Analysis
-
max time kernel
88s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:40
Static task
static1
Behavioral task
behavioral1
Sample
cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe
Resource
win10v2004-20230221-en
General
-
Target
cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe
-
Size
690KB
-
MD5
fa0c5a64a03ef726216059416256bb51
-
SHA1
61a2ee2702835a4f22232e8e3ed066d16c0bc268
-
SHA256
cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e
-
SHA512
c5e3e25c02fb65ca6f4c70c82a60e2c72863ed395fca6a8a6caba1c40a6c8e7d50b7be987a73e9b932b8f26d5a5c610ea334feb3c36e01c13191977d27531529
-
SSDEEP
12288:JMrCy90sMEZTVnQk8Xyb65hLuoK3duSbYUKZDBwiR0GvBFIhfigk78d/KR7T:/ybTiviGfaoKNuKY3ZL/zIhagS9Rf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1986.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1986.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/460-191-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-192-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-194-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-196-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-198-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-200-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-204-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-208-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-210-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-212-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-214-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-216-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-218-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-220-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-222-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-224-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-226-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/460-228-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un069688.exepro1986.exequ2095.exesi512702.exepid process 644 un069688.exe 1524 pro1986.exe 460 qu2095.exe 2364 si512702.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1986.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1986.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exeun069688.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un069688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un069688.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1092 1524 WerFault.exe pro1986.exe 1696 460 WerFault.exe qu2095.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1986.exequ2095.exesi512702.exepid process 1524 pro1986.exe 1524 pro1986.exe 460 qu2095.exe 460 qu2095.exe 2364 si512702.exe 2364 si512702.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1986.exequ2095.exesi512702.exedescription pid process Token: SeDebugPrivilege 1524 pro1986.exe Token: SeDebugPrivilege 460 qu2095.exe Token: SeDebugPrivilege 2364 si512702.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exeun069688.exedescription pid process target process PID 1052 wrote to memory of 644 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe un069688.exe PID 1052 wrote to memory of 644 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe un069688.exe PID 1052 wrote to memory of 644 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe un069688.exe PID 644 wrote to memory of 1524 644 un069688.exe pro1986.exe PID 644 wrote to memory of 1524 644 un069688.exe pro1986.exe PID 644 wrote to memory of 1524 644 un069688.exe pro1986.exe PID 644 wrote to memory of 460 644 un069688.exe qu2095.exe PID 644 wrote to memory of 460 644 un069688.exe qu2095.exe PID 644 wrote to memory of 460 644 un069688.exe qu2095.exe PID 1052 wrote to memory of 2364 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe si512702.exe PID 1052 wrote to memory of 2364 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe si512702.exe PID 1052 wrote to memory of 2364 1052 cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe si512702.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe"C:\Users\Admin\AppData\Local\Temp\cec4430c523fd2c3e781b8390dfa866605b44e0c3f0ace4f50e194a37d51e35e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1986.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2095.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si512702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si512702.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1524 -ip 15241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 460 -ip 4601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si512702.exeFilesize
175KB
MD5d81cc0af2258c5ff5a895049293a597f
SHA1b2173b108ea4974e1e8d95b998bc253df91430ba
SHA25645ed32c82fbc2900e7d0a39798698e970e1de38c8f05a51850fb7c81a8e7a0ef
SHA51213905aa022ebad0a89d933c02d27f99d90c6835fdaf86922b29b9cb4b0b8f152858131b6c63f5d3890b65ea7603848e13bd3c2bb7a3b1bb766b545eb359215c4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si512702.exeFilesize
175KB
MD5d81cc0af2258c5ff5a895049293a597f
SHA1b2173b108ea4974e1e8d95b998bc253df91430ba
SHA25645ed32c82fbc2900e7d0a39798698e970e1de38c8f05a51850fb7c81a8e7a0ef
SHA51213905aa022ebad0a89d933c02d27f99d90c6835fdaf86922b29b9cb4b0b8f152858131b6c63f5d3890b65ea7603848e13bd3c2bb7a3b1bb766b545eb359215c4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069688.exeFilesize
548KB
MD525fef289e4083765ec3571aa63614016
SHA110df37aee3e299996b4ac007116bc77f93e7f48d
SHA256fe760d68368ecd6b731e35803b960da35e5032689d7f52712999958eda19990b
SHA51217528b517d99fca9d96b1dcaa0d63a3a96584fdc651ab8421e5ab19fb1994420a6c01051722bd1d34ea4f28804cd078d7a990623b97bc645a61232f41e26fa3d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069688.exeFilesize
548KB
MD525fef289e4083765ec3571aa63614016
SHA110df37aee3e299996b4ac007116bc77f93e7f48d
SHA256fe760d68368ecd6b731e35803b960da35e5032689d7f52712999958eda19990b
