Analysis
-
max time kernel
100s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:37
Static task
static1
Behavioral task
behavioral1
Sample
d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe
Resource
win10v2004-20230220-en
General
-
Target
d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe
-
Size
689KB
-
MD5
974ac9d56af9e114dde49fff890e84c1
-
SHA1
19d2467658c310fc8e2921da120bb69ba1c833e0
-
SHA256
d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706
-
SHA512
ed0eb072f33a0b3a22ab1606e1e970cd35edb9af4d4a2575e94584cd4ddc1e80a355bac409661808f923db4f60cde43cf7e729f3b488045711906ee7b0ed8d55
-
SSDEEP
12288:eMrWy905HpHiObYlBBsto82wyl65hLu1N49g+DT4Tid2CTWPKHAybmJ+vrFwlfim:EyYY4YlBqa8C4fah+DTykWPhAmJ+BwlR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0894.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0894.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0894.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4056-194-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-195-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-197-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-199-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-201-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-203-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-205-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-207-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-209-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-211-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-213-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-215-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-217-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-219-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-221-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-223-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-225-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-227-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/4056-582-0x00000000060F0000-0x0000000006100000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un555506.exepro0894.exequ3724.exesi515428.exepid process 2044 un555506.exe 5112 pro0894.exe 4056 qu3724.exe 4296 si515428.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0894.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0894.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un555506.exed270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un555506.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un555506.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1148 5112 WerFault.exe pro0894.exe 3516 4056 WerFault.exe qu3724.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0894.exequ3724.exesi515428.exepid process 5112 pro0894.exe 5112 pro0894.exe 4056 qu3724.exe 4056 qu3724.exe 4296 si515428.exe 4296 si515428.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0894.exequ3724.exesi515428.exedescription pid process Token: SeDebugPrivilege 5112 pro0894.exe Token: SeDebugPrivilege 4056 qu3724.exe Token: SeDebugPrivilege 4296 si515428.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exeun555506.exedescription pid process target process PID 3964 wrote to memory of 2044 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe un555506.exe PID 3964 wrote to memory of 2044 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe un555506.exe PID 3964 wrote to memory of 2044 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe un555506.exe PID 2044 wrote to memory of 5112 2044 un555506.exe pro0894.exe PID 2044 wrote to memory of 5112 2044 un555506.exe pro0894.exe PID 2044 wrote to memory of 5112 2044 un555506.exe pro0894.exe PID 2044 wrote to memory of 4056 2044 un555506.exe qu3724.exe PID 2044 wrote to memory of 4056 2044 un555506.exe qu3724.exe PID 2044 wrote to memory of 4056 2044 un555506.exe qu3724.exe PID 3964 wrote to memory of 4296 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe si515428.exe PID 3964 wrote to memory of 4296 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe si515428.exe PID 3964 wrote to memory of 4296 3964 d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe si515428.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe"C:\Users\Admin\AppData\Local\Temp\d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 16764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5112 -ip 51121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4056 -ip 40561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exeFilesize
175KB
MD585d429e15b7491ace8bcf421b5de3182
SHA12170f168a7bd96b9ad9d02fd13c3119dd3771a80
SHA2563b40139c5c9f70fe1d0a122424a437ae6c043c37bfe599e5af8e90fe218089e7
SHA512afb108bd2c79618f73c6c05a31a90bc1597ecde410f5d9162ed2bab53fdea02b923af56b8711fadb6c3a35a9591d2d0b9683c07093cf04251be2869ef3a61573
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exeFilesize
175KB
MD585d429e15b7491ace8bcf421b5de3182
SHA12170f168a7bd96b9ad9d02fd13c3119dd3771a80
SHA2563b40139c5c9f70fe1d0a122424a437ae6c043c37bfe599e5af8e90fe218089e7
SHA512afb108bd2c79618f73c6c05a31a90bc1597ecde410f5d9162ed2bab53fdea02b923af56b8711fadb6c3a35a9591d2d0b9683c07093cf04251be2869ef3a61573
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exeFilesize
547KB
MD5e6cb8e01f88c9af4c574a989e734d574
SHA1f355b3089318f7b863be3822330c4665e1b4d404
SHA256b562629e7c78abfaf80a8fd4c34db558d714f761e543ec4150a4b744d6799a5c
SHA51283da765e47de90db6b773f28c7d040c80384a9c24a9d45f2a1763430eab354456ffda2b341cf34f035918d7dabc8d54f089c9fd0b0320ea8f0c7aad3ecb46456
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exeFilesize
547KB
MD5e6cb8e01f88c9af4c574a989e734d574
SHA1f355b3089318f7b863be3822330c4665e1b4d404
SHA256b562629e7c78abfaf80a8fd4c34db558d714f761e543ec4150a4b744d6799a5c
SHA51283da765e47de90db6b773f28c7d040c80384a9c24a9d45f2a1763430eab354456ffda2b341cf34f035918d7dabc8d54f089c9fd0b0320ea8f0c7aad3ecb46456
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exeFilesize
291KB
MD574d032b6295d42ee3a7ccfe2e2aa6728
SHA183cb9bdd0698aa4294434e639d3b4b1e62c3ce20
SHA2566cb50dbc4e53ea377d9859f5caffd6764e974f669ee396aec6b6edf4385b5471
SHA512cfb6fb150d5c9f33343a20446ce896131030f35e22050bd2afa9de820d40fc5efdc064e3a392609248f694332fd216efef960dd2e1388f150c11d818e6b1e302
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exeFilesize
291KB
MD574d032b6295d42ee3a7ccfe2e2aa6728
SHA183cb9bdd0698aa4294434e639d3b4b1e62c3ce20
SHA2566cb50dbc4e53ea377d9859f5caffd6764e974f669ee396aec6b6edf4385b5471
SHA512cfb6fb150d5c9f33343a20446ce896131030f35e22050bd2afa9de820d40fc5efdc064e3a392609248f694332fd216efef960dd2e1388f150c11d818e6b1e302
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exeFilesize
345KB
MD57244e0fd6c75d541e214eccdee78b5d5
SHA1a75b7e3b289a18775c993d07831ebd0a28b40d73
SHA25611fc5fc8c279e0f5997f610537665987aec9c2459343efffc0f897d91e57262a
SHA512c5020251c8741e8ae7f2cd9f844c0be1efca0ed34a9af63113c700e5880cbe5edaacf790c0c91b1cb0f0149721a0bd14bf46534a6c1ae97460eab73e598343b7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exeFilesize
345KB
MD57244e0fd6c75d541e214eccdee78b5d5
SHA1a75b7e3b289a18775c993d07831ebd0a28b40d73
SHA25611fc5fc8c279e0f5997f610537665987aec9c2459343efffc0f897d91e57262a
SHA512c5020251c8741e8ae7f2cd9f844c0be1efca0ed34a9af63113c700e5880cbe5edaacf790c0c91b1cb0f0149721a0bd14bf46534a6c1ae97460eab73e598343b7
-
memory/4056-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmpFilesize
1.0MB
-
memory/4056-1103-0x0000000006F50000-0x0000000006F62000-memory.dmpFilesize
72KB
-
memory/4056-219-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-217-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-215-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-205-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-1116-0x0000000008880000-0x00000000088D0000-memory.dmpFilesize
320KB
-
memory/4056-1115-0x00000000087E0000-0x0000000008856000-memory.dmpFilesize
472KB
-
memory/4056-1114-0x0000000007F90000-0x00000000084BC000-memory.dmpFilesize
5.2MB
-
memory/4056-1113-0x0000000007DC0000-0x0000000007F82000-memory.dmpFilesize
1.8MB
-
memory/4056-1112-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-1111-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-1110-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-207-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-1109-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-1107-0x0000000007930000-0x00000000079C2000-memory.dmpFilesize
584KB
-
memory/4056-1106-0x0000000007260000-0x00000000072C6000-memory.dmpFilesize
408KB
-
memory/4056-1105-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmpFilesize
240KB
-
memory/4056-221-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-1101-0x00000000067B0000-0x0000000006DC8000-memory.dmpFilesize
6.1MB
-
memory/4056-582-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-227-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-191-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/4056-192-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-209-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-194-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-195-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-197-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-199-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-201-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-203-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-225-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-223-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-193-0x00000000060F0000-0x0000000006100000-memory.dmpFilesize
64KB
-
memory/4056-211-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4056-213-0x0000000005FE0000-0x000000000601F000-memory.dmpFilesize
252KB
-
memory/4296-1122-0x0000000000A20000-0x0000000000A52000-memory.dmpFilesize
200KB
-
memory/4296-1123-0x00000000055D0000-0x00000000055E0000-memory.dmpFilesize
64KB
-
memory/4296-1124-0x00000000055D0000-0x00000000055E0000-memory.dmpFilesize
64KB
-
memory/5112-182-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-176-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-160-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-151-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-152-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/5112-150-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-184-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-183-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/5112-153-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/5112-180-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-178-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-174-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-172-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-170-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-168-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-166-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-164-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-162-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-149-0x0000000000920000-0x000000000094D000-memory.dmpFilesize
180KB
-
memory/5112-148-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/5112-158-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-156-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB
-
memory/5112-154-0x0000000005230000-0x0000000005242000-memory.dmpFilesize
72KB