 wrote to memory of 4424 3360 un441927.exe pro6003.exe PID 3360 wrote to memory of 2652 3360 un441927.exe qu9897.exe PID 3360 wrote to memory of 2652 3360 un441927.exe qu9897.exe PID 3360 wrote to memory of 2652 3360 un441927.exe qu9897.exe PID 1916 wrote to memory of 1216 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe si133615.exe PID 1916 wrote to memory of 1216 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe si133615.exe PID 1916 wrote to memory of 1216 1916 a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe si133615.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe"C:\Users\Admin\AppData\Local\Temp\a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 9724⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4424 -ip 44241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2652 -ip 26521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exeFilesize
175KB
MD5e6a7b8fa30fb96981ab78b62e9f039c3
SHA125a1d2bba98cf5b4e32e493bec13c881ddfbe963
SHA2564f774d2409b24d22ecca3b5919b63b9956d09beb4a577a442b1cb883e62c0c5a
SHA512d07fba212decfa49bb01044698edf1d020a7c40db83fd173d5d4ae31f5eeafe465c59118d2346020b5b4b9e2cda8f1bd810e3efded520dcf251b7e22083c9050
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exeFilesize
175KB
MD5e6a7b8fa30fb96981ab78b62e9f039c3
SHA125a1d2bba98cf5b4e32e493bec13c881ddfbe963
SHA2564f774d2409b24d22ecca3b5919b63b9956d09beb4a577a442b1cb883e62c0c5a
SHA512d07fba212decfa49bb01044698edf1d020a7c40db83fd173d5d4ae31f5eeafe465c59118d2346020b5b4b9e2cda8f1bd810e3efded520dcf251b7e22083c9050
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exeFilesize
548KB
MD56b2add57708e1991b551c0e95a04d5ea
SHA1e15f342ee7a08a43d821a4116d9bae5a8f52abe7
SHA256eda1a3aad7ae9ec461b74b9b9aed8300c7e10807fffe4dcd8c13ff65278a3131
SHA51256ec107507e818efea1b8ad6dd051a4856b476a30898600420713f20652862b9b21c5d0fcdf9cbf250ab6d14beae2cf4d04c6715aebf5d9cfbc3a57177fbec8d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exeFilesize
548KB
MD56b2add57708e1991b551c0e95a04d5ea
SHA1e15f342ee7a08a43d821a4116d9bae5a8f52abe7
SHA256eda1a3aad7ae9ec461b74b9b9aed8300c7e10807fffe4dcd8c13ff65278a3131
SHA51256ec107507e818efea1b8ad6dd051a4856b476a30898600420713f20652862b9b21c5d0fcdf9cbf250ab6d14beae2cf4d04c6715aebf5d9cfbc3a57177fbec8d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exeFilesize
291KB
MD578b202681045343a3666586d5e644979
SHA1d98d119edb2d028f7f607e0f8c49b09676990f3b
SHA2565bece8d9a119cefe55abcbf7eec2f746ce18255e7d0e1dd3126da3fa09efe705
SHA512fa4fedbb1b5229976c70a5e436de0dae08dedc177bf885f80cf50d28b8720b70bd0e22b77b14159a849cfd81b959c489786e7fd5b980c11fd1a3a14de0d80581
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exeFilesize
291KB
MD578b202681045343a3666586d5e644979
SHA1d98d119edb2d028f7f607e0f8c49b09676990f3b
SHA2565bece8d9a119cefe55abcbf7eec2f746ce18255e7d0e1dd3126da3fa09efe705
SHA512fa4fedbb1b5229976c70a5e436de0dae08dedc177bf885f80cf50d28b8720b70bd0e22b77b14159a849cfd81b959c489786e7fd5b980c11fd1a3a14de0d80581
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exeFilesize
345KB
MD5f543a7246bc0065a215714f29f2d16d4
SHA1831ba5c46e7fa832b0fa0ceec22c812f93a49bb6
SHA25603f181fb6dadffddb5fee6960c1a7cd7ba053e67392b922f089c9482131d5b5c
SHA512d9bef54e1dfbde0568c267613542af2cd1da0e1ac3689dd17a5c5ca88ecc044de366d0f8ad65691bb42ac9e23dc84897a73135bfb06a18b223644f3d1e4752f4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exeFilesize
345KB
MD5f543a7246bc0065a215714f29f2d16d4
SHA1831ba5c46e7fa832b0fa0ceec22c812f93a49bb6
SHA25603f181fb6dadffddb5fee6960c1a7cd7ba053e67392b922f089c9482131d5b5c
SHA512d9bef54e1dfbde0568c267613542af2cd1da0e1ac3689dd17a5c5ca88ecc044de366d0f8ad65691bb42ac9e23dc84897a73135bfb06a18b223644f3d1e4752f4
-
memory/1216-1121-0x0000000005C10000-0x0000000005C20000-memory.dmpFilesize
64KB
-
memory/1216-1120-0x0000000000FB0000-0x0000000000FE2000-memory.dmpFilesize
200KB
-
memory/2652-486-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmpFilesize
1.0MB
-
memory/2652-1114-0x0000000008090000-0x00000000085BC000-memory.dmpFilesize
5.2MB
-
memory/2652-1113-0x0000000007EC0000-0x0000000008082000-memory.dmpFilesize
1.8MB
-
memory/2652-1112-0x0000000007CD0000-0x0000000007D20000-memory.dmpFilesize
320KB
-
memory/2652-1111-0x0000000007C50000-0x0000000007CC6000-memory.dmpFilesize
472KB
-
memory/2652-1110-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-1109-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-1108-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-1106-0x0000000007930000-0x00000000079C2000-memory.dmpFilesize
584KB
-
memory/2652-1105-0x0000000007260000-0x00000000072C6000-memory.dmpFilesize
408KB
-
memory/2652-1104-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmpFilesize
240KB
-
memory/2652-1102-0x0000000006F50000-0x0000000006F62000-memory.dmpFilesize
72KB
-
memory/2652-1100-0x00000000067A0000-0x0000000006DB8000-memory.dmpFilesize
6.1MB
-
memory/2652-484-0x00000000037F0000-0x0000000003800000-memory.dmpFilesize
64KB
-
memory/2652-483-0x0000000001B30000-0x0000000001B7B000-memory.dmpFilesize
300KB
-
memory/2652-224-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-222-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-220-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-218-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-192-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-191-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-194-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-196-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-198-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-200-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-202-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-204-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-206-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-208-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-210-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-212-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-214-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/2652-216-0x0000000003B00000-0x0000000003B3F000-memory.dmpFilesize
252KB
-
memory/4424-175-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-183-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-153-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-185-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-173-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-182-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4424-152-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-171-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-157-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-180-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-179-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-177-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4424-155-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-181-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-169-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-167-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-165-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-163-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-161-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-159-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/4424-151-0x0000000004F40000-0x00000000054E4000-memory.dmpFilesize
5.6MB
-
memory/4424-150-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-149-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4424-148-0x0000000000710000-0x000000000073D000-memory.dmpFilesize
180KB