SHA51217528b517d99fca9d96b1dcaa0d63a3a96584fdc651ab8421e5ab19fb1994420a6c01051722bd1d34ea4f28804cd078d7a990623b97bc645a61232f41e26fa3d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1986.exeFilesize
291KB
MD51308dd889bf4142e1785a0d5d979830f
SHA1419393b7dafa8b7e5209f7d129dc20eeda4d8c91
SHA2566d8787bed3b0bd3de7d896cd63fa749415d1687f1d25f9cb6cf1cd24ced63746
SHA512137909f988a4ae31861bb9cfa83d3804335737575413721566d0daeccc8fc0445b7cf3cc038479b8c54f9267a6f393126effc704bfc9afa35502ae189fc333ea
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1986.exeFilesize
291KB
MD51308dd889bf4142e1785a0d5d979830f
SHA1419393b7dafa8b7e5209f7d129dc20eeda4d8c91
SHA2566d8787bed3b0bd3de7d896cd63fa749415d1687f1d25f9cb6cf1cd24ced63746
SHA512137909f988a4ae31861bb9cfa83d3804335737575413721566d0daeccc8fc0445b7cf3cc038479b8c54f9267a6f393126effc704bfc9afa35502ae189fc333ea
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2095.exeFilesize
345KB
MD5b38bd5949f5046a8d513572c7ccf369e
SHA1c0af01754467f36d2a78410737e137ce9667198a
SHA2568952e25f4c507ac7f9faebf5d767786e597375d9a252be2d5b6ec8d635988760
SHA512ebff15f9e9f7e52ee3121a604812672b047b67eac265c8fdf9000277bf6286ce6c6e0f4b816c42b0f042dbb46341ed7dc1d287f0db73eabd52d00c9a187c8f82
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2095.exeFilesize
345KB
MD5b38bd5949f5046a8d513572c7ccf369e
SHA1c0af01754467f36d2a78410737e137ce9667198a
SHA2568952e25f4c507ac7f9faebf5d767786e597375d9a252be2d5b6ec8d635988760
SHA512ebff15f9e9f7e52ee3121a604812672b047b67eac265c8fdf9000277bf6286ce6c6e0f4b816c42b0f042dbb46341ed7dc1d287f0db73eabd52d00c9a187c8f82
-
memory/460-1102-0x0000000006D30000-0x0000000006E3A000-memory.dmpFilesize
1.0MB
-
memory/460-226-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-1116-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1115-0x0000000008F40000-0x000000000946C000-memory.dmpFilesize
5.2MB
-
memory/460-1114-0x0000000008D70000-0x0000000008F32000-memory.dmpFilesize
1.8MB
-
memory/460-205-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1112-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1113-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1111-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1109-0x0000000007950000-0x00000000079A0000-memory.dmpFilesize
320KB
-
memory/460-1108-0x00000000078C0000-0x0000000007936000-memory.dmpFilesize
472KB
-
memory/460-1107-0x00000000077E0000-0x0000000007872000-memory.dmpFilesize
584KB
-
memory/460-1106-0x0000000007120000-0x0000000007186000-memory.dmpFilesize
408KB
-
memory/460-203-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1105-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-1104-0x0000000006E40000-0x0000000006E7C000-memory.dmpFilesize
240KB
-
memory/460-1103-0x00000000060A0000-0x00000000060B2000-memory.dmpFilesize
72KB
-
memory/460-1101-0x00000000066D0000-0x0000000006CE8000-memory.dmpFilesize
6.1MB
-
memory/460-228-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-214-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-224-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-222-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-220-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-191-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-192-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-207-0x00000000060D0000-0x00000000060E0000-memory.dmpFilesize
64KB
-
memory/460-196-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-198-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-201-0x0000000001B00000-0x0000000001B4B000-memory.dmpFilesize
300KB
-
memory/460-200-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-204-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-208-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-218-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-216-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-194-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-210-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/460-212-0x0000000006690000-0x00000000066CF000-memory.dmpFilesize
252KB
-
memory/1524-182-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-176-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-160-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-150-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-152-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-186-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1524-184-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-183-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-153-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-151-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/1524-181-0x0000000000400000-0x000000000070B000-memory.dmpFilesize
3.0MB
-
memory/1524-180-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-178-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-174-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-172-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-170-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-168-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-166-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-164-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-162-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-158-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-156-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-154-0x0000000002650000-0x0000000002662000-memory.dmpFilesize
72KB
-
memory/1524-149-0x00000000007E0000-0x000000000080D000-memory.dmpFilesize
180KB
-
memory/1524-148-0x0000000005010000-0x00000000055B4000-memory.dmpFilesize
5.6MB
-
memory/2364-1122-0x00000000003F0000-0x0000000000422000-memory.dmpFilesize
200KB
-
memory/2364-1123-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2364-1124-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB