Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:07
Static task
static1
Behavioral task
behavioral1
Sample
899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe
Resource
win10v2004-20230220-en
General
-
Target
899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe
-
Size
683KB
-
MD5
83d2598758b148c155d818a41b760db8
-
SHA1
54a4e23def06455ef8351f51a8cb4f87d0b1b3e5
-
SHA256
899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a
-
SHA512
0be1efc750494449cc69f91f43ff81818ba6b46d0344b016ed28647b628ce65e1f4e405854c371014a023fdab3281cbed0f8aae67658804732ecb5e4487f71c0
-
SSDEEP
12288:yMryy90I6pHJ5rEfv6TOk3/Es6fEscGzLzBOUgLmJL3jb3qlm:syurrEf9YVpyAjmJLzb3v
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0286.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0286.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4984-194-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-195-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-197-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-199-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-201-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-205-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-203-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-207-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-209-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-211-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-213-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-215-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-217-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-219-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-221-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-223-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-225-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4984-227-0x0000000007720000-0x000000000775F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un300090.exepro0286.exequ5345.exesi948438.exepid process 4544 un300090.exe 704 pro0286.exe 4984 qu5345.exe 1112 si948438.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0286.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0286.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exeun300090.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un300090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un300090.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4168 704 WerFault.exe pro0286.exe 1412 4984 WerFault.exe qu5345.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0286.exequ5345.exesi948438.exepid process 704 pro0286.exe 704 pro0286.exe 4984 qu5345.exe 4984 qu5345.exe 1112 si948438.exe 1112 si948438.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0286.exequ5345.exesi948438.exedescription pid process Token: SeDebugPrivilege 704 pro0286.exe Token: SeDebugPrivilege 4984 qu5345.exe Token: SeDebugPrivilege 1112 si948438.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exeun300090.exedescription pid process target process PID 1908 wrote to memory of 4544 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe un300090.exe PID 1908 wrote to memory of 4544 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe un300090.exe PID 1908 wrote to memory of 4544 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe un300090.exe PID 4544 wrote to memory of 704 4544 un300090.exe pro0286.exe PID 4544 wrote to memory of 704 4544 un300090.exe pro0286.exe PID 4544 wrote to memory of 704 4544 un300090.exe pro0286.exe PID 4544 wrote to memory of 4984 4544 un300090.exe qu5345.exe PID 4544 wrote to memory of 4984 4544 un300090.exe qu5345.exe PID 4544 wrote to memory of 4984 4544 un300090.exe qu5345.exe PID 1908 wrote to memory of 1112 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe si948438.exe PID 1908 wrote to memory of 1112 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe si948438.exe PID 1908 wrote to memory of 1112 1908 899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe si948438.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe"C:\Users\Admin\AppData\Local\Temp\899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 17444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 704 -ip 7041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4984 -ip 49841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exeFilesize
175KB
MD56422b9e8e888718f9d6c7e2ebbd37c13
SHA15c8b8aea03728a1a218e4b9c1b9fc70ecf004e0b
SHA256fd60b66e7dd95e149fd14f616fb2392e70af93b643b9b8c62777d50ae759418c
SHA5128a21fceba53fef5a843b80669bc8f027a93ea2a55cea36ba3902eb960703a7492613da6855d552ab4dacd2cd29846adf106687d0f445673b5a1110bbe2a4aeea
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exeFilesize
175KB
MD56422b9e8e888718f9d6c7e2ebbd37c13
SHA15c8b8aea03728a1a218e4b9c1b9fc70ecf004e0b
SHA256fd60b66e7dd95e149fd14f616fb2392e70af93b643b9b8c62777d50ae759418c
SHA5128a21fceba53fef5a843b80669bc8f027a93ea2a55cea36ba3902eb960703a7492613da6855d552ab4dacd2cd29846adf106687d0f445673b5a1110bbe2a4aeea
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exeFilesize
541KB
MD5d77d49a56699276f8140063b2b71ceb6
SHA15b04cb5a9bbeac1886763d4a85ddd0fe0c27d039
SHA25696cd549759bfa9ef95ebaf4986bea69dd1600253da9f29b26ea18726c19ce92a
SHA512fc41eb2a654673ab1767011c9d6c458141c1345434059b79ac54821993d2b15fe6f89fee861710d8139e7b3293fa789fc55b7abcb4cb7af75b884f31283d5762
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exeFilesize
541KB
MD5d77d49a56699276f8140063b2b71ceb6
SHA15b04cb5a9bbeac1886763d4a85ddd0fe0c27d039
SHA25696cd549759bfa9ef95ebaf4986bea69dd1600253da9f29b26ea18726c19ce92a
SHA512fc41eb2a654673ab1767011c9d6c458141c1345434059b79ac54821993d2b15fe6f89fee861710d8139e7b3293fa789fc55b7abcb4cb7af75b884f31283d5762
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exeFilesize
321KB
MD54c36771fbb6b47a5fd6ff53908dca5b3
SHA1e3b437e24eadba9a16f5bbd54c3568b20d4afce3
SHA25698069159b254c206e836b418f97306f221f10f2faf064bed496ceb436ff5afa6
SHA51201c825b07e50f9ed401c38ae3fc31d18c31a9a2450f9dcd9a1ed1a1c43e787b76b59bb3b84227045bf9f287ab5eb7d690c07333f57f6525cea56ab28c57bee4c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exeFilesize
321KB
MD54c36771fbb6b47a5fd6ff53908dca5b3
SHA1e3b437e24eadba9a16f5bbd54c3568b20d4afce3
SHA25698069159b254c206e836b418f97306f221f10f2faf064bed496ceb436ff5afa6
SHA51201c825b07e50f9ed401c38ae3fc31d18c31a9a2450f9dcd9a1ed1a1c43e787b76b59bb3b84227045bf9f287ab5eb7d690c07333f57f6525cea56ab28c57bee4c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exeFilesize
380KB
MD5c57aaac67f045db8a2384e7c7c1f14ad
SHA18f57779d8f24b1f83fd3556270fc28e3e264d437
SHA25641d007d86d30b480f4c1c7dbf4daf1229f2994b043d2d68ebd6b9c818ba1e410
SHA512d9fe677e6a198240a15d33638394021d3a42e43eb0c76922fe2971b1baf9f9f3b1fe668d43cb87a4217441c8a6fb935485d4e67aa99b34dbacaa3d6fea08222f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exeFilesize
380KB
MD5c57aaac67f045db8a2384e7c7c1f14ad
SHA18f57779d8f24b1f83fd3556270fc28e3e264d437
SHA25641d007d86d30b480f4c1c7dbf4daf1229f2994b043d2d68ebd6b9c818ba1e410
SHA512d9fe677e6a198240a15d33638394021d3a42e43eb0c76922fe2971b1baf9f9f3b1fe668d43cb87a4217441c8a6fb935485d4e67aa99b34dbacaa3d6fea08222f
-
memory/704-158-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-168-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-151-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-150-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-152-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-153-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-154-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-156-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-148-0x00000000070F0000-0x0000000007694000-memory.dmpFilesize
5.6MB
-
memory/704-160-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-162-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-164-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-166-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-149-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/704-170-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-172-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-174-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-176-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-178-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-180-0x00000000076A0000-0x00000000076B2000-memory.dmpFilesize
72KB
-
memory/704-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/704-182-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-184-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-183-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/704-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1112-1121-0x0000000000040000-0x0000000000072000-memory.dmpFilesize
200KB
-
memory/1112-1122-0x00000000048F0000-0x0000000004900000-memory.dmpFilesize
64KB
-
memory/4984-191-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/4984-223-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-195-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-193-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-197-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-199-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-201-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-205-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-203-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-207-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-209-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-211-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-213-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-215-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-217-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-219-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-221-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-194-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-225-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-227-0x0000000007720000-0x000000000775F000-memory.dmpFilesize
252KB
-
memory/4984-1100-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/4984-1101-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/4984-1102-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/4984-1103-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/4984-1104-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-1106-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/4984-1107-0x0000000008A70000-0x0000000008B02000-memory.dmpFilesize
584KB
-
memory/4984-1108-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-1109-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-1110-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-1111-0x0000000008CC0000-0x0000000008D36000-memory.dmpFilesize
472KB
-
memory/4984-1112-0x0000000008D50000-0x0000000008DA0000-memory.dmpFilesize
320KB
-
memory/4984-192-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/4984-1113-0x0000000008DB0000-0x0000000008F72000-memory.dmpFilesize
1.8MB
-
memory/4984-1114-0x0000000008F80000-0x00000000094AC000-memory.dmpFilesize
5.2MB
-
memory/4984-1115-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB