Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:04
Static task
static1
Behavioral task
behavioral1
Sample
01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe
Resource
win10v2004-20230220-en
General
-
Target
01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe
-
Size
686KB
-
MD5
25d303dd8e7bfff1f945dec83de4de4d
-
SHA1
000019ed12a6889eb7983dfd1a151640efbfc816
-
SHA256
01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882
-
SHA512
1c9fb11429229d01143b07db4cc5e9e5457f58f22906f70d686385c4170bb4f245c16e5e9a3b86720d2c8b18d905923f45ac926d934e5a89e980cc2861a509ff
-
SSDEEP
12288:9Mriy9071xFzOc5/XwKMO1gw5/HkRKzAjgyUkfXFylhGqEPXAweBXGGUPYmXcfBl:3y613H6KMRw5tAcyPXYvGxPXqtbrmX8l
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9773.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4120-193-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-192-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-195-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-197-0x00000000072A0000-0x00000000072B0000-memory.dmp family_redline behavioral1/memory/4120-198-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-202-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-204-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-206-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-208-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-210-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-212-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-214-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-216-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-218-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-220-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-222-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-224-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-226-0x0000000007230000-0x000000000726F000-memory.dmp family_redline behavioral1/memory/4120-228-0x0000000007230000-0x000000000726F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un096040.exepro9773.exequ6775.exesi636583.exepid process 3460 un096040.exe 3216 pro9773.exe 4120 qu6775.exe 4496 si636583.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9773.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9773.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exeun096040.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un096040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un096040.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2064 3216 WerFault.exe pro9773.exe 1128 4120 WerFault.exe qu6775.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9773.exequ6775.exesi636583.exepid process 3216 pro9773.exe 3216 pro9773.exe 4120 qu6775.exe 4120 qu6775.exe 4496 si636583.exe 4496 si636583.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9773.exequ6775.exesi636583.exedescription pid process Token: SeDebugPrivilege 3216 pro9773.exe Token: SeDebugPrivilege 4120 qu6775.exe Token: SeDebugPrivilege 4496 si636583.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exeun096040.exedescription pid process target process PID 4340 wrote to memory of 3460 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe un096040.exe PID 4340 wrote to memory of 3460 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe un096040.exe PID 4340 wrote to memory of 3460 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe un096040.exe PID 3460 wrote to memory of 3216 3460 un096040.exe pro9773.exe PID 3460 wrote to memory of 3216 3460 un096040.exe pro9773.exe PID 3460 wrote to memory of 3216 3460 un096040.exe pro9773.exe PID 3460 wrote to memory of 4120 3460 un096040.exe qu6775.exe PID 3460 wrote to memory of 4120 3460 un096040.exe qu6775.exe PID 3460 wrote to memory of 4120 3460 un096040.exe qu6775.exe PID 4340 wrote to memory of 4496 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe si636583.exe PID 4340 wrote to memory of 4496 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe si636583.exe PID 4340 wrote to memory of 4496 4340 01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe si636583.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe"C:\Users\Admin\AppData\Local\Temp\01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 13564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3216 -ip 32161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4120 -ip 41201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exeFilesize
175KB
MD5f976e2da97a965f826b9cfceac5c9567
SHA16fc2e001c8f431390173b5a8a3e062f065a8d89f
SHA25635bba32fef65056e7d090cbf864f2f9ebecd71703b2bdf7d67cab43ed05f6982
SHA512cbeac91dbe97feebede223668a8b294a0fe3c44b85bbedb8b3c4411752608761e2144859165046789aaee9c7b4d55d6693ab5fce0b62c12b97b4c79f4d4ba15d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exeFilesize
175KB
MD5f976e2da97a965f826b9cfceac5c9567
SHA16fc2e001c8f431390173b5a8a3e062f065a8d89f
SHA25635bba32fef65056e7d090cbf864f2f9ebecd71703b2bdf7d67cab43ed05f6982
SHA512cbeac91dbe97feebede223668a8b294a0fe3c44b85bbedb8b3c4411752608761e2144859165046789aaee9c7b4d55d6693ab5fce0b62c12b97b4c79f4d4ba15d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exeFilesize
544KB
MD5666d11b35c8c63b9a14962ace6a38383
SHA11982fe01623714f0a3aaac6989f0ff3cb482dbe3
SHA256ba501c41ff73c109ad862790fa2197060839a14b54c521d31d956173da0c0100
SHA5126e1a59b23f770627d000f95fc075cb21bdfcaf06598c25f56cff25a09cd8ea3c5aeb4368a9e9b0580dcf640dcf67ef3aebda718851c5c1b2d9e275289f0a6ea1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exeFilesize
544KB
MD5666d11b35c8c63b9a14962ace6a38383
SHA11982fe01623714f0a3aaac6989f0ff3cb482dbe3
SHA256ba501c41ff73c109ad862790fa2197060839a14b54c521d31d956173da0c0100
SHA5126e1a59b23f770627d000f95fc075cb21bdfcaf06598c25f56cff25a09cd8ea3c5aeb4368a9e9b0580dcf640dcf67ef3aebda718851c5c1b2d9e275289f0a6ea1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exeFilesize
321KB
MD5da7de2460f55f56729ab5c02ad5810e1
SHA10e0febd5092e756640c1528394d3ef5ce055832b
SHA256ec671a2083ab5a5f12d45381a6685f58ee33f81a2404dbe9bc29afa3ac694c1b
SHA5121c901a9ef39b47b7836d74f9fd99ace455d302e45987d2c988aa3122f93d225df6f1c89c02fe449ff76693b22380ec0b8c0798937f7179cf09f3334b737301ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exeFilesize
321KB
MD5da7de2460f55f56729ab5c02ad5810e1
SHA10e0febd5092e756640c1528394d3ef5ce055832b
SHA256ec671a2083ab5a5f12d45381a6685f58ee33f81a2404dbe9bc29afa3ac694c1b
SHA5121c901a9ef39b47b7836d74f9fd99ace455d302e45987d2c988aa3122f93d225df6f1c89c02fe449ff76693b22380ec0b8c0798937f7179cf09f3334b737301ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exeFilesize
380KB
MD50d802f33f32f4fb849f5f36589807bc5
SHA17957b2d026fe8ea4fd3859fde80cb1116c12111e
SHA256951a5f32cb9c8f545984b71635285756ea14cf2d5c0fe75acbfb7e0e129d4d37
SHA51234316d5bc7409ef291e530774a7bc58b4a56a708620683bdd8aa1305f3060883e93209837ba8a72de15c960580af84dd692e567878d169766af025d0fbde958b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exeFilesize
380KB
MD50d802f33f32f4fb849f5f36589807bc5
SHA17957b2d026fe8ea4fd3859fde80cb1116c12111e
SHA256951a5f32cb9c8f545984b71635285756ea14cf2d5c0fe75acbfb7e0e129d4d37
SHA51234316d5bc7409ef291e530774a7bc58b4a56a708620683bdd8aa1305f3060883e93209837ba8a72de15c960580af84dd692e567878d169766af025d0fbde958b
-
memory/3216-148-0x0000000002C70000-0x0000000002C9D000-memory.dmpFilesize
180KB
-
memory/3216-149-0x00000000074A0000-0x0000000007A44000-memory.dmpFilesize
5.6MB
-
memory/3216-150-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-151-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-152-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-154-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-156-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-158-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-160-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-162-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-164-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-166-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-168-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-170-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-172-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-174-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-176-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-178-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-180-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3216-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/3216-182-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-183-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-184-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/3216-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4120-191-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/4120-193-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-192-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-195-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-197-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-198-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-201-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-202-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-199-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-204-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-206-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-208-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-210-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-212-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-214-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-216-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-218-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-220-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-222-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-224-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-226-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-228-0x0000000007230000-0x000000000726F000-memory.dmpFilesize
252KB
-
memory/4120-1101-0x00000000079D0000-0x0000000007FE8000-memory.dmpFilesize
6.1MB
-
memory/4120-1102-0x0000000008070000-0x000000000817A000-memory.dmpFilesize
1.0MB
-
memory/4120-1103-0x00000000081B0000-0x00000000081C2000-memory.dmpFilesize
72KB
-
memory/4120-1104-0x00000000081D0000-0x000000000820C000-memory.dmpFilesize
240KB
-
memory/4120-1105-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-1107-0x00000000084C0000-0x0000000008552000-memory.dmpFilesize
584KB
-
memory/4120-1108-0x0000000008560000-0x00000000085C6000-memory.dmpFilesize
408KB
-
memory/4120-1109-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/4120-1110-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-1112-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-1111-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4120-1113-0x0000000008DA0000-0x0000000008E16000-memory.dmpFilesize
472KB
-
memory/4120-1114-0x0000000008E30000-0x0000000008E80000-memory.dmpFilesize
320KB
-
memory/4120-1115-0x0000000008EB0000-0x0000000009072000-memory.dmpFilesize
1.8MB
-
memory/4120-1116-0x0000000009090000-0x00000000095BC000-memory.dmpFilesize
5.2MB
-
memory/4120-1117-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/4496-1123-0x00000000003F0000-0x0000000000422000-memory.dmpFilesize
200KB
-
memory/4496-1124-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4496-1125-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB