Analysis
-
max time kernel
105s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:30
Static task
static1
Behavioral task
behavioral1
Sample
0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe
Resource
win10v2004-20230220-en
General
-
Target
0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe
-
Size
689KB
-
MD5
6326a4ab26d1ae5214db9b27edf6dcdd
-
SHA1
584c7159408a4509a307e8db1a1bad6e9dc2b0aa
-
SHA256
0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6
-
SHA512
63a3be660e9df363fd2ac479f252351550074d3a3d3932f2e7e0f1118b3057528175b91e7cf174f6ab1377746b7d31caa76c08e978bd4232e987e881ab39736d
-
SSDEEP
12288:rMrwy90TjVskFP39k5yEfplpyM65hLucsWMSKI3V5UZszv9FDYfignV0gm19AVRh:nymVl39ksGgTfacsWLZ3V5UKzPDYagWi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5088.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5088.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5088.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/376-188-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-189-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-191-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-193-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-195-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-197-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-199-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-203-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-207-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-209-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-211-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-213-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-215-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-217-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-219-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-221-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-223-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline behavioral1/memory/376-225-0x00000000039C0000-0x00000000039FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un726535.exepro5088.exequ7815.exesi194656.exepid process 4108 un726535.exe 4932 pro5088.exe 376 qu7815.exe 1944 si194656.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5088.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5088.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exeun726535.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un726535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un726535.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4680 4932 WerFault.exe pro5088.exe 2064 376 WerFault.exe qu7815.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5088.exequ7815.exesi194656.exepid process 4932 pro5088.exe 4932 pro5088.exe 376 qu7815.exe 376 qu7815.exe 1944 si194656.exe 1944 si194656.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5088.exequ7815.exesi194656.exedescription pid process Token: SeDebugPrivilege 4932 pro5088.exe Token: SeDebugPrivilege 376 qu7815.exe Token: SeDebugPrivilege 1944 si194656.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exeun726535.exedescription pid process target process PID 2080 wrote to memory of 4108 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe un726535.exe PID 2080 wrote to memory of 4108 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe un726535.exe PID 2080 wrote to memory of 4108 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe un726535.exe PID 4108 wrote to memory of 4932 4108 un726535.exe pro5088.exe PID 4108 wrote to memory of 4932 4108 un726535.exe pro5088.exe PID 4108 wrote to memory of 4932 4108 un726535.exe pro5088.exe PID 4108 wrote to memory of 376 4108 un726535.exe qu7815.exe PID 4108 wrote to memory of 376 4108 un726535.exe qu7815.exe PID 4108 wrote to memory of 376 4108 un726535.exe qu7815.exe PID 2080 wrote to memory of 1944 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe si194656.exe PID 2080 wrote to memory of 1944 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe si194656.exe PID 2080 wrote to memory of 1944 2080 0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe si194656.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe"C:\Users\Admin\AppData\Local\Temp\0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 10284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 20604⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4932 -ip 49321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 376 -ip 3761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exeFilesize
175KB
MD51d063427d05b72670fd9142490189c70
SHA110dc9fbfbc5cb7944e83cd94ed4890904224457a
SHA256863716a0808599989c134c44d48e767ba9cdc27c2d9545c1fe9b444b3bfece2c
SHA51215d9867459c16d762293f9f26478b7e72837e0f90830a493993ca70ca937617fee13253995cda34bcd053d0c0fbb1b72e7acf09d949c0ee9c921c8a9b2b967fe
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exeFilesize
175KB
MD51d063427d05b72670fd9142490189c70
SHA110dc9fbfbc5cb7944e83cd94ed4890904224457a
SHA256863716a0808599989c134c44d48e767ba9cdc27c2d9545c1fe9b444b3bfece2c
SHA51215d9867459c16d762293f9f26478b7e72837e0f90830a493993ca70ca937617fee13253995cda34bcd053d0c0fbb1b72e7acf09d949c0ee9c921c8a9b2b967fe
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exeFilesize
547KB
MD53a38135e840fea89f1e278a067be9ac5
SHA1b96e63edd3dcd3752948d5f2e547e71917062390
SHA25601c253b843ef06cf2b5ca630ed8d8527323402927635e128573c3a7af2bfc193
SHA51297f6d2064f160263f2bc5f83a93278452db58fbf2dbe58bd18fbd03a93117a38061258f7b987ff8a6caa74bc59a48b1facda019c4338ac6de25cd13171381cf7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exeFilesize
547KB
MD53a38135e840fea89f1e278a067be9ac5
SHA1b96e63edd3dcd3752948d5f2e547e71917062390
SHA25601c253b843ef06cf2b5ca630ed8d8527323402927635e128573c3a7af2bfc193
SHA51297f6d2064f160263f2bc5f83a93278452db58fbf2dbe58bd18fbd03a93117a38061258f7b987ff8a6caa74bc59a48b1facda019c4338ac6de25cd13171381cf7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exeFilesize
291KB
MD59e7e25ae3d049607d7342e4d1c789b0e
SHA1b99c98c86f34b111a72e1d7d46acb073a1634430
SHA25664fe455aaa93060c5b83b611816013a281801e945eca40c79fcf70a2c46f0592
SHA5120e97d328f1515c3a2f7248498dc0d8aedf9b78104f0b049bb5cb3eed610a878a98dd15bcc6817adef0b161c7acb6ee3a465249f9f5e674de7f95ad2a8942bf20
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exeFilesize
291KB
MD59e7e25ae3d049607d7342e4d1c789b0e
SHA1b99c98c86f34b111a72e1d7d46acb073a1634430
SHA25664fe455aaa93060c5b83b611816013a281801e945eca40c79fcf70a2c46f0592
SHA5120e97d328f1515c3a2f7248498dc0d8aedf9b78104f0b049bb5cb3eed610a878a98dd15bcc6817adef0b161c7acb6ee3a465249f9f5e674de7f95ad2a8942bf20
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exeFilesize
345KB
MD51a9e85cff2e358a22ee56e02e9d00535
SHA1ef19cf5d0cdf56c1408c9435400a2eed3b4d85df
SHA256dea6b7dc77d0b07d9502334b1297c2c105536ad443d52a2dfec79906d821b76f
SHA512337c6ed7b4d96d1176b230ae2e4825be8ec65c7f1615528d39659b6bbd6c00479992899cfa5821d583bc5396c281de593fec5ff22491f6618b86a66ad5d9eb75
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exeFilesize
345KB
MD51a9e85cff2e358a22ee56e02e9d00535
SHA1ef19cf5d0cdf56c1408c9435400a2eed3b4d85df
SHA256dea6b7dc77d0b07d9502334b1297c2c105536ad443d52a2dfec79906d821b76f
SHA512337c6ed7b4d96d1176b230ae2e4825be8ec65c7f1615528d39659b6bbd6c00479992899cfa5821d583bc5396c281de593fec5ff22491f6618b86a66ad5d9eb75
-
memory/376-1099-0x0000000006D60000-0x0000000006E6A000-memory.dmpFilesize
1.0MB
-
memory/376-1102-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-1113-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-1112-0x0000000007DE0000-0x000000000830C000-memory.dmpFilesize
5.2MB
-
memory/376-1111-0x0000000007C10000-0x0000000007DD2000-memory.dmpFilesize
1.8MB
-
memory/376-1110-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-1109-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-1108-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-1106-0x0000000007B90000-0x0000000007BE0000-memory.dmpFilesize
320KB
-
memory/376-1105-0x0000000007B00000-0x0000000007B76000-memory.dmpFilesize
472KB
-
memory/376-1104-0x00000000071C0000-0x0000000007226000-memory.dmpFilesize
408KB
-
memory/376-1103-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/376-1101-0x0000000006140000-0x000000000617C000-memory.dmpFilesize
240KB
-
memory/376-1100-0x0000000006120000-0x0000000006132000-memory.dmpFilesize
72KB
-
memory/376-1098-0x0000000006740000-0x0000000006D58000-memory.dmpFilesize
6.1MB
-
memory/376-225-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-223-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-221-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-219-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-217-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-188-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-189-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-191-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-193-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-195-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-197-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-200-0x0000000001B10000-0x0000000001B5B000-memory.dmpFilesize
300KB
-
memory/376-199-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-202-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-206-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-204-0x0000000006180000-0x0000000006190000-memory.dmpFilesize
64KB
-
memory/376-203-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-207-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-209-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-211-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-213-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/376-215-0x00000000039C0000-0x00000000039FF000-memory.dmpFilesize
252KB
-
memory/1944-1119-0x0000000000510000-0x0000000000542000-memory.dmpFilesize
200KB
-
memory/1944-1120-0x0000000004DB0000-0x0000000004DC0000-memory.dmpFilesize
64KB
-
memory/4932-169-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-180-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4932-167-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-179-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-150-0x0000000004DE0000-0x0000000004DF0000-memory.dmpFilesize
64KB
-
memory/4932-177-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-175-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-153-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-165-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-171-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-152-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-181-0x0000000004DE0000-0x0000000004DF0000-memory.dmpFilesize
64KB
-
memory/4932-173-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-163-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-161-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-159-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-157-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-155-0x00000000027A0000-0x00000000027B2000-memory.dmpFilesize
72KB
-
memory/4932-149-0x0000000000740000-0x000000000076D000-memory.dmpFilesize
180KB
-
memory/4932-148-0x0000000004DF0000-0x0000000005394000-memory.dmpFilesize
5.6MB
-
memory/4932-183-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4932-151-0x0000000004DE0000-0x0000000004DF0000-memory.dmpFilesize
64KB