Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:18
Static task
static1
Behavioral task
behavioral1
Sample
893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe
Resource
win10v2004-20230220-en
General
-
Target
893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe
-
Size
687KB
-
MD5
4b32bc6709823587a1e442364422eb14
-
SHA1
3c3b0cd70f179ec809db6bb70b0a88daefe691a6
-
SHA256
893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f
-
SHA512
76e7770589d30f29c65b6d1fb60e489cb66bb574303ca38ef962d8188a9bb45b391a592876b6251ccf6c81bb7ddffaf7dd641415178b0df7505e9c497f28ac42
-
SSDEEP
12288:FMrcy90I65n0Kqzwjx46yjCp+R5gvPl839veU03uXmkipB5R:FyxKwwjyjCI5Et8NmpuXy5R
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1367.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1367.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1367.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1328-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-197-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-199-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-195-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-201-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-203-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-205-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-207-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-215-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-217-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-213-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-219-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-211-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-209-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-223-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-221-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-225-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-227-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1328-1113-0x0000000007340000-0x0000000007350000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un923950.exepro1367.exequ9377.exesi819521.exepid process 3036 un923950.exe 4192 pro1367.exe 1328 qu9377.exe 3656 si819521.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1367.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1367.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exeun923950.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un923950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un923950.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1568 4192 WerFault.exe pro1367.exe 1432 1328 WerFault.exe qu9377.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1367.exequ9377.exesi819521.exepid process 4192 pro1367.exe 4192 pro1367.exe 1328 qu9377.exe 1328 qu9377.exe 3656 si819521.exe 3656 si819521.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1367.exequ9377.exesi819521.exedescription pid process Token: SeDebugPrivilege 4192 pro1367.exe Token: SeDebugPrivilege 1328 qu9377.exe Token: SeDebugPrivilege 3656 si819521.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exeun923950.exedescription pid process target process PID 3516 wrote to memory of 3036 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe un923950.exe PID 3516 wrote to memory of 3036 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe un923950.exe PID 3516 wrote to memory of 3036 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe un923950.exe PID 3036 wrote to memory of 4192 3036 un923950.exe pro1367.exe PID 3036 wrote to memory of 4192 3036 un923950.exe pro1367.exe PID 3036 wrote to memory of 4192 3036 un923950.exe pro1367.exe PID 3036 wrote to memory of 1328 3036 un923950.exe qu9377.exe PID 3036 wrote to memory of 1328 3036 un923950.exe qu9377.exe PID 3036 wrote to memory of 1328 3036 un923950.exe qu9377.exe PID 3516 wrote to memory of 3656 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe si819521.exe PID 3516 wrote to memory of 3656 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe si819521.exe PID 3516 wrote to memory of 3656 3516 893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe si819521.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe"C:\Users\Admin\AppData\Local\Temp\893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 15404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4192 -ip 41921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1328 -ip 13281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exeFilesize
175KB
MD51dbb95e02a115ee6885714de41059b12
SHA1863bf14a3fa3b341ecc38569172a2cf5b49b0f5a
SHA25612f7996d5ec06d15920fdb0f4b4404a4f48e11ec3a552b95c77f821f836a8691
SHA5127374d0b6bf260e4968d3e450048aaed8ee4bc4014fc8b89f333330b3268837fc4ef1d9a6e756d6f3c7336b5689e9e166cadeb8e2f20c19e2b614cba204f27b96
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exeFilesize
175KB
MD51dbb95e02a115ee6885714de41059b12
SHA1863bf14a3fa3b341ecc38569172a2cf5b49b0f5a
SHA25612f7996d5ec06d15920fdb0f4b4404a4f48e11ec3a552b95c77f821f836a8691
SHA5127374d0b6bf260e4968d3e450048aaed8ee4bc4014fc8b89f333330b3268837fc4ef1d9a6e756d6f3c7336b5689e9e166cadeb8e2f20c19e2b614cba204f27b96
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exeFilesize
545KB
MD5b2ea1494535a55799562bffa7460ffe8
SHA127584f74ad628bb8c73b2f1034bbf8e182847a12
SHA256217966639ed011cce8293ed6d60b4e1e953878bbaf7d7a7f544dfe844b828496
SHA512850ecfa647f334e3986f2298b7b7761e04e6ecf856d00b2b4c4bc3f83ba6ca8b2f0224320165f8bc301e26f097cd844c2016b318051b28c8ae7e70087a5f122d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exeFilesize
545KB
MD5b2ea1494535a55799562bffa7460ffe8
SHA127584f74ad628bb8c73b2f1034bbf8e182847a12
SHA256217966639ed011cce8293ed6d60b4e1e953878bbaf7d7a7f544dfe844b828496
SHA512850ecfa647f334e3986f2298b7b7761e04e6ecf856d00b2b4c4bc3f83ba6ca8b2f0224320165f8bc301e26f097cd844c2016b318051b28c8ae7e70087a5f122d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exeFilesize
321KB
MD531714c7ee1cb6456779619aa7ebcea49
SHA13448ec0ad5adb7251dedeb9cd434a4c22775e8e8
SHA256eaf2b941d6decad66342802952aa2c083ca6daa0ba53c8f74759bae926af8b8a
SHA512f0f73f1e81226a31a252a30686f57e426650bd9120ec96f444c28d4e08889c3f893f41ae637525f2a49575b87491813be75f763d7b692d4883a61ef38a5cdafd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exeFilesize
321KB
MD531714c7ee1cb6456779619aa7ebcea49
SHA13448ec0ad5adb7251dedeb9cd434a4c22775e8e8
SHA256eaf2b941d6decad66342802952aa2c083ca6daa0ba53c8f74759bae926af8b8a
SHA512f0f73f1e81226a31a252a30686f57e426650bd9120ec96f444c28d4e08889c3f893f41ae637525f2a49575b87491813be75f763d7b692d4883a61ef38a5cdafd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exeFilesize
380KB
MD5eb16b672faec43d2e16ea2647db78bb9
SHA1c1250b91290dfa2eec74c371cffe1b6f5fba998f
SHA2568ebd0a62fc6e3c661d1f2dbf475b3be2df74a90aaca5e4385ea27a5b1a866cdf
SHA512cb23b6465eff5e670482a404f290d7ee9051980b88547a4a9c4ea368b659f45967a2b08941f9616f304b3bf18873f88b93c494e62714029ae1dcac7acb4acbdc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exeFilesize
380KB
MD5eb16b672faec43d2e16ea2647db78bb9
SHA1c1250b91290dfa2eec74c371cffe1b6f5fba998f
SHA2568ebd0a62fc6e3c661d1f2dbf475b3be2df74a90aaca5e4385ea27a5b1a866cdf
SHA512cb23b6465eff5e670482a404f290d7ee9051980b88547a4a9c4ea368b659f45967a2b08941f9616f304b3bf18873f88b93c494e62714029ae1dcac7acb4acbdc
-
memory/1328-1102-0x0000000007F20000-0x000000000802A000-memory.dmpFilesize
1.0MB
-
memory/1328-1103-0x0000000007280000-0x0000000007292000-memory.dmpFilesize
72KB
-
memory/1328-209-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-211-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-219-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-205-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-1116-0x000000000CB80000-0x000000000CBD0000-memory.dmpFilesize
320KB
-
memory/1328-1115-0x000000000CB00000-0x000000000CB76000-memory.dmpFilesize
472KB
-
memory/1328-1114-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-1113-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-1112-0x0000000008D50000-0x000000000927C000-memory.dmpFilesize
5.2MB
-
memory/1328-1111-0x0000000008B80000-0x0000000008D42000-memory.dmpFilesize
1.8MB
-
memory/1328-1110-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/1328-207-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-1109-0x0000000008280000-0x0000000008312000-memory.dmpFilesize
584KB
-
memory/1328-1108-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-1107-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-1105-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-1104-0x00000000072A0000-0x00000000072DC000-memory.dmpFilesize
240KB
-
memory/1328-223-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-1101-0x0000000007900000-0x0000000007F18000-memory.dmpFilesize
6.1MB
-
memory/1328-231-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-227-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-192-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-191-0x0000000002BE0000-0x0000000002C2B000-memory.dmpFilesize
300KB
-
memory/1328-215-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-197-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-199-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-195-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-201-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-203-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-225-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-221-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-193-0x0000000007340000-0x0000000007350000-memory.dmpFilesize
64KB
-
memory/1328-217-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/1328-213-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/3656-1122-0x00000000007F0000-0x0000000000822000-memory.dmpFilesize
200KB
-
memory/3656-1123-0x0000000005230000-0x0000000005240000-memory.dmpFilesize
64KB
-
memory/3656-1124-0x0000000005230000-0x0000000005240000-memory.dmpFilesize
64KB
-
memory/4192-183-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-178-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-165-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-151-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-153-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4192-150-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-184-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-185-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-155-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4192-180-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-179-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4192-177-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-175-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-173-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-171-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-169-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-167-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-163-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-149-0x0000000007200000-0x00000000077A4000-memory.dmpFilesize
5.6MB
-
memory/4192-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4192-161-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-159-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB
-
memory/4192-157-0x00000000077F0000-0x0000000007802000-memory.dmpFilesize
72KB