Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:41
Static task
static1
Behavioral task
behavioral1
Sample
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe
Resource
win10v2004-20230220-en
General
-
Target
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe
-
Size
682KB
-
MD5
565bd7f600da882212dee93b68512c9d
-
SHA1
da45f3b132f50b20981f720558aad49e14194f1e
-
SHA256
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5
-
SHA512
aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e
-
SSDEEP
12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1457.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1457.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3760-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3760-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un067958.exepro1457.exequ1374.exesi363001.exepid process 4568 un067958.exe 456 pro1457.exe 3760 qu1374.exe 4572 si363001.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1457.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1457.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exeun067958.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un067958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un067958.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4924 456 WerFault.exe pro1457.exe 4496 3760 WerFault.exe qu1374.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1457.exequ1374.exesi363001.exepid process 456 pro1457.exe 456 pro1457.exe 3760 qu1374.exe 3760 qu1374.exe 4572 si363001.exe 4572 si363001.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1457.exequ1374.exesi363001.exedescription pid process Token: SeDebugPrivilege 456 pro1457.exe Token: SeDebugPrivilege 3760 qu1374.exe Token: SeDebugPrivilege 4572 si363001.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exeun067958.exedescription pid process target process PID 4212 wrote to memory of 4568 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe un067958.exe PID 4212 wrote to memory of 4568 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe un067958.exe PID 4212 wrote to memory of 4568 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe un067958.exe PID 4568 wrote to memory of 456 4568 un067958.exe pro1457.exe PID 4568 wrote to memory of 456 4568 un067958.exe pro1457.exe PID 4568 wrote to memory of 456 4568 un067958.exe pro1457.exe PID 4568 wrote to memory of 3760 4568 un067958.exe qu1374.exe PID 4568 wrote to memory of 3760 4568 un067958.exe qu1374.exe PID 4568 wrote to memory of 3760 4568 un067958.exe qu1374.exe PID 4212 wrote to memory of 4572 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe si363001.exe PID 4212 wrote to memory of 4572 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe si363001.exe PID 4212 wrote to memory of 4572 4212 121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe si363001.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe"C:\Users\Admin\AppData\Local\Temp\121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 456 -ip 4561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3760 -ip 37601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exeFilesize
175KB
MD59df3b75ffc090517685e2793aee73a2c
SHA18baa4a1d5f43ff3e593101e5c8fd2826cc2e21c1
SHA256b014dbfff4cbfc6efe103ed5f85912460d81cc290bac2f80b1c527cd30cbba13
SHA512199ce2c78a05c8326e5fb256053921815fa501c8603e3e3b50559a3392ba2d70124f40c6f5f93b829f956f0f7ff87c0a2f2a01d936862789b21441a8b9decdbc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exeFilesize
175KB
MD59df3b75ffc090517685e2793aee73a2c
SHA18baa4a1d5f43ff3e593101e5c8fd2826cc2e21c1
SHA256b014dbfff4cbfc6efe103ed5f85912460d81cc290bac2f80b1c527cd30cbba13
SHA512199ce2c78a05c8326e5fb256053921815fa501c8603e3e3b50559a3392ba2d70124f40c6f5f93b829f956f0f7ff87c0a2f2a01d936862789b21441a8b9decdbc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exeFilesize
540KB
MD5ee75c19736bdc4cede57204370706cb7
SHA124a77f980725e20f1bc866c488fa8eeca76668ad
SHA256eed09910ec0b538a160a6a857ac84c67475353632bfd8e0c520b9ac8b0901c0d
SHA51207d75a4f103f6d20258edeb8c4ca1176212106f874f39038301396d83b7ff40e567cc00713713db285f44f6192ce45face03b85edd76134822a6dc64f1fb4a46
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exeFilesize
540KB
MD5ee75c19736bdc4cede57204370706cb7
SHA124a77f980725e20f1bc866c488fa8eeca76668ad
SHA256eed09910ec0b538a160a6a857ac84c67475353632bfd8e0c520b9ac8b0901c0d
SHA51207d75a4f103f6d20258edeb8c4ca1176212106f874f39038301396d83b7ff40e567cc00713713db285f44f6192ce45face03b85edd76134822a6dc64f1fb4a46
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exeFilesize
321KB
MD5c7c85e6fc9b608f780ef1e4b648adcc8
SHA1edde48b1e0bc835ba45d10f6cc9e52af39538352
SHA256f769ea33c303e37c6857be37ae316b473dfc1e8d57726cefefb4eb747438b570
SHA512cfad07c07993b14f220d4d27d23b902f62819a2d212ea8ad5047faa8b42590ad42961ad36271f5f14c9de05088ecf4b4494c84f831d04d256d62803e071d074f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exeFilesize
321KB
MD5c7c85e6fc9b608f780ef1e4b648adcc8
SHA1edde48b1e0bc835ba45d10f6cc9e52af39538352
SHA256f769ea33c303e37c6857be37ae316b473dfc1e8d57726cefefb4eb747438b570
SHA512cfad07c07993b14f220d4d27d23b902f62819a2d212ea8ad5047faa8b42590ad42961ad36271f5f14c9de05088ecf4b4494c84f831d04d256d62803e071d074f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exeFilesize
380KB
MD5050665b6f14452637b044ead1f4ba324
SHA181f178c18cafaf4b885afd4e1a2cdfee7c261e1a
SHA256b0689b159dbf4f3f2dd0800ea8d214f55920f6ff9212d05c7c67137c29b1919f
SHA5128d4f2931685fed2ef8b617dd9b7d06115497dedfdc7b5ada76abcea608a912bfcf5ca776d226970bc206afc332eea17bf187c497ee225368de41965a3a7adad5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exeFilesize
380KB
MD5050665b6f14452637b044ead1f4ba324
SHA181f178c18cafaf4b885afd4e1a2cdfee7c261e1a
SHA256b0689b159dbf4f3f2dd0800ea8d214f55920f6ff9212d05c7c67137c29b1919f
SHA5128d4f2931685fed2ef8b617dd9b7d06115497dedfdc7b5ada76abcea608a912bfcf5ca776d226970bc206afc332eea17bf187c497ee225368de41965a3a7adad5
-
memory/456-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/456-149-0x00000000072C0000-0x0000000007864000-memory.dmpFilesize
5.6MB
-
memory/456-150-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-151-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-152-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-153-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-154-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-156-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-158-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-160-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-162-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-164-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-166-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-168-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-170-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-172-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-174-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-178-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-176-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-180-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/456-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/456-182-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-183-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-184-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/456-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3760-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-198-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3760-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-199-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-201-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-203-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/3760-1101-0x0000000007980000-0x0000000007F98000-memory.dmpFilesize
6.1MB
-
memory/3760-1102-0x0000000007FA0000-0x00000000080AA000-memory.dmpFilesize
1.0MB
-
memory/3760-1103-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/3760-1104-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/3760-1105-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-1107-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-1108-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-1109-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-1110-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/3760-1111-0x0000000008500000-0x0000000008566000-memory.dmpFilesize
408KB
-
memory/3760-1112-0x0000000008D00000-0x0000000008D92000-memory.dmpFilesize
584KB
-
memory/3760-1114-0x0000000008F00000-0x00000000090C2000-memory.dmpFilesize
1.8MB
-
memory/3760-1115-0x00000000090E0000-0x000000000960C000-memory.dmpFilesize
5.2MB
-
memory/3760-1116-0x0000000009950000-0x00000000099C6000-memory.dmpFilesize
472KB
-
memory/3760-1117-0x00000000099E0000-0x0000000009A30000-memory.dmpFilesize
320KB
-
memory/4572-1123-0x0000000000530000-0x0000000000562000-memory.dmpFilesize
200KB
-
memory/4572-1124-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB