Analysis
-
max time kernel
85s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:12
Static task
static1
Behavioral task
behavioral1
Sample
1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe
Resource
win10v2004-20230221-en
General
-
Target
1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe
-
Size
690KB
-
MD5
b07f7b60de650e740dbc5221c2d17898
-
SHA1
afab5ef2955746d10d6d4490a608988cb8504db1
-
SHA256
1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad
-
SHA512
826a84cbc74b8cca36e70a800777278c3f91ad34856ac84decbf25a11ce7266a477c81186655715c1db8380f76477ed64f142e7ab52268e519bb42e6b3196b40
-
SSDEEP
12288:YMr3y90kSJshdX8KbqlWsG7oiyc65hLuZt+cMCpdBN2T0R6v3FKjfig/tDnjsm:fySshdMK2nvDfaZt+c5NUtKjaglDgm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4219.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4219.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4219.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5068-191-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-194-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-192-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-198-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-196-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-200-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-202-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-204-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-206-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-208-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-210-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-212-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-214-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-216-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-218-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-220-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-222-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline behavioral1/memory/5068-224-0x0000000003BF0000-0x0000000003C2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un384239.exepro4219.exequ4471.exesi041577.exepid process 2108 un384239.exe 3568 pro4219.exe 5068 qu4471.exe 5080 si041577.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4219.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4219.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exeun384239.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un384239.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un384239.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 696 3568 WerFault.exe pro4219.exe 1340 5068 WerFault.exe qu4471.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4219.exequ4471.exesi041577.exepid process 3568 pro4219.exe 3568 pro4219.exe 5068 qu4471.exe 5068 qu4471.exe 5080 si041577.exe 5080 si041577.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4219.exequ4471.exesi041577.exedescription pid process Token: SeDebugPrivilege 3568 pro4219.exe Token: SeDebugPrivilege 5068 qu4471.exe Token: SeDebugPrivilege 5080 si041577.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exeun384239.exedescription pid process target process PID 3644 wrote to memory of 2108 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe un384239.exe PID 3644 wrote to memory of 2108 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe un384239.exe PID 3644 wrote to memory of 2108 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe un384239.exe PID 2108 wrote to memory of 3568 2108 un384239.exe pro4219.exe PID 2108 wrote to memory of 3568 2108 un384239.exe pro4219.exe PID 2108 wrote to memory of 3568 2108 un384239.exe pro4219.exe PID 2108 wrote to memory of 5068 2108 un384239.exe qu4471.exe PID 2108 wrote to memory of 5068 2108 un384239.exe qu4471.exe PID 2108 wrote to memory of 5068 2108 un384239.exe qu4471.exe PID 3644 wrote to memory of 5080 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe si041577.exe PID 3644 wrote to memory of 5080 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe si041577.exe PID 3644 wrote to memory of 5080 3644 1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe si041577.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe"C:\Users\Admin\AppData\Local\Temp\1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 10764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 13604⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3568 -ip 35681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5068 -ip 50681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exeFilesize
175KB
MD5da2b7b0db6dc9085ea2a84b639d791a9
SHA1834f03727d4e4d2a602a3aab74f628efc6175250
SHA2563270f7cdb9eb824ad69da3c418215536f180fa492fc2c9637de5193083512e1b
SHA5121827a704a4baa56b9fe134722f98360c379505f786a2db87bf487329031b544cef9300e9fe9c6fa9d66f5c5ff827dd0f02e4eb58fa25a333117bde7791899608
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exeFilesize
175KB
MD5da2b7b0db6dc9085ea2a84b639d791a9
SHA1834f03727d4e4d2a602a3aab74f628efc6175250
SHA2563270f7cdb9eb824ad69da3c418215536f180fa492fc2c9637de5193083512e1b
SHA5121827a704a4baa56b9fe134722f98360c379505f786a2db87bf487329031b544cef9300e9fe9c6fa9d66f5c5ff827dd0f02e4eb58fa25a333117bde7791899608
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exeFilesize
548KB
MD5cd6dfc95879a33205d92fcad4c28992c
SHA10b645ccf7fe4dbc7246c0be8cfa466eca8f52371
SHA256d906f96b716c57a0e7dd61a50ad2624f589af368e6c0daa67bd933f9ab454071
SHA512916de145e605fe452ace171aa718261510f8eb7587d6f2351604b7d79550c752ba8b9a899332d1c37083ee1100fbaecb0d37db6f7d68931238c28b9747a703f7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exeFilesize
548KB
MD5cd6dfc95879a33205d92fcad4c28992c
SHA10b645ccf7fe4dbc7246c0be8cfa466eca8f52371
