Analysis
-
max time kernel
59s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:58
Static task
static1
Behavioral task
behavioral1
Sample
d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe
Resource
win10v2004-20230220-en
General
-
Target
d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe
-
Size
682KB
-
MD5
4f1d194583415d39a7578a4c22373d29
-
SHA1
6a10c8444b8e5488565a89832f2ea87c6b07bba8
-
SHA256
d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0
-
SHA512
98cb51383de2185382c25c608be44eb0d578de9d652f93201b13c1611c4540453752b5d80292b283af5526c3fe4f488c1ec6477c3ff666b3a998bc3479bfe3c5
-
SSDEEP
12288:DMrly90QtyfZgYFYn3xXiwyZgixd70omCEAVAeePnTS48Wl8HdYu/Kihq9:qyLEyNhS9Zgi/7nLEAVANvTl6+u/Xh4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8047.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8047.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4004-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4004-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un848922.exepro8047.exequ1433.exesi338633.exepid process 3976 un848922.exe 3336 pro8047.exe 4004 qu1433.exe 4548 si338633.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8047.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8047.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exeun848922.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un848922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un848922.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3300 3336 WerFault.exe pro8047.exe 404 4004 WerFault.exe qu1433.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8047.exequ1433.exesi338633.exepid process 3336 pro8047.exe 3336 pro8047.exe 4004 qu1433.exe 4004 qu1433.exe 4548 si338633.exe 4548 si338633.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8047.exequ1433.exesi338633.exedescription pid process Token: SeDebugPrivilege 3336 pro8047.exe Token: SeDebugPrivilege 4004 qu1433.exe Token: SeDebugPrivilege 4548 si338633.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exeun848922.exedescription pid process target process PID 3636 wrote to memory of 3976 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe un848922.exe PID 3636 wrote to memory of 3976 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe un848922.exe PID 3636 wrote to memory of 3976 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe un848922.exe PID 3976 wrote to memory of 3336 3976 un848922.exe pro8047.exe PID 3976 wrote to memory of 3336 3976 un848922.exe pro8047.exe PID 3976 wrote to memory of 3336 3976 un848922.exe pro8047.exe PID 3976 wrote to memory of 4004 3976 un848922.exe qu1433.exe PID 3976 wrote to memory of 4004 3976 un848922.exe qu1433.exe PID 3976 wrote to memory of 4004 3976 un848922.exe qu1433.exe PID 3636 wrote to memory of 4548 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe si338633.exe PID 3636 wrote to memory of 4548 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe si338633.exe PID 3636 wrote to memory of 4548 3636 d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe si338633.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe"C:\Users\Admin\AppData\Local\Temp\d0c99f8d0b4958259da0d2da15ecf5b03f44f71ad6a7d5a562a747b289ca7ea0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un848922.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un848922.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8047.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1433.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1433.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 13564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338633.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338633.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3336 -ip 33361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4004 -ip 40041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338633.exeFilesize
175KB
MD520e5864a374b7f98504edb0a181061a8
SHA11a8513630a7e609eaf1624e1362a2d8395e47121
SHA2561bff5dd627d1d0e7681f6508d2c232be12f86ffef0bc4a4c87b48a5dcc3ecc98
SHA5129895f65400c818dfd271785132d0f2cd5be3c9aa750aec882ebc636b19628202ece774a40242733a1e3a5a40d5bcc7c7fd0925bd5e40e2964cef8b238c735133
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338633.exeFilesize
175KB
MD520e5864a374b7f98504edb0a181061a8
SHA11a8513630a7e609eaf1624e1362a2d8395e47121
SHA2561bff5dd627d1d0e7681f6508d2c232be12f86ffef0bc4a4c87b48a5dcc3ecc98
SHA5129895f65400c818dfd271785132d0f2cd5be3c9aa750aec882ebc636b19628202ece774a40242733a1e3a5a40d5bcc7c7fd0925bd5e40e2964cef8b238c735133
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un848922.exeFilesize
541KB
MD5f12f9d57bd1e40b61763be4c579113ef
SHA1e91217a98efbde0eb7fefe9441cc8900d799bff8
SHA2561c7d6d9e35747d1587178cf72dfe32b0e9a76661b6314c9fc3016e4f451b6173
SHA51244d1401dad84be819b2d8ca340d39755e7a3455c461f26a90f4b45d00ac7c91afad43bcd7d189e479c5a8f478ef641f1f36fa352516b712723330f1ce63a6734
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un848922.exeFilesize
541KB
MD5f12f9d57bd1e40b61763be4c579113ef
SHA1e91217a98efbde0eb7fefe9441cc8900d799bff8
SHA2561c7d6d9e35747d1587178cf72dfe32b0e9a76661b6314c9fc3016e4f451b6173
SHA51244d1401dad84be819b2d8ca340d39755e7a3455c461f26a90f4b45d00ac7c91afad43bcd7d189e479c5a8f478ef641f1f36fa352516b712723330f1ce63a6734
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8047.exeFilesize
322KB
MD58a106f4c81431384646001f7d047b906
SHA1fcc67fcfa346906ce534cc4b2800f21924efeb22
SHA256372ebd9b03b076df40958575147d76f74b37ae80e7c9750100fdb81f516ad2f8
SHA51250ac33566032c7d0471de22bf3e99b9b278c2384c7f9ada778b1d3bbfcc9eea5c19003d92726a62b529533ac8118c522e260763d6d9a531aeb5817f3d2c9f964
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8047.exeFilesize
322KB
MD58a106f4c81431384646001f7d047b906
SHA1fcc67fcfa346906ce534cc4b2800f21924efeb22
SHA256372ebd9b03b076df40958575147d76f74b37ae80e7c9750100fdb81f516ad2f8
SHA51250ac33566032c7d0471de22bf3e99b9b278c2384c7f9ada778b1d3bbfcc9eea5c19003d92726a62b529533ac8118c522e260763d6d9a531aeb5817f3d2c9f964
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1433.exeFilesize
379KB
MD54a3c9185d4cf78ec2a278d11fa744173
SHA1417e503160d9057ee8dbf8d3f69259e7f25cb12c
SHA256b458fe0680834ab0d326d7e8901e365ca46d1445017a7ff3ba3a2000a63df7da
SHA512958794d2cae2c27e6e8fbe8047356a3e913cadc5a6c840ead5fcf6a4535a01575ebf52aba78268898e6d09743e15af56cd7247ead6b5e8d5d2959ec598440adb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1433.exeFilesize
379KB
MD54a3c9185d4cf78ec2a278d11fa744173
SHA1417e503160d9057ee8dbf8d3f69259e7f25cb12c
SHA256b458fe0680834ab0d326d7e8901e365ca46d1445017a7ff3ba3a2000a63df7da
SHA512958794d2cae2c27e6e8fbe8047356a3e913cadc5a6c840ead5fcf6a4535a01575ebf52aba78268898e6d09743e15af56cd7247ead6b5e8d5d2959ec598440adb
-
memory/3336-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/3336-149-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-150-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-151-0x00000000072D0000-0x0000000007874000-memory.dmpFilesize
5.6MB
-
memory/3336-153-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-152-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-155-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-157-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-159-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-161-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-163-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-165-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-167-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-169-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-171-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-173-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-175-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-177-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-179-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/3336-180-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3336-182-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-183-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-185-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/3336-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4004-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-218-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-220-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-216-0x0000000002BE0000-0x0000000002C2B000-memory.dmpFilesize
300KB
-
memory/4004-222-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/4004-1101-0x00000000078B0000-0x0000000007EC8000-memory.dmpFilesize
6.1MB
-
memory/4004-1102-0x0000000007ED0000-0x0000000007FDA000-memory.dmpFilesize
1.0MB
-
memory/4004-1103-0x0000000007280000-0x0000000007292000-memory.dmpFilesize
72KB
-
memory/4004-1104-0x00000000072A0000-0x00000000072DC000-memory.dmpFilesize
240KB
-
memory/4004-1105-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-1107-0x0000000008280000-0x0000000008312000-memory.dmpFilesize
584KB
-
memory/4004-1108-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/4004-1109-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-1110-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-1111-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-1112-0x00000000072F0000-0x0000000007300000-memory.dmpFilesize
64KB
-
memory/4004-1113-0x0000000009DE0000-0x0000000009E56000-memory.dmpFilesize
472KB
-
memory/4004-1114-0x0000000009E70000-0x0000000009EC0000-memory.dmpFilesize
320KB
-
memory/4004-1115-0x0000000009EE0000-0x000000000A0A2000-memory.dmpFilesize
1.8MB
-
memory/4004-1116-0x000000000A0B0000-0x000000000A5DC000-memory.dmpFilesize
5.2MB
-
memory/4548-1122-0x0000000000290000-0x00000000002C2000-memory.dmpFilesize
200KB
-
memory/4548-1123-0x0000000004E60000-0x0000000004E70000-memory.dmpFilesize
64KB
-
memory/4548-1124-0x0000000004E60000-0x0000000004E70000-memory.dmpFilesize
64KB