Analysis
-
max time kernel
53s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:24
Static task
static1
Behavioral task
behavioral1
Sample
1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe
Resource
win10v2004-20230220-en
General
-
Target
1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe
-
Size
686KB
-
MD5
ee85226181831d86a71baffcf4431dd6
-
SHA1
469582b1ecd43f71a36834e932e899caee49e21d
-
SHA256
1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0
-
SHA512
24db7f10b0005f54d0010e761dcb07791131b8b6501df60649fbb3afad927c35e893bad83be90e49190c48ce1c655a4aefab9a6770cfaf1a37d076262a08a307
-
SSDEEP
12288:JMray90ubVBpHAeQh429715t49KyDTdY3YOOrWobNRA3QUzdzqtxz8fi:ryPb7pHJ2Q9KyD23IaoZvU2j
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9868.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9868.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1208-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1208-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un900685.exepro9868.exequ8630.exesi940669.exepid process 3208 un900685.exe 3044 pro9868.exe 1208 qu8630.exe 4704 si940669.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9868.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9868.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exeun900685.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un900685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un900685.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1448 3044 WerFault.exe pro9868.exe 1592 1208 WerFault.exe qu8630.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9868.exequ8630.exesi940669.exepid process 3044 pro9868.exe 3044 pro9868.exe 1208 qu8630.exe 1208 qu8630.exe 4704 si940669.exe 4704 si940669.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9868.exequ8630.exesi940669.exedescription pid process Token: SeDebugPrivilege 3044 pro9868.exe Token: SeDebugPrivilege 1208 qu8630.exe Token: SeDebugPrivilege 4704 si940669.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exeun900685.exedescription pid process target process PID 4616 wrote to memory of 3208 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe un900685.exe PID 4616 wrote to memory of 3208 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe un900685.exe PID 4616 wrote to memory of 3208 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe un900685.exe PID 3208 wrote to memory of 3044 3208 un900685.exe pro9868.exe PID 3208 wrote to memory of 3044 3208 un900685.exe pro9868.exe PID 3208 wrote to memory of 3044 3208 un900685.exe pro9868.exe PID 3208 wrote to memory of 1208 3208 un900685.exe qu8630.exe PID 3208 wrote to memory of 1208 3208 un900685.exe qu8630.exe PID 3208 wrote to memory of 1208 3208 un900685.exe qu8630.exe PID 4616 wrote to memory of 4704 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe si940669.exe PID 4616 wrote to memory of 4704 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe si940669.exe PID 4616 wrote to memory of 4704 4616 1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe si940669.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe"C:\Users\Admin\AppData\Local\Temp\1347c5535e6dec3dd16acd00ffd63a9a326ce93772f83d453d2e12faa39d90e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900685.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 10964⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8630.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 18564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940669.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3044 -ip 30441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1208 -ip 12081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940669.exeFilesize
175KB
MD59b4104c6bfea6bfbcf53da9ae657879b
SHA117af0ce7d54f15e3d1444797a488db2efb574120
SHA25636ac898b3f39b41a4d02d645032b4ec4277bde9d8687bad790b55336ef5195ec
SHA51282573d13eb855e5a58000ea2b065a7b6d26ee9db2bfbb2bba1b17982595c65a8fd424dd09f10e3429d69334366e1d8349b2342d86f196e4fb3335e7d82a27d09
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940669.exeFilesize
175KB
MD59b4104c6bfea6bfbcf53da9ae657879b
SHA117af0ce7d54f15e3d1444797a488db2efb574120
SHA25636ac898b3f39b41a4d02d645032b4ec4277bde9d8687bad790b55336ef5195ec
SHA51282573d13eb855e5a58000ea2b065a7b6d26ee9db2bfbb2bba1b17982595c65a8fd424dd09f10e3429d69334366e1d8349b2342d86f196e4fb3335e7d82a27d09
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900685.exeFilesize
545KB
MD5b8ef40820d71ca6c23ea4ae5009dfd7c
SHA10743731b17bba189147d300fc37a38780e3747e6
SHA25655c1f823d987324333e684a763e7c5d56fe4e5a250aeb463b99f19c236e05456
SHA5121a449e4f62cb3daa11b52931b64561d594696092039b420ecdeb184293b9f7304232beb31f9c405c8e31a770dface44c20d18ed1ac00f95e686ac03baf5bf056
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900685.exeFilesize
545KB
