Analysis
-
max time kernel
61s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:04
Static task
static1
Behavioral task
behavioral1
Sample
f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe
Resource
win10v2004-20230221-en
General
-
Target
f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe
-
Size
686KB
-
MD5
5f0136a81b72acd9d8933bb230718910
-
SHA1
dac2639a3bcc8979e8bbee99eaf937b58c96e95b
-
SHA256
f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03
-
SHA512
d5f0477c4b77815ddb8b0125712dc27b59e1cea882a587947bf735319f407246b49e742b08e7198b08522eb749550ab5ed984a0ba47e3a7eef036e73f2a4b114
-
SSDEEP
12288:eMr2y90qKEPVsD3mbiSxx/S87dLk5cgUlnLxS0o3Me4odKwKW8SGadH:0yVRbiSD/S85LkCFdLY0ocZodKwjbGaN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5251.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2472-196-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-198-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-195-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-200-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-202-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-204-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-206-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-208-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-210-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-212-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-214-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-216-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-218-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-220-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-222-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-224-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-226-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline behavioral1/memory/2472-228-0x0000000007290000-0x00000000072CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un040726.exepro5251.exequ4121.exesi488887.exepid process 2808 un040726.exe 744 pro5251.exe 2472 qu4121.exe 3744 si488887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5251.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exeun040726.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un040726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un040726.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2140 744 WerFault.exe pro5251.exe 4344 2472 WerFault.exe qu4121.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5251.exequ4121.exesi488887.exepid process 744 pro5251.exe 744 pro5251.exe 2472 qu4121.exe 2472 qu4121.exe 3744 si488887.exe 3744 si488887.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5251.exequ4121.exesi488887.exedescription pid process Token: SeDebugPrivilege 744 pro5251.exe Token: SeDebugPrivilege 2472 qu4121.exe Token: SeDebugPrivilege 3744 si488887.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exeun040726.exedescription pid process target process PID 4076 wrote to memory of 2808 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe un040726.exe PID 4076 wrote to memory of 2808 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe un040726.exe PID 4076 wrote to memory of 2808 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe un040726.exe PID 2808 wrote to memory of 744 2808 un040726.exe pro5251.exe PID 2808 wrote to memory of 744 2808 un040726.exe pro5251.exe PID 2808 wrote to memory of 744 2808 un040726.exe pro5251.exe PID 2808 wrote to memory of 2472 2808 un040726.exe qu4121.exe PID 2808 wrote to memory of 2472 2808 un040726.exe qu4121.exe PID 2808 wrote to memory of 2472 2808 un040726.exe qu4121.exe PID 4076 wrote to memory of 3744 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe si488887.exe PID 4076 wrote to memory of 3744 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe si488887.exe PID 4076 wrote to memory of 3744 4076 f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe si488887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe"C:\Users\Admin\AppData\Local\Temp\f91207f870fc47a6a3def210c197651692bbc0776b205bbd258a2d2021e0cd03.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un040726.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un040726.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5251.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 10804⤵
- Program crash
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4121.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4121.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 18364⤵
- Program crash
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488887.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 744 -ip 7441⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2472 -ip 24721⤵PID:4904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488887.exeFilesize
175KB
MD53e2de311ea75b7f7582bb753eb7f2efc
SHA1630c10415415c3838337ca6d4e8a13bcdb55de5c
SHA25641c4f33249803216a573f5894911d49f38fa805d0b63888b5622d8ff6516dc3c
SHA51267edf32a574a0ad296c61f885a6995177526f4c6c317bd1a4ee5107d15b891e9227dd7fcafcadc6028d4f1332f4cf1dd7c4e22294126cabcaace1b10ae477d34
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488887.exeFilesize
175KB
MD53e2de311ea75b7f7582bb753eb7f2efc
SHA1630c10415415c3838337ca6d4e8a13bcdb55de5c
SHA25641c4f33249803216a573f5894911d49f38fa805d0b63888b5622d8ff6516dc3c
SHA51267edf32a574a0ad296c61f885a6995177526f4c6c317bd1a4ee5107d15b891e9227dd7fcafcadc6028d4f1332f4cf1dd7c4e22294126cabcaace1b10ae477d34
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un040726.exeFilesize
544KB
MD510905ee42f539443b6d4887d067f71dc
SHA1d69c549cc85a7848cf556c44738f8aa6a392b325
SHA25688a7769bb9cdca1d4348a636b0920a901ce73a4b3915ecc7852ad2909c4bf2f6
SHA512d6c659f01f397d9e8afec3d3955e10c7b6bdea29380459540120c4b1a06e75b218c98229e62194ddcf660e52f5804a1f3b4213894d364185359829fde891dc24
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un040726.exeFilesize
544KB
MD510905ee42f539443b6d4887d067f71dc
SHA1d69c549cc85a7848cf556c44738f8aa6a392b325
SHA25688a7769bb9cdca1d4348a636b0920a901ce73a4b3915ecc7852ad2909c4bf2f6
SHA512d6c659f01f397d9e8afec3d3955e10c7b6bdea29380459540120c4b1a06e75b218c98229e62194ddcf660e52f5804a1f3b4213894d364185359829fde891dc24
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5251.exeFilesize
322KB
MD5ef97b68c336b5171d43378fba23c5a5f
SHA1fac5f6f22959d8e252aed7c22ff7c75ebb7101fa
SHA256fa3cfc221ee4be34b2f594258fa1716a56744c92a8263309e8ec0666ed93b4e5
SHA512d6a8c47ff69d9a6ced1a40194e6ce4647dad76c9f4ccb1634c5c98c6af9b21fa4c65d2257efcb0b43d521da80bc03c8f9f4e43321ef07de152b3ee5d8dbd4b2d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5251.exeFilesize
322KB
MD5ef97b68c336b5171d43378fba23c5a5f
SHA1fac5f6f22959d8e252aed7c22ff7c75ebb7101fa
SHA256fa3cfc221ee4be34b2f594258fa1716a56744c92a8263309e8ec0666ed93b4e5
SHA512d6a8c47ff69d9a6ced1a40194e6ce4647dad76c9f4ccb1634c5c98c6af9b21fa4c65d2257efcb0b43d521da80bc03c8f9f4e43321ef07de152b3ee5d8dbd4b2d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4121.exeFilesize
379KB
MD5e0374b93d47fdf377132ed3e5ebb3b63
SHA1a58f9a842028849ccc7bfe6edac78202d42d0a02
SHA25694dedb5ed984ee5f1c3672048fc235fc8f56bfde47d62db3b978b3b89d309137
SHA5123057cbe21ec5c764e6d24d895b76791c41d8ba1ca94c03642e69e5885c580474a802253c0c098218cecf2e56cf69b94a0586ab83a8f415cb35a9aedd1feae6a8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4121.exeFilesize
379KB
MD5e0374b93d47fdf377132ed3e5ebb3b63
SHA1a58f9a842028849ccc7bfe6edac78202d42d0a02
SHA25694dedb5ed984ee5f1c3672048fc235fc8f56bfde47d62db3b978b3b89d309137
SHA5123057cbe21ec5c764e6d24d895b76791c41d8ba1ca94c03642e69e5885c580474a802253c0c098218cecf2e56cf69b94a0586ab83a8f415cb35a9aedd1feae6a8
-
memory/744-148-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/744-149-0x00000000073B0000-0x0000000007954000-memory.dmpFilesize
5.6MB
-
memory/744-150-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-151-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-152-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-153-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-154-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-156-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-158-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-160-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-162-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-164-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-166-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-168-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-170-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-172-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-174-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-176-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-178-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-180-0x0000000004AB0000-0x0000000004AC2000-memory.dmpFilesize
72KB
-
memory/744-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/744-183-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-182-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-184-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/744-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2472-198-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-224-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-196-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-191-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/2472-195-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-194-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-192-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-200-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-202-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-204-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-206-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-208-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-210-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-212-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-214-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-216-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-218-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-220-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-222-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-193-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-226-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-228-0x0000000007290000-0x00000000072CF000-memory.dmpFilesize
252KB
-
memory/2472-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/2472-1102-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/2472-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/2472-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/2472-1105-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-1107-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/2472-1108-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/2472-1110-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-1109-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-1111-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-1112-0x0000000008DC0000-0x0000000008F82000-memory.dmpFilesize
1.8MB
-
memory/2472-1113-0x0000000008FA0000-0x00000000094CC000-memory.dmpFilesize
5.2MB
-
memory/2472-1114-0x0000000007300000-0x0000000007310000-memory.dmpFilesize
64KB
-
memory/2472-1115-0x0000000004BB0000-0x0000000004C26000-memory.dmpFilesize
472KB
-
memory/2472-1116-0x000000000A790000-0x000000000A7E0000-memory.dmpFilesize
320KB
-
memory/3744-1122-0x00000000008A0000-0x00000000008D2000-memory.dmpFilesize
200KB
-
memory/3744-1123-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB