Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:38
Static task
static1
Behavioral task
behavioral1
Sample
a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe
Resource
win10v2004-20230220-en
General
-
Target
a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe
-
Size
690KB
-
MD5
a37e5b2b2ae7b4de54094367c7b981a2
-
SHA1
b8cbf8023d8f94700794d51d91ec022995fea4b4
-
SHA256
a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66
-
SHA512
21ebfb1428cc64ea4c1141110f52a072f89a1a4e55918cae8f9d31fef4211e8b4f486c3c1fcfc9535577584f637cc671802cdf19542a51edbe5dd00635645bbb
-
SSDEEP
12288:IMrKy90HIwB7e3mFDwJWhyR65hLuzI8omwIjLvmFqBfigs0KmSOH7qg:iy6c4DQWI8fazI/mwIXyqBagSOHp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0383.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0383.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-190-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-191-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-193-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-195-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-197-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-199-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-201-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-203-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-205-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-207-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-209-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-211-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-213-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-215-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-217-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-219-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-221-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-223-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1636-1108-0x0000000006090000-0x00000000060A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un091517.exepro0383.exequ6579.exesi416999.exepid process 4276 un091517.exe 1720 pro0383.exe 1636 qu6579.exe 4428 si416999.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0383.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0383.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un091517.exea3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un091517.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un091517.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5020 1720 WerFault.exe pro0383.exe 4304 1636 WerFault.exe qu6579.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0383.exequ6579.exesi416999.exepid process 1720 pro0383.exe 1720 pro0383.exe 1636 qu6579.exe 1636 qu6579.exe 4428 si416999.exe 4428 si416999.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0383.exequ6579.exesi416999.exedescription pid process Token: SeDebugPrivilege 1720 pro0383.exe Token: SeDebugPrivilege 1636 qu6579.exe Token: SeDebugPrivilege 4428 si416999.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exeun091517.exedescription pid process target process PID 4784 wrote to memory of 4276 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe un091517.exe PID 4784 wrote to memory of 4276 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe un091517.exe PID 4784 wrote to memory of 4276 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe un091517.exe PID 4276 wrote to memory of 1720 4276 un091517.exe pro0383.exe PID 4276 wrote to memory of 1720 4276 un091517.exe pro0383.exe PID 4276 wrote to memory of 1720 4276 un091517.exe pro0383.exe PID 4276 wrote to memory of 1636 4276 un091517.exe qu6579.exe PID 4276 wrote to memory of 1636 4276 un091517.exe qu6579.exe PID 4276 wrote to memory of 1636 4276 un091517.exe qu6579.exe PID 4784 wrote to memory of 4428 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe si416999.exe PID 4784 wrote to memory of 4428 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe si416999.exe PID 4784 wrote to memory of 4428 4784 a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe si416999.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe"C:\Users\Admin\AppData\Local\Temp\a3e595db04ab371ea5fc8ca2c7c3df2598f3596428523cf09b40df58523a6b66.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091517.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0383.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6579.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 9684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416999.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416999.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1720 -ip 17201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1636 -ip 16361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416999.exeFilesize
175KB
MD59713d69a1fa82afaf064d93ca4f957fd
SHA19519cd69acb9f1def9d52039d2d2e268b03d289c
SHA25621b2d17564484187775f78e81c47b4881e286212674b218cf0bc408c3c98b34b
SHA512d21266d2c4dfa225be2337c9771a848fc45b87c3d642305080379861fc28922ebd18ba7404a564676aee12775d7bdc320a89c717762b902da139165d6f120bd3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416999.exeFilesize
175KB
MD59713d69a1fa82afaf064d93ca4f957fd
SHA19519cd69acb9f1def9d52039d2d2e268b03d289c
SHA25621b2d17564484187775f78e81c47b4881e286212674b218cf0bc408c3c98b34b
SHA512d21266d2c4dfa225be2337c9771a848fc45b87c3d642305080379861fc28922ebd18ba7404a564676aee12775d7bdc320a89c717762b902da139165d6f120bd3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091517.exeFilesize
548KB
MD5329f9e983e049e1feda512cd4532f588
SHA16810b3dd229ee29602fa6dfcd601a96173da61a9
SHA256696fbbf717e46a448dbcbc6e5600ae4b42b99c6832034934ba7f75b9a8ac7de2
SHA512defb948856f41d26c107a63aa9840aa0012e7cd32a72acfa839db5d3a038d0fcd764e7a031898a5fadf718c69ac39213a6a4e243770fc20a9fa39901082652ca
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091517.exeFilesize
548KB
MD5329f9e983e049e1feda512cd4532f588
SHA16810b3dd229ee29602fa6dfcd601a96173da61a9
SHA256696fbbf717e46a448dbcbc6e5600ae4b42b99c6832034934ba7f75b9a8ac7de2
SHA512defb948856f41d26c107a63aa9840aa0012e7cd32a72acfa839db5d3a038d0fcd764e7a031898a5fadf718c69ac39213a6a4e243770fc20a9fa39901082652ca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0383.exeFilesize
291KB
MD5712d0f3cd51610d709b771cb17597a24
SHA18c826785c0f9c4329c54ac27d3f7c63edd4822d1
SHA256163f18cc0248f048aacc0649ac58fceb2356aeac47a457ab24d8bd6330d3ec53
SHA5127687272731a14b7e627f58375d7ae9504f3159560ba11001975443d280825f305fbc2ddbbfbc775ceb9c1faee83a237c8c8ff17620e118549480bd41804d3541
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0383.exeFilesize
291KB
MD5712d0f3cd51610d709b771cb17597a24
SHA18c826785c0f9c4329c54ac27d3f7c63edd4822d1
SHA256163f18cc0248f048aacc0649ac58fceb2356aeac47a457ab24d8bd6330d3ec53
SHA5127687272731a14b7e627f58375d7ae9504f3159560ba11001975443d280825f305fbc2ddbbfbc775ceb9c1faee83a237c8c8ff17620e118549480bd41804d3541
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6579.exeFilesize
345KB
MD5868746fbddbaab7a7cf151aeeedac8fe
SHA16b03e9cd2bbe513c3abc6a7d345caad7ed11d9e9
SHA25679c40e9081b9fccdd10612cd60e79c0b8ac3d58a6660213b16abda7caa98483c
SHA512812783f4fd14f28b34f31d40d6954293ccb8a23bf1fc6ec45237c8d5c9f906a6bcb2f8c0831b2abc87eaca6114691479038df43492054b6128433b13c012ecbd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6579.exeFilesize
345KB
MD5868746fbddbaab7a7cf151aeeedac8fe
SHA16b03e9cd2bbe513c3abc6a7d345caad7ed11d9e9
SHA25679c40e9081b9fccdd10612cd60e79c0b8ac3d58a6660213b16abda7caa98483c
SHA512812783f4fd14f28b34f31d40d6954293ccb8a23bf1fc6ec45237c8d5c9f906a6bcb2f8c0831b2abc87eaca6114691479038df43492054b6128433b13c012ecbd
-
memory/1636-311-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1102-0x0000000006E10000-0x0000000006E22000-memory.dmpFilesize
72KB
-
memory/1636-1115-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1114-0x0000000007CE0000-0x000000000820C000-memory.dmpFilesize
5.2MB
-
memory/1636-1113-0x0000000007B10000-0x0000000007CD2000-memory.dmpFilesize
1.8MB
-
memory/1636-1112-0x0000000007AB0000-0x0000000007B00000-memory.dmpFilesize
320KB
-
memory/1636-1111-0x0000000007A20000-0x0000000007A96000-memory.dmpFilesize
472KB
-
memory/1636-1110-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1109-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1108-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1107-0x00000000071C0000-0x0000000007226000-memory.dmpFilesize
408KB
-
memory/1636-1106-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/1636-1104-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmpFilesize
240KB
-
memory/1636-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmpFilesize
1.0MB
-
memory/1636-1100-0x0000000006650000-0x0000000006C68000-memory.dmpFilesize
6.1MB
-
memory/1636-309-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-307-0x0000000006090000-0x00000000060A0000-memory.dmpFilesize
64KB
-
memory/1636-306-0x0000000001B50000-0x0000000001B9B000-memory.dmpFilesize
300KB
-
memory/1636-223-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-221-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-219-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-190-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-191-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-193-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-195-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-197-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-199-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-201-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-203-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-205-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-207-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-209-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-211-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-213-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-215-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1636-217-0x0000000005FD0000-0x000000000600F000-memory.dmpFilesize
252KB
-
memory/1720-175-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-185-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1720-173-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-171-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-183-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/1720-182-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/1720-151-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-180-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1720-179-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/1720-155-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-178-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/1720-177-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-150-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-153-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-184-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/1720-169-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-167-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-165-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-163-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-161-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-159-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-157-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/1720-149-0x0000000004E50000-0x00000000053F4000-memory.dmpFilesize
5.6MB
-
memory/1720-148-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/4428-1121-0x00000000004C0000-0x00000000004F2000-memory.dmpFilesize
200KB
-
memory/4428-1122-0x0000000005060000-0x0000000005070000-memory.dmpFilesize
64KB