MD5b8ef40820d71ca6c23ea4ae5009dfd7c
SHA10743731b17bba189147d300fc37a38780e3747e6
SHA25655c1f823d987324333e684a763e7c5d56fe4e5a250aeb463b99f19c236e05456
SHA5121a449e4f62cb3daa11b52931b64561d594696092039b420ecdeb184293b9f7304232beb31f9c405c8e31a770dface44c20d18ed1ac00f95e686ac03baf5bf056
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exeFilesize
321KB
MD53f23a350b89d1612e6e6a41102b96f9f
SHA1bb4525302aa8d21836e97bd761a600a36afb680f
SHA256541639151b036e9214d603b46d36bdf0f12616bcc5983380d729e6d63a1d0b34
SHA5122b511338bc5578f754154f5561db652b363f2742db856c93f2f7572b07522543a875261d77ad3758f6f5c058c0cd042aff5d2455cf6e035b2577eb9c17a39848
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exeFilesize
321KB
MD53f23a350b89d1612e6e6a41102b96f9f
SHA1bb4525302aa8d21836e97bd761a600a36afb680f
SHA256541639151b036e9214d603b46d36bdf0f12616bcc5983380d729e6d63a1d0b34
SHA5122b511338bc5578f754154f5561db652b363f2742db856c93f2f7572b07522543a875261d77ad3758f6f5c058c0cd042aff5d2455cf6e035b2577eb9c17a39848
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8630.exeFilesize
380KB
MD59f659ab218ce1163d0e60d40d6934dee
SHA188ddb4fac21ea4242b85cb07c2edc287490a1cef
SHA25685c9219434b87ca1929fbbb954548b88ab436f0f3b1b183003d3d12e381c644a
SHA5127e49fbc12781c0595bb3281da7d3f5f092e5867d5088883650c32361b988876a78fa329e15e00f8850393c414ea491e20ec16020348e501e8a92ff80ae73dea0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8630.exeFilesize
380KB
MD59f659ab218ce1163d0e60d40d6934dee
SHA188ddb4fac21ea4242b85cb07c2edc287490a1cef
SHA25685c9219434b87ca1929fbbb954548b88ab436f0f3b1b183003d3d12e381c644a
SHA5127e49fbc12781c0595bb3281da7d3f5f092e5867d5088883650c32361b988876a78fa329e15e00f8850393c414ea491e20ec16020348e501e8a92ff80ae73dea0
-
memory/1208-1102-0x0000000007250000-0x000000000735A000-memory.dmpFilesize
1.0MB
-
memory/1208-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-1115-0x0000000008E30000-0x000000000935C000-memory.dmpFilesize
5.2MB
-
memory/1208-1114-0x0000000008C60000-0x0000000008E22000-memory.dmpFilesize
1.8MB
-
memory/1208-1113-0x0000000008AB0000-0x0000000008B00000-memory.dmpFilesize
320KB
-
memory/1208-1112-0x0000000008A20000-0x0000000008A96000-memory.dmpFilesize
472KB
-
memory/1208-1111-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-1110-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-208-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/1208-1109-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-1108-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/1208-1107-0x0000000008280000-0x0000000008312000-memory.dmpFilesize
584KB
-
memory/1208-1105-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-1104-0x00000000073B0000-0x00000000073EC000-memory.dmpFilesize
240KB
-
memory/1208-1103-0x0000000007390000-0x00000000073A2000-memory.dmpFilesize
72KB
-
memory/1208-1101-0x00000000079F0000-0x0000000008008000-memory.dmpFilesize
6.1MB
-
memory/1208-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-1116-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmpFilesize
252KB
-
memory/1208-210-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-212-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/1208-214-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3044-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3044-170-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-148-0x00000000071D0000-0x0000000007774000-memory.dmpFilesize
5.6MB
-
memory/3044-150-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-152-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3044-184-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-183-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-182-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-151-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/3044-154-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-180-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-178-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-176-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-174-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-172-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-168-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-166-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-164-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-162-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-160-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-158-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-156-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3044-149-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/3044-153-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/4704-1122-0x0000000000B60000-0x0000000000B92000-memory.dmpFilesize
200KB
-
memory/4704-1123-0x00000000058E0000-0x00000000058F0000-memory.dmpFilesize
64KB