Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:57
Static task
static1
Behavioral task
behavioral1
Sample
6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe
Resource
win10v2004-20230220-en
General
-
Target
6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe
-
Size
684KB
-
MD5
ba7145dd0c46d8619a5a62060c309d26
-
SHA1
723e737d3f82dcdbdf8ac01a3ce62b2882da155f
-
SHA256
6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e
-
SHA512
792766573db70b5d9fd5b8fbaf03547ff8e0e77679778778ce4c6693e9c70fa08d4baa05a213c8a9d201e9a7eae0496b64891dc406f1f2ae2e7c44a6ca480408
-
SSDEEP
12288:7Mrsy90fdUCT7CsCUMChYrPtd7i0iHVsY/ir+Xqp6P4zWPh:ny+tXCUez7ip/w+XlA+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4019.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/384-192-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-194-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-197-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-200-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-202-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-204-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-206-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-208-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-210-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-212-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-214-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-216-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-218-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-220-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-222-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-224-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-226-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/384-228-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un942558.exepro4019.exequ8001.exesi227501.exepid process 4520 un942558.exe 3884 pro4019.exe 384 qu8001.exe 4216 si227501.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4019.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4019.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exeun942558.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un942558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un942558.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4692 3884 WerFault.exe pro4019.exe 2432 384 WerFault.exe qu8001.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4019.exequ8001.exesi227501.exepid process 3884 pro4019.exe 3884 pro4019.exe 384 qu8001.exe 384 qu8001.exe 4216 si227501.exe 4216 si227501.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4019.exequ8001.exesi227501.exedescription pid process Token: SeDebugPrivilege 3884 pro4019.exe Token: SeDebugPrivilege 384 qu8001.exe Token: SeDebugPrivilege 4216 si227501.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exeun942558.exedescription pid process target process PID 4260 wrote to memory of 4520 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe un942558.exe PID 4260 wrote to memory of 4520 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe un942558.exe PID 4260 wrote to memory of 4520 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe un942558.exe PID 4520 wrote to memory of 3884 4520 un942558.exe pro4019.exe PID 4520 wrote to memory of 3884 4520 un942558.exe pro4019.exe PID 4520 wrote to memory of 3884 4520 un942558.exe pro4019.exe PID 4520 wrote to memory of 384 4520 un942558.exe qu8001.exe PID 4520 wrote to memory of 384 4520 un942558.exe qu8001.exe PID 4520 wrote to memory of 384 4520 un942558.exe qu8001.exe PID 4260 wrote to memory of 4216 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe si227501.exe PID 4260 wrote to memory of 4216 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe si227501.exe PID 4260 wrote to memory of 4216 4260 6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe si227501.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe"C:\Users\Admin\AppData\Local\Temp\6bece0abbb749b4b0372d63e2e0f4f0d310edc4ec07adb9c0d9ac12a4aa7c58e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4019.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 10884⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8001.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 18244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si227501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si227501.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3884 -ip 38841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 384 -ip 3841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si227501.exeFilesize
175KB
MD5604c5a48aa7abd7295d89210dd9bd939
SHA1685c9b9a05699ec66af0d6c1a9080ffdf9f829ae
SHA256bfbb203140d77c3c6f760ca657bc216ae30397b0fa905f5e8bb0c155766d96d6
SHA512f575f8cc76fb720fa85fa346a98f60e38f86ffbe864e72dee815b015a4945dce8a7cfc5c22539c988719521c263c16217d16b787baf2604d8f7072021f13deb9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si227501.exeFilesize
175KB
MD5604c5a48aa7abd7295d89210dd9bd939
SHA1685c9b9a05699ec66af0d6c1a9080ffdf9f829ae
SHA256bfbb203140d77c3c6f760ca657bc216ae30397b0fa905f5e8bb0c155766d96d6
SHA512f575f8cc76fb720fa85fa346a98f60e38f86ffbe864e72dee815b015a4945dce8a7cfc5c22539c988719521c263c16217d16b787baf2604d8f7072021f13deb9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942558.exeFilesize
542KB
MD586be2d8fe5f5623bdc305a719d7e8f9e
SHA16356e328be5f3b3fa0231db1a0eda9c9d28b7846
SHA25615c3adb382aad019be2cd9915527beca5b19b7c4108d20b3646ecea9645d2864
SHA5120d9ada4f0cee8887af03088021d3d5bd764da2b896f4f66b9399c1352a56994c5039dd75efc34bc1cd0adc828f2d525b09cc34547833d53f64b1585ace61b550
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942558.exeFilesize
542KB
MD586be2d8fe5f5623bdc305a719d7e8f9e
SHA16356e328be5f3b3fa0231db1a0eda9c9d28b7846
SHA25615c3adb382aad019be2cd9915527beca5b19b7c4108d20b3646ecea9645d2864
SHA5120d9ada4f0cee8887af03088021d3d5bd764da2b896f4f66b9399c1352a56994c5039dd75efc34bc1cd0adc828f2d525b09cc34547833d53f64b1585ace61b550
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4019.exeFilesize
322KB
MD51581c68cac33a25dfa0c3f880a3c4d2d
SHA1389e050736d297813e34adc3fbf15263061bbbd6
SHA256256bb6b59a27cbd797a67df8dbe455c9979e3672059662d1c549f371bab21b53
SHA512a4a820b5ac3cfbf98c1df69d8edb0743f58f89a972d54589118a10753c89679833511fa5575730996cff810356e91cfef2a7bbd074c4c297ee87572c87424818
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4019.exeFilesize
322KB
MD51581c68cac33a25dfa0c3f880a3c4d2d
SHA1389e050736d297813e34adc3fbf15263061bbbd6
SHA256256bb6b59a27cbd797a67df8dbe455c9979e3672059662d1c549f371bab21b53
SHA512a4a820b5ac3cfbf98c1df69d8edb0743f58f89a972d54589118a10753c89679833511fa5575730996cff810356e91cfef2a7bbd074c4c297ee87572c87424818
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8001.exeFilesize
379KB
MD57186112ebeca6346844a00a8f87fd730
SHA1e1ba007df45a5e74ad47dd48698991414b760852
SHA2560941473ab8f082ea14ff23543ce3ebf705139702d771c235b2efb6baf3e93fd0
SHA51218d942fef3665f39c617ac2d39d578525e572855358dd773d1592b92c8091ad305efad410c9663e0359b43c980de1589287182ce7e61a37bfa764b2aa28d9cc5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8001.exeFilesize
379KB
MD57186112ebeca6346844a00a8f87fd730
SHA1e1ba007df45a5e74ad47dd48698991414b760852
SHA2560941473ab8f082ea14ff23543ce3ebf705139702d771c235b2efb6baf3e93fd0
SHA51218d942fef3665f39c617ac2d39d578525e572855358dd773d1592b92c8091ad305efad410c9663e0359b43c980de1589287182ce7e61a37bfa764b2aa28d9cc5
-
memory/384-1102-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/384-226-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-200-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-202-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-1115-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-1114-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-1113-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-1112-0x0000000009440000-0x0000000009490000-memory.dmpFilesize
320KB
-
memory/384-1111-0x00000000093A0000-0x0000000009416000-memory.dmpFilesize
472KB
-
memory/384-1110-0x0000000008D60000-0x000000000928C000-memory.dmpFilesize
5.2MB
-
memory/384-204-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-1109-0x0000000008B90000-0x0000000008D52000-memory.dmpFilesize
1.8MB
-
memory/384-1108-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/384-1107-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/384-1105-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/384-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/384-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/384-228-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-214-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-224-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-222-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-220-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-191-0x0000000002C80000-0x0000000002CCB000-memory.dmpFilesize
300KB
-
memory/384-192-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-194-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-193-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-198-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-196-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-197-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-218-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-1116-0x00000000070F0000-0x0000000007100000-memory.dmpFilesize
64KB
-
memory/384-216-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-206-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-208-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-210-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/384-212-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/3884-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3884-172-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-148-0x0000000004530000-0x000000000455D000-memory.dmpFilesize
180KB
-
memory/3884-151-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-152-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3884-184-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-185-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-182-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-150-0x0000000007300000-0x00000000078A4000-memory.dmpFilesize
5.6MB
-
memory/3884-154-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-180-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-179-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-178-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-176-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-174-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-170-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-168-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-166-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-164-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-162-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-160-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-158-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/3884-149-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/3884-156-0x0000000004B30000-0x0000000004B42000-memory.dmpFilesize
72KB
-
memory/4216-1122-0x0000000000740000-0x0000000000772000-memory.dmpFilesize
200KB
-
memory/4216-1123-0x0000000005310000-0x0000000005320000-memory.dmpFilesize
64KB