SHA256d906f96b716c57a0e7dd61a50ad2624f589af368e6c0daa67bd933f9ab454071
SHA512916de145e605fe452ace171aa718261510f8eb7587d6f2351604b7d79550c752ba8b9a899332d1c37083ee1100fbaecb0d37db6f7d68931238c28b9747a703f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exeFilesize
291KB
MD5227582bca21a9876d68a904167de9b40
SHA19de04e94f2b4d47671c87223219f60d12c202882
SHA256dd6d04e2ad36b598c6932c1f1bf9227d5b0dfd0c1e7dba5fed17f5b1dc7d1ef5
SHA5127b54d01103bdf342a5dbd489d653f87bdb2b26907ae5e31383e659ca1f65f2d6271f18001f3d4b498bd19e71aa9fcbc634b1f9b6dcfc61340c606757e8fe40d3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exeFilesize
291KB
MD5227582bca21a9876d68a904167de9b40
SHA19de04e94f2b4d47671c87223219f60d12c202882
SHA256dd6d04e2ad36b598c6932c1f1bf9227d5b0dfd0c1e7dba5fed17f5b1dc7d1ef5
SHA5127b54d01103bdf342a5dbd489d653f87bdb2b26907ae5e31383e659ca1f65f2d6271f18001f3d4b498bd19e71aa9fcbc634b1f9b6dcfc61340c606757e8fe40d3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exeFilesize
345KB
MD5488bb9a3c2b76129a7c6eafa8eb40255
SHA1d7ff3c186c8d580d43467a7a9639d7365ade1b35
SHA2562f9478a6aa727c689e1d6802b79f64e00dfdb5f31ccf56d9e1a672a0c68492c1
SHA51236b5cfa457b3dba51e3ca7db454c18fc4dc8f4a851a6d619e035a57107655360b3a6f48b1fb3902daab5c8599a6943bc55fb85f1ba3d59d7a6240cce6fdbeda6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exeFilesize
345KB
MD5488bb9a3c2b76129a7c6eafa8eb40255
SHA1d7ff3c186c8d580d43467a7a9639d7365ade1b35
SHA2562f9478a6aa727c689e1d6802b79f64e00dfdb5f31ccf56d9e1a672a0c68492c1
SHA51236b5cfa457b3dba51e3ca7db454c18fc4dc8f4a851a6d619e035a57107655360b3a6f48b1fb3902daab5c8599a6943bc55fb85f1ba3d59d7a6240cce6fdbeda6
-
memory/3568-148-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/3568-149-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-150-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-153-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-156-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-155-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-152-0x0000000000800000-0x000000000082D000-memory.dmpFilesize
180KB
-
memory/3568-157-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-159-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-160-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-162-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-164-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-166-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-168-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-170-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-172-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-174-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-176-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-178-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-180-0x0000000002310000-0x0000000002322000-memory.dmpFilesize
72KB
-
memory/3568-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/3568-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmpFilesize
64KB
-
memory/3568-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/5068-191-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-194-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-192-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-198-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-196-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-200-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-202-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-204-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-206-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-208-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-210-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-212-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-214-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-216-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-218-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-220-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-222-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-224-0x0000000003BF0000-0x0000000003C2F000-memory.dmpFilesize
252KB
-
memory/5068-228-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-227-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/5068-231-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-234-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-1101-0x0000000006670000-0x0000000006C88000-memory.dmpFilesize
6.1MB
-
memory/5068-1102-0x0000000006CD0000-0x0000000006DDA000-memory.dmpFilesize
1.0MB
-
memory/5068-1103-0x0000000006E10000-0x0000000006E22000-memory.dmpFilesize
72KB
-
memory/5068-1104-0x0000000006E30000-0x0000000006E6C000-memory.dmpFilesize
240KB
-
memory/5068-1105-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-1106-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/5068-1107-0x00000000071C0000-0x0000000007226000-memory.dmpFilesize
408KB
-
memory/5068-1109-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-1110-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-1111-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5068-1112-0x00000000079C0000-0x0000000007A36000-memory.dmpFilesize
472KB
-
memory/5068-1113-0x0000000007A50000-0x0000000007AA0000-memory.dmpFilesize
320KB
-
memory/5068-1114-0x0000000007C10000-0x0000000007DD2000-memory.dmpFilesize
1.8MB
-
memory/5068-1115-0x0000000007DE0000-0x000000000830C000-memory.dmpFilesize
5.2MB
-
memory/5068-1116-0x0000000003960000-0x0000000003970000-memory.dmpFilesize
64KB
-
memory/5080-1122-0x00000000002F0000-0x0000000000322000-memory.dmpFilesize
200KB
-
memory/5080-1123-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/5080-1124-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB