Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:17
Static task
static1
Behavioral task
behavioral1
Sample
f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe
Resource
win10v2004-20230221-en
General
-
Target
f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe
-
Size
686KB
-
MD5
8b67883d1a23ddb07cac40e63e166ac0
-
SHA1
a68bf5b0be345b5846e6ff65e535ce0457b7b860
-
SHA256
f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e
-
SHA512
790fdd253bb2dc9cd3bfac9159c9ae09e4328f2b5b266881350c7e1622941005f02123dce40dc12658385b9a7af1ad9625d493b69ab6d1e516fcd9596992f665
-
SSDEEP
12288:9MrEy90TaGGghY6aoWNt6Q+vyxEDL71qQJKjfmeKo1UkJtWiZ37ZobB:9ymDhY6Jo9+BL7PJK7go11PZLZ0B
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6724.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6724.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6724.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2832-191-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-193-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-199-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-201-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-203-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-205-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-207-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-209-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-211-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-213-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-215-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-217-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-219-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-221-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-223-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-225-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2832-227-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un356827.exepro6724.exequ3451.exesi895165.exepid process 2652 un356827.exe 1196 pro6724.exe 2832 qu3451.exe 2352 si895165.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6724.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6724.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exeun356827.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un356827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un356827.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2596 1196 WerFault.exe pro6724.exe 2108 2832 WerFault.exe qu3451.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6724.exequ3451.exesi895165.exepid process 1196 pro6724.exe 1196 pro6724.exe 2832 qu3451.exe 2832 qu3451.exe 2352 si895165.exe 2352 si895165.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6724.exequ3451.exesi895165.exedescription pid process Token: SeDebugPrivilege 1196 pro6724.exe Token: SeDebugPrivilege 2832 qu3451.exe Token: SeDebugPrivilege 2352 si895165.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exeun356827.exedescription pid process target process PID 3524 wrote to memory of 2652 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe un356827.exe PID 3524 wrote to memory of 2652 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe un356827.exe PID 3524 wrote to memory of 2652 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe un356827.exe PID 2652 wrote to memory of 1196 2652 un356827.exe pro6724.exe PID 2652 wrote to memory of 1196 2652 un356827.exe pro6724.exe PID 2652 wrote to memory of 1196 2652 un356827.exe pro6724.exe PID 2652 wrote to memory of 2832 2652 un356827.exe qu3451.exe PID 2652 wrote to memory of 2832 2652 un356827.exe qu3451.exe PID 2652 wrote to memory of 2832 2652 un356827.exe qu3451.exe PID 3524 wrote to memory of 2352 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe si895165.exe PID 3524 wrote to memory of 2352 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe si895165.exe PID 3524 wrote to memory of 2352 3524 f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe si895165.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe"C:\Users\Admin\AppData\Local\Temp\f90200bcbcd0600c88be978835fb769c7cb9e7cae23b198ce9b783b4c6e51d1e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356827.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356827.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6724.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6724.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3451.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 11084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si895165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si895165.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1196 -ip 11961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2832 -ip 28321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si895165.exeFilesize
175KB
MD5281e53db87ffdd0f965387d1f5c183ec
SHA159a51ff67d8c9f609aa17bd5815f157c33adad70
SHA25687dc5aa89a8c5dca224e39a0bfaa155ab0a8323469213a74d77b170bd8f674d5
SHA51261b621d54b45052e9469c9d8370126673ba940f25e152e3558be4687c0fc07ad24c5f7017d0e4917d3fe2803abbe2d8c1979618f33507d0909183e92350849f0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si895165.exeFilesize
175KB
MD5281e53db87ffdd0f965387d1f5c183ec
SHA159a51ff67d8c9f609aa17bd5815f157c33adad70
SHA25687dc5aa89a8c5dca224e39a0bfaa155ab0a8323469213a74d77b170bd8f674d5
SHA51261b621d54b45052e9469c9d8370126673ba940f25e152e3558be4687c0fc07ad24c5f7017d0e4917d3fe2803abbe2d8c1979618f33507d0909183e92350849f0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356827.exeFilesize
544KB
MD504ab34d295011498d6b2f3e23fc021cf
SHA17b2b6104800feec76d11147148aeea82b4bbeca4
SHA256c7c3a678aa0bf52d73eac80bbc88af3cab75e8f3ae8e8d828a7dc3fa5f80dbff
SHA5128b28d1498951736a6250db0cc6974d3d099ebb7700b4e55da84d7a75d0c1c665685610a52f2772df9361aad836258eafc28759be9d0af476b4fc02237835e0e1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356827.exeFilesize
544KB
MD504ab34d295011498d6b2f3e23fc021cf
SHA17b2b6104800feec76d11147148aeea82b4bbeca4
SHA256c7c3a678aa0bf52d73eac80bbc88af3cab75e8f3ae8e8d828a7dc3fa5f80dbff
SHA5128b28d1498951736a6250db0cc6974d3d099ebb7700b4e55da84d7a75d0c1c665685610a52f2772df9361aad836258eafc28759be9d0af476b4fc02237835e0e1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6724.exeFilesize
321KB
MD5c065ccfae8700bda1bbe0e009debe128
SHA16da625598e8f8c9fe66f9bd176491eab791aed17
SHA25618dccd6178871b53827fba01b4b4e0147be5b9096ecbc5a09f9475442821cc68
SHA512a71014f21fec214a616dfdefbca99c31f4b9638750f4f8d3a72aed574f4e4260d994ea450a2cd0293540f4e9c759a4dd60609a254bdbbf66fb07ce67daa01bee
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6724.exeFilesize
321KB
MD5c065ccfae8700bda1bbe0e009debe128
SHA16da625598e8f8c9fe66f9bd176491eab791aed17
SHA25618dccd6178871b53827fba01b4b4e0147be5b9096ecbc5a09f9475442821cc68
SHA512a71014f21fec214a616dfdefbca99c31f4b9638750f4f8d3a72aed574f4e4260d994ea450a2cd0293540f4e9c759a4dd60609a254bdbbf66fb07ce67daa01bee
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3451.exeFilesize
380KB
MD592325e89c35c86bf59063302e6de4e51
SHA1edc4d039c257fb8f4c628223a2da0965bb34fb78
SHA25645987a1aa911741a09f60f5d3af0df0be72a409870a63492c6413c3d36958f33
SHA5123ce11020dadd4a7ec5209bf5f66b3f464df77201ca7d1e16f1ce939a5c7034aa40baf5f230db79dd45335149c8e0458738a2c526c318a1fe06092666a9ea9e35
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3451.exeFilesize
380KB
MD592325e89c35c86bf59063302e6de4e51
SHA1edc4d039c257fb8f4c628223a2da0965bb34fb78
SHA25645987a1aa911741a09f60f5d3af0df0be72a409870a63492c6413c3d36958f33
SHA5123ce11020dadd4a7ec5209bf5f66b3f464df77201ca7d1e16f1ce939a5c7034aa40baf5f230db79dd45335149c8e0458738a2c526c318a1fe06092666a9ea9e35
-
memory/1196-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/1196-149-0x00000000071E0000-0x0000000007784000-memory.dmpFilesize
5.6MB
-
memory/1196-150-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-151-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-153-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-155-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-157-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-159-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-161-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-163-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-165-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-167-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-172-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1196-170-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1196-169-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-175-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-173-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-177-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-179-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1196-180-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1196-181-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1196-182-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1196-183-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1196-185-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2352-1122-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/2352-1121-0x0000000000090000-0x00000000000C2000-memory.dmpFilesize
200KB
-
memory/2832-191-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-227-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-195-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-199-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-197-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-201-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-203-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-205-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-207-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-209-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-211-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-213-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-215-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-217-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-219-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-221-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-223-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-225-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-193-0x0000000004DE0000-0x0000000004E1F000-memory.dmpFilesize
252KB
-
memory/2832-1100-0x0000000007820000-0x0000000007E38000-memory.dmpFilesize
6.1MB
-
memory/2832-1101-0x0000000007E40000-0x0000000007F4A000-memory.dmpFilesize
1.0MB
-
memory/2832-1102-0x0000000007F70000-0x0000000007F82000-memory.dmpFilesize
72KB
-
memory/2832-1103-0x0000000007F90000-0x0000000007FCC000-memory.dmpFilesize
240KB
-
memory/2832-1104-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-1106-0x0000000008280000-0x0000000008312000-memory.dmpFilesize
584KB
-
memory/2832-1107-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/2832-1108-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-1109-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-1110-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-1111-0x0000000008B50000-0x0000000008D12000-memory.dmpFilesize
1.8MB
-
memory/2832-1112-0x0000000008D20000-0x000000000924C000-memory.dmpFilesize
5.2MB
-
memory/2832-1113-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-192-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/2832-190-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/2832-1114-0x0000000009620000-0x0000000009696000-memory.dmpFilesize
472KB
-
memory/2832-1115-0x00000000096A0000-0x00000000096F0000-memory.dmpFilesize
320KB