Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:12
Static task
static1
Behavioral task
behavioral1
Sample
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe
Resource
win10v2004-20230220-en
General
-
Target
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe
-
Size
683KB
-
MD5
f1b1e51677bed410b910429d38f5ced9
-
SHA1
f482d3ac2fa31eb8d21b07027839de8d013f17ab
-
SHA256
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb
-
SHA512
7b8675dd97ba514237a405c33cde29a04ab633dd6cede615df5537c0be3d7c9f3ac22a156afa7cb33d367a28ac382d13a1983e32a6c71066ddefc7f845279338
-
SSDEEP
12288:gMrQy908sc/4TTzzvV9MgJktmX5wlStJUgDmNL3x7in4:Ay7smCzzd9MgUcwcBmNLS4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3672-191-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-192-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-194-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-198-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-202-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-204-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-206-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-208-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-210-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-212-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-214-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-216-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-218-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-220-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-222-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-224-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-226-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-228-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/3672-1115-0x00000000070F0000-0x0000000007100000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un706269.exepro5186.exequ0375.exesi478004.exepid process 824 un706269.exe 1128 pro5186.exe 3672 qu0375.exe 3524 si478004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5186.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un706269.exea40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un706269.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un706269.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2100 1128 WerFault.exe pro5186.exe 3476 3672 WerFault.exe qu0375.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5186.exequ0375.exesi478004.exepid process 1128 pro5186.exe 1128 pro5186.exe 3672 qu0375.exe 3672 qu0375.exe 3524 si478004.exe 3524 si478004.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5186.exequ0375.exesi478004.exedescription pid process Token: SeDebugPrivilege 1128 pro5186.exe Token: SeDebugPrivilege 3672 qu0375.exe Token: SeDebugPrivilege 3524 si478004.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exeun706269.exedescription pid process target process PID 4924 wrote to memory of 824 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe un706269.exe PID 4924 wrote to memory of 824 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe un706269.exe PID 4924 wrote to memory of 824 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe un706269.exe PID 824 wrote to memory of 1128 824 un706269.exe pro5186.exe PID 824 wrote to memory of 1128 824 un706269.exe pro5186.exe PID 824 wrote to memory of 1128 824 un706269.exe pro5186.exe PID 824 wrote to memory of 3672 824 un706269.exe qu0375.exe PID 824 wrote to memory of 3672 824 un706269.exe qu0375.exe PID 824 wrote to memory of 3672 824 un706269.exe qu0375.exe PID 4924 wrote to memory of 3524 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe si478004.exe PID 4924 wrote to memory of 3524 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe si478004.exe PID 4924 wrote to memory of 3524 4924 a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe si478004.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe"C:\Users\Admin\AppData\Local\Temp\a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un706269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un706269.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0375.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0375.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si478004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si478004.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1128 -ip 11281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3672 -ip 36721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si478004.exeFilesize
175KB
MD5b85a6347e6aa74f2b95d6d84d7007e39
SHA17e9c6ef3258c12c8c91ffbf860fd2c858cc86427
SHA25640082db7ab7a41296d261c9a1df50daf11dbda7ad26f9ea06c48d75de4ff397f
SHA51228d4c45b7c6d36dc984d15a94f43bd5f7c01efc9a8c608243f8c0bc40568450e37230ad8c6060b2332ad40ff23d7c9639957b9416c5c1584d15bb99e60301666
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si478004.exeFilesize
175KB
MD5b85a6347e6aa74f2b95d6d84d7007e39
SHA17e9c6ef3258c12c8c91ffbf860fd2c858cc86427
SHA25640082db7ab7a41296d261c9a1df50daf11dbda7ad26f9ea06c48d75de4ff397f
SHA51228d4c45b7c6d36dc984d15a94f43bd5f7c01efc9a8c608243f8c0bc40568450e37230ad8c6060b2332ad40ff23d7c9639957b9416c5c1584d15bb99e60301666
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un706269.exeFilesize
541KB
MD5ca6e65fca51ce6197e4a894ca11b0863
SHA15d352330c1fe06d76636f11afc32c811ec26448d
SHA2561cab2a58c995570892f7c428fc14944058fc0752f55a18946843f005a2f51371
SHA5124ed820f7fc52f15a85c17b9149da4b3061ed09fb011f1951db2de4863d2f21b4c140165da08f80cf71cf8ded5fe5ede5d791eb3ba5c6ac64ceeca1388947ba5a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un706269.exeFilesize
541KB
MD5ca6e65fca51ce6197e4a894ca11b0863
SHA15d352330c1fe06d76636f11afc32c811ec26448d
SHA2561cab2a58c995570892f7c428fc14944058fc0752f55a18946843f005a2f51371
SHA5124ed820f7fc52f15a85c17b9149da4b3061ed09fb011f1951db2de4863d2f21b4c140165da08f80cf71cf8ded5fe5ede5d791eb3ba5c6ac64ceeca1388947ba5a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exeFilesize
321KB
MD587001064912e563f72c4d6ba13ee8514
SHA1172371ab269376489a9e88e20c77ad4a3f112965
SHA256551ba959833f2e7ea4979040d2d04819e2ca262ef6913c93028e7452a76a5e40
SHA512b934da388578422e2b5d828870dc9afc46a4eccda0f7acf3a76064f4c3a9f5b3e26b511fcde0da3132e190ac811fb6d1c81866b8bdc178bc999b199404ae4208
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5186.exeFilesize
321KB
MD587001064912e563f72c4d6ba13ee8514
SHA1172371ab269376489a9e88e20c77ad4a3f112965
SHA256551ba959833f2e7ea4979040d2d04819e2ca262ef6913c93028e7452a76a5e40
SHA512b934da388578422e2b5d828870dc9afc46a4eccda0f7acf3a76064f4c3a9f5b3e26b511fcde0da3132e190ac811fb6d1c81866b8bdc178bc999b199404ae4208
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0375.exeFilesize
380KB
MD52cd4026a90c789830c9a1677f2668f3d
SHA1590b37f1fd834ae9f9df67bc0da6e1db672af5ca
SHA2560239d7e6aa73005edad8dde61cfc815f23b4ea510f012a51a05ed3405ec4887c
SHA5120b56935f252a4c0a14b8f6e8da8b1d51728e1cc3a5d2289b5b1fff71da4bc084dfa8af6bd763c09d5898bc26371fb9ccc23f63bfb4ecf80758b41f23eaa509d8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0375.exeFilesize
380KB
MD52cd4026a90c789830c9a1677f2668f3d
SHA1590b37f1fd834ae9f9df67bc0da6e1db672af5ca
SHA2560239d7e6aa73005edad8dde61cfc815f23b4ea510f012a51a05ed3405ec4887c
SHA5120b56935f252a4c0a14b8f6e8da8b1d51728e1cc3a5d2289b5b1fff71da4bc084dfa8af6bd763c09d5898bc26371fb9ccc23f63bfb4ecf80758b41f23eaa509d8
-
memory/1128-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/1128-149-0x00000000071D0000-0x0000000007774000-memory.dmpFilesize
5.6MB
-
memory/1128-150-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-151-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-153-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-155-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-157-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-159-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-161-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-163-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-165-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-167-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-169-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-171-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-173-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-175-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-177-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1128-178-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-179-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-180-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1128-183-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-184-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-185-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/1128-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3524-1122-0x0000000000920000-0x0000000000952000-memory.dmpFilesize
200KB
-
memory/3524-1123-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/3672-194-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-226-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-197-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-198-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-196-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3672-199-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-201-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-202-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-204-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-206-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-208-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-210-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-212-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-214-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-216-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-218-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-220-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-222-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-224-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-192-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-228-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/3672-1102-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/3672-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/3672-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/3672-1105-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-1107-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/3672-1108-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/3672-1109-0x0000000008C60000-0x0000000008CD6000-memory.dmpFilesize
472KB
-
memory/3672-1110-0x0000000008CF0000-0x0000000008D40000-memory.dmpFilesize
320KB
-
memory/3672-1111-0x0000000008D70000-0x0000000008F32000-memory.dmpFilesize
1.8MB
-
memory/3672-1112-0x0000000008F40000-0x000000000946C000-memory.dmpFilesize
5.2MB
-
memory/3672-1113-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-191-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3672-1114-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-1115-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/3672-1116-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB