Analysis
-
max time kernel
106s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe
Resource
win10v2004-20230220-en
General
-
Target
6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe
-
Size
685KB
-
MD5
404a7f193917ea05525f870239a7a074
-
SHA1
b68c6c74ffc546b879b3445e8e6d4a8d044bfec7
-
SHA256
6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8
-
SHA512
fd18f6ca8c468ad357b73842dcc3dbda21cb3988203218f0f1c406ea6fd383ca1593746ab83c493cc1d71ea7c060859f247f813d409bcf029073f133b97dbf4f
-
SSDEEP
12288:SMrCy9099z4M0tuMg6yjC7WR5UZZ07EyDU1kmFL3V+6ca:syY9kP+jCy5Uc7jnmFLFV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4086.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4086.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4086.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3472-193-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-202-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3472-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un172821.exepro4086.exequ0435.exesi821312.exepid process 4720 un172821.exe 4112 pro4086.exe 3472 qu0435.exe 5044 si821312.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4086.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4086.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exeun172821.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un172821.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un172821.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1884 4112 WerFault.exe pro4086.exe 4988 3472 WerFault.exe qu0435.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4086.exequ0435.exesi821312.exepid process 4112 pro4086.exe 4112 pro4086.exe 3472 qu0435.exe 3472 qu0435.exe 5044 si821312.exe 5044 si821312.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4086.exequ0435.exesi821312.exedescription pid process Token: SeDebugPrivilege 4112 pro4086.exe Token: SeDebugPrivilege 3472 qu0435.exe Token: SeDebugPrivilege 5044 si821312.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exeun172821.exedescription pid process target process PID 4784 wrote to memory of 4720 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe un172821.exe PID 4784 wrote to memory of 4720 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe un172821.exe PID 4784 wrote to memory of 4720 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe un172821.exe PID 4720 wrote to memory of 4112 4720 un172821.exe pro4086.exe PID 4720 wrote to memory of 4112 4720 un172821.exe pro4086.exe PID 4720 wrote to memory of 4112 4720 un172821.exe pro4086.exe PID 4720 wrote to memory of 3472 4720 un172821.exe qu0435.exe PID 4720 wrote to memory of 3472 4720 un172821.exe qu0435.exe PID 4720 wrote to memory of 3472 4720 un172821.exe qu0435.exe PID 4784 wrote to memory of 5044 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe si821312.exe PID 4784 wrote to memory of 5044 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe si821312.exe PID 4784 wrote to memory of 5044 4784 6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe si821312.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe"C:\Users\Admin\AppData\Local\Temp\6da29a21821e833ce72b2dd627338d8538249466a494a0fe5a2ff21fb398b7d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172821.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4086.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0435.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0435.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 17004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si821312.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si821312.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4112 -ip 41121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3472 -ip 34721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si821312.exeFilesize
175KB
MD5cd89194897cd7a369c628c34fa18f1ae
SHA126a252b6d8e430a5422c1194ec1d45cf5d5f2381
SHA256c1321fca6e0278800106bb24cd184571a12a24bcc6c867f373df3e8bd32bc5dd
SHA512c6ae6812c501e7fc6f8a98adc2abdbb9e2ad57a9ab31609468bc4ffe9364bb82cfe6a7cdf4fc5ec84c7fd2dcc8be63444ef671536bff02307069c4c8b2f84655
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si821312.exeFilesize
175KB
MD5cd89194897cd7a369c628c34fa18f1ae
SHA126a252b6d8e430a5422c1194ec1d45cf5d5f2381
SHA256c1321fca6e0278800106bb24cd184571a12a24bcc6c867f373df3e8bd32bc5dd
SHA512c6ae6812c501e7fc6f8a98adc2abdbb9e2ad57a9ab31609468bc4ffe9364bb82cfe6a7cdf4fc5ec84c7fd2dcc8be63444ef671536bff02307069c4c8b2f84655
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172821.exeFilesize
542KB
MD554111af3d9eb0977ce0a58225fecaf66
SHA138e65c374410545cf9531da4fe2d3abead2000d0
SHA25671cd2dd0370c07a9bb300aa63a686785d089e407dad87a88847b3bd1538df7be
SHA5120e87a9226a5b8bcedeac47202040a78847fd61f25916bfcc2a7fbbb1a4a713a15228568f67c69711ff8490a805cbdd0ce4e9ebbacc40bfcabc260e159b987dd8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un172821.exeFilesize
542KB
MD554111af3d9eb0977ce0a58225fecaf66
SHA138e65c374410545cf9531da4fe2d3abead2000d0
SHA25671cd2dd0370c07a9bb300aa63a686785d089e407dad87a88847b3bd1538df7be
SHA5120e87a9226a5b8bcedeac47202040a78847fd61f25916bfcc2a7fbbb1a4a713a15228568f67c69711ff8490a805cbdd0ce4e9ebbacc40bfcabc260e159b987dd8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4086.exeFilesize
321KB
MD5577c4ad52bf2a2a3cae2754f105da4c0
SHA1ad43c559c08c4f7d6cf8d71cfe2d929d783a58c3
SHA25672159f015e14924b16192ca1c9eaac233099f42219939932361fc88204788d9e
SHA5126f0c8b850122d5d01a2148a74e265e06ef5a40014a065e592e8e22960cb6651fad6d5852bbfb57d3f0ced1ce70c2935680035958c55060bd2c0ac96206567093
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4086.exeFilesize
321KB
MD5577c4ad52bf2a2a3cae2754f105da4c0
SHA1ad43c559c08c4f7d6cf8d71cfe2d929d783a58c3
SHA25672159f015e14924b16192ca1c9eaac233099f42219939932361fc88204788d9e
SHA5126f0c8b850122d5d01a2148a74e265e06ef5a40014a065e592e8e22960cb6651fad6d5852bbfb57d3f0ced1ce70c2935680035958c55060bd2c0ac96206567093
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0435.exeFilesize
380KB
MD5617fc934b7e6cde5df479713a4fa47e3
SHA1c2a889bae786544efba7c962540e884ce28795bb
SHA25650cb59d0848289aedc0ca1444ed5319bf554a73e74410d08c31fd34b0f4d8164
SHA51256560cd421b770ea053addd0d8089826e70c41d7aa67434661d9ddcbd07c124c0700d19402f023725ec2faaa043315e5aa53ac806625aa5f6ab87bd1ae056100
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0435.exeFilesize
380KB
MD5617fc934b7e6cde5df479713a4fa47e3
SHA1c2a889bae786544efba7c962540e884ce28795bb
SHA25650cb59d0848289aedc0ca1444ed5319bf554a73e74410d08c31fd34b0f4d8164
SHA51256560cd421b770ea053addd0d8089826e70c41d7aa67434661d9ddcbd07c124c0700d19402f023725ec2faaa043315e5aa53ac806625aa5f6ab87bd1ae056100
-
memory/3472-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/3472-226-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-200-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-202-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-1115-0x000000000A1C0000-0x000000000A6EC000-memory.dmpFilesize
5.2MB
-
memory/3472-1114-0x0000000009FF0000-0x000000000A1B2000-memory.dmpFilesize
1.8MB
-
memory/3472-1113-0x0000000008CF0000-0x0000000008D40000-memory.dmpFilesize
320KB
-
memory/3472-1112-0x0000000008C70000-0x0000000008CE6000-memory.dmpFilesize
472KB
-
memory/3472-1111-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/3472-1110-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/3472-204-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-1109-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-1108-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-1107-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-1105-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/3472-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/3472-1101-0x0000000007960000-0x0000000007F78000-memory.dmpFilesize
6.1MB
-
memory/3472-228-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-214-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-224-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-222-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-220-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-191-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3472-193-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-192-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-196-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-195-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-194-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-198-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-218-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-1116-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/3472-216-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-206-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-208-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-210-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3472-212-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/4112-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4112-173-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-148-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/4112-151-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-153-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4112-185-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-184-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-183-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-150-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-155-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-180-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-179-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-178-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/4112-177-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-175-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-171-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-169-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-167-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-165-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-163-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-161-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-159-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/4112-149-0x0000000007240000-0x00000000077E4000-memory.dmpFilesize
5.6MB
-
memory/4112-157-0x00000000070E0000-0x00000000070F2000-memory.dmpFilesize
72KB
-
memory/5044-1122-0x0000000000690000-0x00000000006C2000-memory.dmpFilesize
200KB
-
memory/5044-1123-0x0000000004F20000-0x0000000004F30000-memory.dmpFilesize
64KB