Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:19
Static task
static1
Behavioral task
behavioral1
Sample
98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe
Resource
win10v2004-20230220-en
General
-
Target
98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe
-
Size
682KB
-
MD5
3dfc60aa1219b4825085c40e401dce4b
-
SHA1
87bf897ca63baa7d6b5001a2e851b37201f9d178
-
SHA256
98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb
-
SHA512
0ff4d4a869cb2a97b14d8448e9e605140bce308ed2ac7ec125df69c029eab618c54bd0341fbf13244b68420d0162b3a8953f64dfad3aa97d1737d12566c6327e
-
SSDEEP
12288:wMrUy90lfS7blrmTke+fRrxOGMIv7lVGWee2UTGmsLHZptLhrNRCK:0yH75rm4eqr087/ee2/msL5ptLh+K
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6389.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6389.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6389.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/652-194-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-195-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-197-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-199-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-203-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-201-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-205-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-207-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-209-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-211-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-213-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-215-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-217-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-219-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-221-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-223-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-225-0x0000000004820000-0x000000000485F000-memory.dmp family_redline behavioral1/memory/652-227-0x0000000004820000-0x000000000485F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un266796.exepro6389.exequ9611.exesi473013.exepid process 1764 un266796.exe 2108 pro6389.exe 652 qu9611.exe 944 si473013.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6389.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6389.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exeun266796.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un266796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un266796.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3820 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3676 2108 WerFault.exe pro6389.exe 408 652 WerFault.exe qu9611.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6389.exequ9611.exesi473013.exepid process 2108 pro6389.exe 2108 pro6389.exe 652 qu9611.exe 652 qu9611.exe 944 si473013.exe 944 si473013.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6389.exequ9611.exesi473013.exedescription pid process Token: SeDebugPrivilege 2108 pro6389.exe Token: SeDebugPrivilege 652 qu9611.exe Token: SeDebugPrivilege 944 si473013.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exeun266796.exedescription pid process target process PID 3816 wrote to memory of 1764 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe un266796.exe PID 3816 wrote to memory of 1764 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe un266796.exe PID 3816 wrote to memory of 1764 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe un266796.exe PID 1764 wrote to memory of 2108 1764 un266796.exe pro6389.exe PID 1764 wrote to memory of 2108 1764 un266796.exe pro6389.exe PID 1764 wrote to memory of 2108 1764 un266796.exe pro6389.exe PID 1764 wrote to memory of 652 1764 un266796.exe qu9611.exe PID 1764 wrote to memory of 652 1764 un266796.exe qu9611.exe PID 1764 wrote to memory of 652 1764 un266796.exe qu9611.exe PID 3816 wrote to memory of 944 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe si473013.exe PID 3816 wrote to memory of 944 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe si473013.exe PID 3816 wrote to memory of 944 3816 98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe si473013.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe"C:\Users\Admin\AppData\Local\Temp\98c5d2b587b59769d05a630f008db95dec2d54b242ef482d9534217f6a52cbeb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6389.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9611.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473013.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2108 -ip 21081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 652 -ip 6521⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473013.exeFilesize
175KB
MD5f5cb6fdbf7e4748376f76309440f4370
SHA1d1d85e286eb80b1740fed9ede69240ab9c70b56a
SHA2563dc70e67cf2fb7e6221470fef10666c09b458e9e68956316acc2af9916918e2b
SHA51242df0eca4ddd287b76ff98d04f2747a4118ac82d197a2498a62c23586369dab13933906c66c041df97357d3082856b2f0ba3f6fcade6764cd8af8d2bc8b457b3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473013.exeFilesize
175KB
MD5f5cb6fdbf7e4748376f76309440f4370
SHA1d1d85e286eb80b1740fed9ede69240ab9c70b56a
SHA2563dc70e67cf2fb7e6221470fef10666c09b458e9e68956316acc2af9916918e2b
SHA51242df0eca4ddd287b76ff98d04f2747a4118ac82d197a2498a62c23586369dab13933906c66c041df97357d3082856b2f0ba3f6fcade6764cd8af8d2bc8b457b3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266796.exeFilesize
540KB
MD5397a6f46b8f4816fdab3dd2fb6df32ab
SHA15cce5443b6ddc5251d7dc0736e90327460528f06
SHA25683388ff488b1086b844ceda4018482b2e35ea1851bcede7cc65da6123a4adce4
SHA51238c62070561b834ae790c0512028a05fca91d6fde535be168b3c810a7fe39056c7f59eea77f6e4b48f999782a65012d5839f82133bcb09908be311e71abe8322
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266796.exeFilesize
540KB
MD5397a6f46b8f4816fdab3dd2fb6df32ab
SHA15cce5443b6ddc5251d7dc0736e90327460528f06
SHA25683388ff488b1086b844ceda4018482b2e35ea1851bcede7cc65da6123a4adce4
SHA51238c62070561b834ae790c0512028a05fca91d6fde535be168b3c810a7fe39056c7f59eea77f6e4b48f999782a65012d5839f82133bcb09908be311e71abe8322
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6389.exeFilesize
321KB
MD5f9127da09741f879befe88d6d6c2d038
SHA182f2e8bb22b67958f52b0cd87d81c7e97cd65906
SHA256b8ab0fad8b158d4a84dcfe09d5a57ca918f974c9b892cb8f6d139653813421c1
SHA5126ca182c36ea4c00a0b3b5d13593325074bc3dc32593d9716de7c8cefe09d6bf72ed98fe6ed299985d3cfb3e65ff75cdb44e83d6f8bd83b75ea669a1de02d855c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6389.exeFilesize
321KB
MD5f9127da09741f879befe88d6d6c2d038
SHA182f2e8bb22b67958f52b0cd87d81c7e97cd65906
SHA256b8ab0fad8b158d4a84dcfe09d5a57ca918f974c9b892cb8f6d139653813421c1
SHA5126ca182c36ea4c00a0b3b5d13593325074bc3dc32593d9716de7c8cefe09d6bf72ed98fe6ed299985d3cfb3e65ff75cdb44e83d6f8bd83b75ea669a1de02d855c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9611.exeFilesize
380KB
MD5440df20efb4facc9c3b6e609fc405b64
SHA145e5b9fa3695429c996fd5a49b4ab42ca85391ad
SHA256d7f6246fc7ebaa4ddccca50f335881a4d6c8ae78cbd6308acd2255bd89bf2910
SHA512046250f6a4de90be31a7cde5550f4ae78188db3021fa6b5ba55d7394e14dbb7de58b7e2a0c0d9a67aab8b20f14a2792dc4e1a4f28b41adf89dd0df6bab32fdbc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9611.exeFilesize
380KB
MD5440df20efb4facc9c3b6e609fc405b64
SHA145e5b9fa3695429c996fd5a49b4ab42ca85391ad
SHA256d7f6246fc7ebaa4ddccca50f335881a4d6c8ae78cbd6308acd2255bd89bf2910
SHA512046250f6a4de90be31a7cde5550f4ae78188db3021fa6b5ba55d7394e14dbb7de58b7e2a0c0d9a67aab8b20f14a2792dc4e1a4f28b41adf89dd0df6bab32fdbc
-
memory/652-227-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-1102-0x0000000007F60000-0x000000000806A000-memory.dmpFilesize
1.0MB
-
memory/652-1115-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-1114-0x0000000008D00000-0x000000000922C000-memory.dmpFilesize
5.2MB
-
memory/652-1113-0x0000000008B30000-0x0000000008CF2000-memory.dmpFilesize
1.8MB
-
memory/652-1112-0x0000000008AB0000-0x0000000008B00000-memory.dmpFilesize
320KB
-
memory/652-1111-0x0000000008A20000-0x0000000008A96000-memory.dmpFilesize
472KB
-
memory/652-1110-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-1109-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-1108-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/652-1107-0x0000000008280000-0x0000000008312000-memory.dmpFilesize
584KB
-
memory/652-1105-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-1104-0x00000000072A0000-0x00000000072DC000-memory.dmpFilesize
240KB
-
memory/652-1103-0x0000000007280000-0x0000000007292000-memory.dmpFilesize
72KB
-
memory/652-1101-0x0000000007940000-0x0000000007F58000-memory.dmpFilesize
6.1MB
-
memory/652-245-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-225-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-223-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-221-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-219-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-217-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-215-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-213-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-191-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/652-192-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-193-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/652-194-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-195-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-197-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-199-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-203-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-201-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-205-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-207-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-209-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/652-211-0x0000000004820000-0x000000000485F000-memory.dmpFilesize
252KB
-
memory/944-1121-0x0000000000DE0000-0x0000000000E12000-memory.dmpFilesize
200KB
-
memory/944-1122-0x0000000005670000-0x0000000005680000-memory.dmpFilesize
64KB
-
memory/2108-175-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-181-0x0000000002C80000-0x0000000002CAD000-memory.dmpFilesize
180KB
-
memory/2108-171-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-183-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2108-169-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-150-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-180-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2108-167-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-155-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-177-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-151-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-173-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-184-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2108-185-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2108-179-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-165-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-163-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-161-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-160-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2108-158-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/2108-157-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2108-149-0x00000000071D0000-0x0000000007774000-memory.dmpFilesize
5.6MB
-
memory/2108-148-0x0000000002C80000-0x0000000002CAD000-memory.dmpFilesize
180KB
-
memory/2108-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2108-153-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB