Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe
Resource
win10v2004-20230220-en
General
-
Target
39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe
-
Size
683KB
-
MD5
081161c6465db8861adccd529b205aa4
-
SHA1
07042eb39b99bdf31003cc3ea3a1705a158d3ba7
-
SHA256
39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a
-
SHA512
79144611c8823c81ba5ca69d25f82c1eef69cfc82fbe214a84d9652e2e5c89d444eff8059dbcc1e17ceecaa123e50b50068f9e41441abae5062f5a1cdb78a216
-
SSDEEP
12288:MMriy90lmePo/RYemFqD4xAj0dNauAeS2As38gLfJZ4aWbrk2lqPS:WyDigGtFqkG7uN3DTRqNqq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7678.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7678.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7678.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1372-195-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-193-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-198-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-200-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-202-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-204-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-206-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-208-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-210-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-212-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-214-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-216-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-218-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-220-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-222-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-224-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-226-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1372-228-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un816425.exepro7678.exequ3026.exesi246222.exepid process 3192 un816425.exe 4668 pro7678.exe 1372 qu3026.exe 4900 si246222.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7678.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7678.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exeun816425.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un816425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un816425.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 872 4668 WerFault.exe pro7678.exe 452 1372 WerFault.exe qu3026.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7678.exequ3026.exesi246222.exepid process 4668 pro7678.exe 4668 pro7678.exe 1372 qu3026.exe 1372 qu3026.exe 4900 si246222.exe 4900 si246222.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7678.exequ3026.exesi246222.exedescription pid process Token: SeDebugPrivilege 4668 pro7678.exe Token: SeDebugPrivilege 1372 qu3026.exe Token: SeDebugPrivilege 4900 si246222.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exeun816425.exedescription pid process target process PID 4416 wrote to memory of 3192 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe un816425.exe PID 4416 wrote to memory of 3192 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe un816425.exe PID 4416 wrote to memory of 3192 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe un816425.exe PID 3192 wrote to memory of 4668 3192 un816425.exe pro7678.exe PID 3192 wrote to memory of 4668 3192 un816425.exe pro7678.exe PID 3192 wrote to memory of 4668 3192 un816425.exe pro7678.exe PID 3192 wrote to memory of 1372 3192 un816425.exe qu3026.exe PID 3192 wrote to memory of 1372 3192 un816425.exe qu3026.exe PID 3192 wrote to memory of 1372 3192 un816425.exe qu3026.exe PID 4416 wrote to memory of 4900 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe si246222.exe PID 4416 wrote to memory of 4900 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe si246222.exe PID 4416 wrote to memory of 4900 4416 39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe si246222.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe"C:\Users\Admin\AppData\Local\Temp\39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 11324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4668 -ip 46681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1372 -ip 13721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exeFilesize
175KB
MD5c0a286fc30b6dd42c8a7a4d571b8a1d4
SHA10563597d446f01302599a148e43c0c0e3e6ddbb5
SHA256db5c8693d0b5dd591727eb78aeb6b873e7c51fac179babf3dcd1f5e67f96022d
SHA51245bc79ab008c8202e035cc5757721229719a14ed20d8419db8d22de2f5b7a1f003210e8d8e2670190617b5b6cdf3ef2f2b63b08dd30f37a58826a3af56fd5eba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exeFilesize
175KB
MD5c0a286fc30b6dd42c8a7a4d571b8a1d4
SHA10563597d446f01302599a148e43c0c0e3e6ddbb5
SHA256db5c8693d0b5dd591727eb78aeb6b873e7c51fac179babf3dcd1f5e67f96022d
SHA51245bc79ab008c8202e035cc5757721229719a14ed20d8419db8d22de2f5b7a1f003210e8d8e2670190617b5b6cdf3ef2f2b63b08dd30f37a58826a3af56fd5eba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exeFilesize
541KB
MD5dd28253ce00a93cfa6825723e07f4eef
SHA19edbaaa28642db68679af6b2a68a9ad779abf06f
SHA25663a762bdd311bbd000b75783a55576f5e6ecd8b3ec1f21ed26d4bf438d1da0c1
SHA5121dc9cccaf6c90a78723b2ae639236114998ad1d2e6c5432e39ec5f54317358a51ceaab9859415a4bf4dabfb62bbdc23c21f28b992d90cf3319a29f68470a4811
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exeFilesize
541KB
MD5dd28253ce00a93cfa6825723e07f4eef
SHA19edbaaa28642db68679af6b2a68a9ad779abf06f
SHA25663a762bdd311bbd000b75783a55576f5e6ecd8b3ec1f21ed26d4bf438d1da0c1
SHA5121dc9cccaf6c90a78723b2ae639236114998ad1d2e6c5432e39ec5f54317358a51ceaab9859415a4bf4dabfb62bbdc23c21f28b992d90cf3319a29f68470a4811
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exeFilesize
322KB
MD564ad31c522454dbda0a4efd39069629b
SHA1f7a6f169afb133380b0ee47513655afd6c8c620d
SHA256d11d6990e40d51f9fd971c1264c0135c00ac5b53a5ddcc804bb05c5122500612
SHA5124220c51d6de52e48ea392fa5e6a03af711df3eb7f68b89115f164b8abba6bd035fee03c33ba6a2baacf732d7a8820c31dbdb33b7ef8095f325be9816f5576e0b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exeFilesize
322KB
MD564ad31c522454dbda0a4efd39069629b
SHA1f7a6f169afb133380b0ee47513655afd6c8c620d
SHA256d11d6990e40d51f9fd971c1264c0135c00ac5b53a5ddcc804bb05c5122500612
SHA5124220c51d6de52e48ea392fa5e6a03af711df3eb7f68b89115f164b8abba6bd035fee03c33ba6a2baacf732d7a8820c31dbdb33b7ef8095f325be9816f5576e0b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exeFilesize
379KB
MD5d00b78889346979fa450b16b2018ca85
SHA1d5090ecf12c4b8f66fdd7dbf30b28479bcc23fc1
SHA256349b483eed61c0a4065f2475bdaa7c91b4930f6f2838663f1911e90a07b07b7a
SHA512819b9c97ca8ed7f8cd47974a29415021d749d04046474c5bf246a0ee05ae9859a6fd86a23e78d93efb831498ced5f248b978faf0a84d97fac08ad5f3251b0d31
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exeFilesize
379KB
MD5d00b78889346979fa450b16b2018ca85
SHA1d5090ecf12c4b8f66fdd7dbf30b28479bcc23fc1
SHA256349b483eed61c0a4065f2475bdaa7c91b4930f6f2838663f1911e90a07b07b7a
SHA512819b9c97ca8ed7f8cd47974a29415021d749d04046474c5bf246a0ee05ae9859a6fd86a23e78d93efb831498ced5f248b978faf0a84d97fac08ad5f3251b0d31
-
memory/1372-1102-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/1372-226-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-200-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-202-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-1115-0x00000000096A0000-0x00000000096F0000-memory.dmpFilesize
320KB
-
memory/1372-1114-0x0000000009620000-0x0000000009696000-memory.dmpFilesize
472KB
-
memory/1372-1113-0x0000000008E50000-0x000000000937C000-memory.dmpFilesize
5.2MB
-
memory/1372-1112-0x0000000008C80000-0x0000000008E42000-memory.dmpFilesize
1.8MB
-
memory/1372-1111-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-1110-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-204-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-1109-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-1108-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/1372-1107-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/1372-1105-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/1372-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/1372-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/1372-228-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-214-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-224-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-222-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-220-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-191-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/1372-192-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-196-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-194-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-195-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-193-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-198-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-218-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-1116-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1372-216-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-206-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-208-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-210-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1372-212-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/4668-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4668-172-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4668-151-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-152-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4668-185-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-184-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-182-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-150-0x0000000007340000-0x00000000078E4000-memory.dmpFilesize
5.6MB
-
memory/4668-154-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-180-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-179-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-178-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-176-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-174-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-170-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-168-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-166-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-164-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-162-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-160-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-158-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4668-149-0x0000000007330000-0x0000000007340000-memory.dmpFilesize
64KB
-
memory/4668-156-0x0000000007220000-0x0000000007232000-memory.dmpFilesize
72KB
-
memory/4900-1122-0x0000000000920000-0x0000000000952000-memory.dmpFilesize
200KB
-
memory/4900-1123-0x00000000051D0000-0x00000000051E0000-memory.dmpFilesize
64KB