Analysis
-
max time kernel
85s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:28
Static task
static1
Behavioral task
behavioral1
Sample
9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe
Resource
win10v2004-20230220-en
General
-
Target
9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe
-
Size
690KB
-
MD5
5b0852181178c00945583d79c6f3f64c
-
SHA1
aab8391993ad4e69b3e327d3cecfbe81dfe70f86
-
SHA256
9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8
-
SHA512
3104996e2b06315f7cacbce11d611d7788381cef86ede6ce19dd2389c50a485c326c0996f75a7137091d1a2e297cd4090aac217cc6c6c7f19c76d7f06003c8d3
-
SSDEEP
12288:HMrmy9003A304aGnvyj65hLuhX0MSKI3Vc+GrVvxFPwfigdnMz229i77VxL:Nyf6Kufat0LZ3VcxRTPwag22qWVxL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7422.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7422.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/464-193-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-191-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-196-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-198-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-200-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-202-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-204-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-206-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-208-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-210-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-212-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-214-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-216-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-218-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-220-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-222-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-224-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/464-226-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un268812.exepro7422.exequ0688.exesi994173.exepid process 2252 un268812.exe 1028 pro7422.exe 464 qu0688.exe 5096 si994173.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7422.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7422.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un268812.exe9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un268812.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un268812.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 484 1028 WerFault.exe pro7422.exe 4880 464 WerFault.exe qu0688.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7422.exequ0688.exesi994173.exepid process 1028 pro7422.exe 1028 pro7422.exe 464 qu0688.exe 464 qu0688.exe 5096 si994173.exe 5096 si994173.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7422.exequ0688.exesi994173.exedescription pid process Token: SeDebugPrivilege 1028 pro7422.exe Token: SeDebugPrivilege 464 qu0688.exe Token: SeDebugPrivilege 5096 si994173.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exeun268812.exedescription pid process target process PID 4264 wrote to memory of 2252 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe un268812.exe PID 4264 wrote to memory of 2252 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe un268812.exe PID 4264 wrote to memory of 2252 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe un268812.exe PID 2252 wrote to memory of 1028 2252 un268812.exe pro7422.exe PID 2252 wrote to memory of 1028 2252 un268812.exe pro7422.exe PID 2252 wrote to memory of 1028 2252 un268812.exe pro7422.exe PID 2252 wrote to memory of 464 2252 un268812.exe qu0688.exe PID 2252 wrote to memory of 464 2252 un268812.exe qu0688.exe PID 2252 wrote to memory of 464 2252 un268812.exe qu0688.exe PID 4264 wrote to memory of 5096 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe si994173.exe PID 4264 wrote to memory of 5096 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe si994173.exe PID 4264 wrote to memory of 5096 4264 9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe si994173.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe"C:\Users\Admin\AppData\Local\Temp\9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 14284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1028 -ip 10281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 464 -ip 4641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exeFilesize
175KB
MD5e3b6beea5548e2f10acd926b4f52b25a
SHA150ff64e046fd409d09706154d571a65b5ab38283
SHA2567d60b888b5c0e08337b31337690db7b87fc74e33e81062f6f114d92e79efc4ae
SHA5122d5de896a67329517e1ac161d70044ada8b325de30af622fa2a40c390385658f934e9c0c6647cab9c3f64093f626a2ddd67cdb9f31b43099fa3fc3130f0eac64
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exeFilesize
175KB
MD5e3b6beea5548e2f10acd926b4f52b25a
SHA150ff64e046fd409d09706154d571a65b5ab38283
SHA2567d60b888b5c0e08337b31337690db7b87fc74e33e81062f6f114d92e79efc4ae
SHA5122d5de896a67329517e1ac161d70044ada8b325de30af622fa2a40c390385658f934e9c0c6647cab9c3f64093f626a2ddd67cdb9f31b43099fa3fc3130f0eac64
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exeFilesize
548KB
MD5714b7e26d9dd5770d882d2515b75dcae
SHA151495f46b5a8f18473c963e9d0c8992f0a4a6ca8
SHA256c6ad37250ac866f4511a0fb5a8827b0e9f386dbede3de8bdd946d522462bd71d
SHA512a23afa8b1313ec5bdbaaba7194c2619f19867ee01286b905fe5a12f93c3391359ab9a7d10f3a1d9e878ede0df12df889d5aafc285f59d3f6fffd6c7268642a87
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exeFilesize
548KB
MD5714b7e26d9dd5770d882d2515b75dcae
SHA151495f46b5a8f18473c963e9d0c8992f0a4a6ca8
SHA256c6ad37250ac866f4511a0fb5a8827b0e9f386dbede3de8bdd946d522462bd71d
SHA512a23afa8b1313ec5bdbaaba7194c2619f19867ee01286b905fe5a12f93c3391359ab9a7d10f3a1d9e878ede0df12df889d5aafc285f59d3f6fffd6c7268642a87
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exeFilesize
291KB
MD5fcee498697134ddb048e43b46eeb40b8
SHA1ed51c4e50b1de1d20d3ee69f7935b0960770075c
SHA2568487efd5c75483f474d6efb0b4dfc5642bdf0d470404d578c06a3e49caea1703
SHA512294570ff74f903743ebd5e0fde76d5d38fb2213206f3011111778ff756df1b7433f76849ef859087daa0d08ab4dbae411c20a40bffff3d6cad2c040240c3fb54
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exeFilesize
291KB
MD5fcee498697134ddb048e43b46eeb40b8
SHA1ed51c4e50b1de1d20d3ee69f7935b0960770075c
SHA2568487efd5c75483f474d6efb0b4dfc5642bdf0d470404d578c06a3e49caea1703
SHA512294570ff74f903743ebd5e0fde76d5d38fb2213206f3011111778ff756df1b7433f76849ef859087daa0d08ab4dbae411c20a40bffff3d6cad2c040240c3fb54
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exeFilesize
345KB
MD59dddbee74b1056b64b79104d08717b53
SHA110523b5480f9489ce66ab93ee8bfac3913a01628
SHA256f3a931922b50152eb905c304cf0610997f41cab7ca749195e601ee79539efebb
SHA512805139eb7235c042b9807eb3688d4efd02a8476bb276d3db8d805e3817dde4cac225df9cad9362d805f66716c6e882b5b671fb62f572627e8d6f03f3d1e57261
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exeFilesize
345KB
MD59dddbee74b1056b64b79104d08717b53
SHA110523b5480f9489ce66ab93ee8bfac3913a01628
SHA256f3a931922b50152eb905c304cf0610997f41cab7ca749195e601ee79539efebb
SHA512805139eb7235c042b9807eb3688d4efd02a8476bb276d3db8d805e3817dde4cac225df9cad9362d805f66716c6e882b5b671fb62f572627e8d6f03f3d1e57261
-
memory/464-1099-0x0000000006830000-0x0000000006E48000-memory.dmpFilesize
6.1MB
-
memory/464-1102-0x0000000006F80000-0x0000000006FBC000-memory.dmpFilesize
240KB
-
memory/464-1113-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-1112-0x0000000007F30000-0x000000000845C000-memory.dmpFilesize
5.2MB
-
memory/464-1111-0x0000000007D60000-0x0000000007F22000-memory.dmpFilesize
1.8MB
-
memory/464-1110-0x0000000007BF0000-0x0000000007C40000-memory.dmpFilesize
320KB
-
memory/464-1109-0x0000000007B60000-0x0000000007BD6000-memory.dmpFilesize
472KB
-
memory/464-1108-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-1107-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-1106-0x0000000007910000-0x00000000079A2000-memory.dmpFilesize
584KB
-
memory/464-1105-0x0000000007260000-0x00000000072C6000-memory.dmpFilesize
408KB
-
memory/464-1103-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-1101-0x0000000006F60000-0x0000000006F72000-memory.dmpFilesize
72KB
-
memory/464-1100-0x0000000006E50000-0x0000000006F5A000-memory.dmpFilesize
1.0MB
-
memory/464-226-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-224-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-222-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-220-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-218-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-216-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-214-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-212-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-190-0x0000000001B40000-0x0000000001B8B000-memory.dmpFilesize
300KB
-
memory/464-193-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-191-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-192-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-196-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-195-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/464-198-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-200-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-202-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-204-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-206-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-208-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/464-210-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/1028-172-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-185-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1028-170-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-168-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-182-0x0000000000A80000-0x0000000000A90000-memory.dmpFilesize
64KB
-
memory/1028-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1028-180-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-178-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-151-0x0000000004D30000-0x00000000052D4000-memory.dmpFilesize
5.6MB
-
memory/1028-176-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-174-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-153-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-150-0x0000000000A80000-0x0000000000A90000-memory.dmpFilesize
64KB
-
memory/1028-152-0x0000000000A80000-0x0000000000A90000-memory.dmpFilesize
64KB
-
memory/1028-183-0x0000000000A80000-0x0000000000A90000-memory.dmpFilesize
64KB
-
memory/1028-166-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-162-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-164-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-160-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-158-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-156-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-154-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/1028-149-0x0000000000A80000-0x0000000000A90000-memory.dmpFilesize
64KB
-
memory/1028-148-0x0000000000730000-0x000000000075D000-memory.dmpFilesize
180KB
-
memory/5096-1119-0x0000000000CF0000-0x0000000000D22000-memory.dmpFilesize
200KB
-
memory/5096-1120-0x0000000005900000-0x0000000005910000-memory.dmpFilesize
64KB