Analysis
-
max time kernel
93s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:40
Static task
static1
Behavioral task
behavioral1
Sample
f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe
Resource
win10v2004-20230220-en
General
-
Target
f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe
-
Size
689KB
-
MD5
ea0c061b61c9e4b4a027e273dfc894c0
-
SHA1
21ce94017ee4ceb031637ca89342e6b97176d538
-
SHA256
f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf
-
SHA512
ceabc5515072734c595f4e4662fba9370ec8799b8911a7abe4d92c2280ac41a7a1c86a6518e1fe5ef4573a63e50d59d26ad79875151358ba5b97e5cbf3388f02
-
SSDEEP
12288:yMriy90wzkDz5mRVXnrwC1zdRJ+eT4TIiAoUmJ2voFf6figC2sChFQq:ky9zk8D3rwG+eTyDwmJ2Af6agYeFQq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9928.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9928.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4920-187-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-188-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-190-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-192-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-194-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-196-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-198-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-200-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-202-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-204-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-206-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-208-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-210-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-212-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-214-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-217-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-220-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline behavioral1/memory/4920-224-0x00000000038C0000-0x00000000038FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un178691.exepro9928.exequ8476.exesi625359.exepid process 1656 un178691.exe 4000 pro9928.exe 4920 qu8476.exe 4984 si625359.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9928.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9928.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un178691.exef8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un178691.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un178691.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1748 4000 WerFault.exe pro9928.exe 4392 4920 WerFault.exe qu8476.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9928.exequ8476.exesi625359.exepid process 4000 pro9928.exe 4000 pro9928.exe 4920 qu8476.exe 4920 qu8476.exe 4984 si625359.exe 4984 si625359.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9928.exequ8476.exesi625359.exedescription pid process Token: SeDebugPrivilege 4000 pro9928.exe Token: SeDebugPrivilege 4920 qu8476.exe Token: SeDebugPrivilege 4984 si625359.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exeun178691.exedescription pid process target process PID 4516 wrote to memory of 1656 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe un178691.exe PID 4516 wrote to memory of 1656 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe un178691.exe PID 4516 wrote to memory of 1656 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe un178691.exe PID 1656 wrote to memory of 4000 1656 un178691.exe pro9928.exe PID 1656 wrote to memory of 4000 1656 un178691.exe pro9928.exe PID 1656 wrote to memory of 4000 1656 un178691.exe pro9928.exe PID 1656 wrote to memory of 4920 1656 un178691.exe qu8476.exe PID 1656 wrote to memory of 4920 1656 un178691.exe qu8476.exe PID 1656 wrote to memory of 4920 1656 un178691.exe qu8476.exe PID 4516 wrote to memory of 4984 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe si625359.exe PID 4516 wrote to memory of 4984 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe si625359.exe PID 4516 wrote to memory of 4984 4516 f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe si625359.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe"C:\Users\Admin\AppData\Local\Temp\f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 13524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4000 -ip 40001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4920 -ip 49201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exeFilesize
175KB
MD5f4bbcd4e7ba216a55578d8faea3222b1
SHA15ae74c54df15928e528127a6551db3e92c258c37
SHA25630266ac169e161d566256e070f68a0d2b5f7e70f015c25b912d47f9862f621ea
SHA512bafa6920eb55d00c5f7e4447d5715761f7c3c883de62a91ac9e08555ac1d4aa51b428b586c9088adb52535e4a149e1e9388a2e664e0f30162a4c0bbe23bb4b80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exeFilesize
175KB
MD5f4bbcd4e7ba216a55578d8faea3222b1
SHA15ae74c54df15928e528127a6551db3e92c258c37
SHA25630266ac169e161d566256e070f68a0d2b5f7e70f015c25b912d47f9862f621ea
SHA512bafa6920eb55d00c5f7e4447d5715761f7c3c883de62a91ac9e08555ac1d4aa51b428b586c9088adb52535e4a149e1e9388a2e664e0f30162a4c0bbe23bb4b80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exeFilesize
547KB
MD58757e623962d4833dc287499c3306eb0
SHA15bbd8425f27b711731255509ce16ee8cb051af9b
SHA2564baac63354c74dba1dd06bed6b590fab10c02dac411939a98d3a9f156e84d8f3
SHA51252cb481b0615cf62a0413e3025557766fbf333403d189d3f79fb9006b5fa039bce6e118cc442357e3af8d3a060cd66b2e30a7edcc1c4524154286eea9f614759
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exeFilesize
547KB
MD58757e623962d4833dc287499c3306eb0
SHA15bbd8425f27b711731255509ce16ee8cb051af9b
SHA2564baac63354c74dba1dd06bed6b590fab10c02dac411939a98d3a9f156e84d8f3
SHA51252cb481b0615cf62a0413e3025557766fbf333403d189d3f79fb9006b5fa039bce6e118cc442357e3af8d3a060cd66b2e30a7edcc1c4524154286eea9f614759
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exeFilesize
291KB
MD59eb78abfa660661539e854e7514b758b
SHA1c6188bf8d6191f485c06ff7b5ce4321af6c1c22e
SHA256d5c02c9a2e11ea8ab9b81280aeb4589954aba9c520ab1da6d573a46ed177f1bb
SHA5120b8504fe9f729a287f4a0d552c38f8aa0bbc9318f457fadf2dc1552732c194e0a000679b4aabe9ff162c3487277ff9753654b3d0dfeb70b9ec9fb78633dabeae
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exeFilesize
291KB
MD59eb78abfa660661539e854e7514b758b
SHA1c6188bf8d6191f485c06ff7b5ce4321af6c1c22e
SHA256d5c02c9a2e11ea8ab9b81280aeb4589954aba9c520ab1da6d573a46ed177f1bb
SHA5120b8504fe9f729a287f4a0d552c38f8aa0bbc9318f457fadf2dc1552732c194e0a000679b4aabe9ff162c3487277ff9753654b3d0dfeb70b9ec9fb78633dabeae
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exeFilesize
345KB
MD5425c543ec1b95f4457565eaf35a998ee
SHA16caec31a594275652256880e42308b77ef84ac4d
SHA256f3596ceb4236a335013266538d471250399ee27e9c3200509f705a26e5de03d7
SHA512ea4470880b9a1fdf13bebcaae5cec7481197b7dc66a68025f18e9778928151299813cc0166646797a6bbf8e27f73984b51948ae401de201b46e2d033ddb76288
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exeFilesize
345KB
MD5425c543ec1b95f4457565eaf35a998ee
SHA16caec31a594275652256880e42308b77ef84ac4d
SHA256f3596ceb4236a335013266538d471250399ee27e9c3200509f705a26e5de03d7
SHA512ea4470880b9a1fdf13bebcaae5cec7481197b7dc66a68025f18e9778928151299813cc0166646797a6bbf8e27f73984b51948ae401de201b46e2d033ddb76288
-
memory/4000-148-0x0000000004EB0000-0x0000000005454000-memory.dmpFilesize
5.6MB
-
memory/4000-149-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/4000-150-0x0000000004EA0000-0x0000000004EB0000-memory.dmpFilesize
64KB
-
memory/4000-151-0x0000000004EA0000-0x0000000004EB0000-memory.dmpFilesize
64KB
-
memory/4000-152-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-153-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-155-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-157-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-159-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-161-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-163-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-165-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-167-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-169-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-171-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-173-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-175-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-177-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-179-0x0000000002920000-0x0000000002932000-memory.dmpFilesize
72KB
-
memory/4000-180-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4000-182-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/4920-187-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-188-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-190-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-192-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-194-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-196-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-198-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-200-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-202-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-204-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-206-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-208-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-210-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-212-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-214-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-217-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-216-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/4920-218-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-220-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-221-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-223-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-224-0x00000000038C0000-0x00000000038FF000-memory.dmpFilesize
252KB
-
memory/4920-1097-0x0000000006960000-0x0000000006F78000-memory.dmpFilesize
6.1MB
-
memory/4920-1098-0x0000000006F80000-0x000000000708A000-memory.dmpFilesize
1.0MB
-
memory/4920-1099-0x0000000003C00000-0x0000000003C12000-memory.dmpFilesize
72KB
-
memory/4920-1100-0x0000000003D40000-0x0000000003D7C000-memory.dmpFilesize
240KB
-
memory/4920-1101-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-1103-0x0000000007260000-0x00000000072F2000-memory.dmpFilesize
584KB
-
memory/4920-1104-0x0000000007300000-0x0000000007366000-memory.dmpFilesize
408KB
-
memory/4920-1105-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-1106-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-1107-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-1108-0x0000000007A20000-0x0000000007BE2000-memory.dmpFilesize
1.8MB
-
memory/4920-1109-0x0000000007C00000-0x000000000812C000-memory.dmpFilesize
5.2MB
-
memory/4920-1110-0x00000000063A0000-0x00000000063B0000-memory.dmpFilesize
64KB
-
memory/4920-1111-0x00000000085F0000-0x0000000008666000-memory.dmpFilesize
472KB
-
memory/4920-1112-0x0000000008680000-0x00000000086D0000-memory.dmpFilesize
320KB
-
memory/4984-1118-0x0000000000630000-0x0000000000662000-memory.dmpFilesize
200KB
-
memory/4984-1119-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB