Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:18
Static task
static1
Behavioral task
behavioral1
Sample
bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe
Resource
win10v2004-20230220-en
General
-
Target
bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe
-
Size
683KB
-
MD5
6f32ef190599252f1df996594eed44a2
-
SHA1
0182e4c00716ef2aedff28a5a18625184fe0aa55
-
SHA256
bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c
-
SHA512
9f7eea8e37dde305d0be6b5d7c5c731331c9c9efa606d3306a9972dbb703f9a304efb05e4328823efe1cfc708ad9fc463b5dda26cf3575276ec8169821e6b601
-
SSDEEP
12288:EMrWy90XWQQanvEbjXgShzRJOe/FgNgfUSzmfL3FOCit:iynQQAEbNlOe/0KzmfLVm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8037.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8037.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4788-190-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-191-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-193-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-195-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-199-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-205-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-207-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-202-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-209-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-211-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-213-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-215-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-217-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-219-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-221-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-223-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-225-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/4788-227-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un765290.exepro8037.exequ3538.exesi717887.exepid process 372 un765290.exe 548 pro8037.exe 4788 qu3538.exe 2748 si717887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8037.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8037.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exeun765290.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un765290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un765290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 956 548 WerFault.exe pro8037.exe 4908 4788 WerFault.exe qu3538.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8037.exequ3538.exesi717887.exepid process 548 pro8037.exe 548 pro8037.exe 4788 qu3538.exe 4788 qu3538.exe 2748 si717887.exe 2748 si717887.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8037.exequ3538.exesi717887.exedescription pid process Token: SeDebugPrivilege 548 pro8037.exe Token: SeDebugPrivilege 4788 qu3538.exe Token: SeDebugPrivilege 2748 si717887.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exeun765290.exedescription pid process target process PID 4924 wrote to memory of 372 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe un765290.exe PID 4924 wrote to memory of 372 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe un765290.exe PID 4924 wrote to memory of 372 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe un765290.exe PID 372 wrote to memory of 548 372 un765290.exe pro8037.exe PID 372 wrote to memory of 548 372 un765290.exe pro8037.exe PID 372 wrote to memory of 548 372 un765290.exe pro8037.exe PID 372 wrote to memory of 4788 372 un765290.exe qu3538.exe PID 372 wrote to memory of 4788 372 un765290.exe qu3538.exe PID 372 wrote to memory of 4788 372 un765290.exe qu3538.exe PID 4924 wrote to memory of 2748 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe si717887.exe PID 4924 wrote to memory of 2748 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe si717887.exe PID 4924 wrote to memory of 2748 4924 bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe si717887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe"C:\Users\Admin\AppData\Local\Temp\bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 13404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 548 -ip 5481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4788 -ip 47881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exeFilesize
175KB
MD5dfbed72b462c0ebaf2ce538fb7e261a2
SHA1d0576fd6cb5c0145ce8db372076499bf1ace4934
SHA256adb40a23fde0dad96976e6c0802366d7f2042da295a94e77ed992d1fb624d9a8
SHA5124fc6fa156a36ab2e726dd4c5b4900767201c049ed0b05a07a67ca99f041743ae1e2680ddb1c0bb93ce7bc552100a5a9917f7a27d12e857204deabe50d68cdd2a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exeFilesize
175KB
MD5dfbed72b462c0ebaf2ce538fb7e261a2
SHA1d0576fd6cb5c0145ce8db372076499bf1ace4934
SHA256adb40a23fde0dad96976e6c0802366d7f2042da295a94e77ed992d1fb624d9a8
SHA5124fc6fa156a36ab2e726dd4c5b4900767201c049ed0b05a07a67ca99f041743ae1e2680ddb1c0bb93ce7bc552100a5a9917f7a27d12e857204deabe50d68cdd2a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exeFilesize
541KB
MD53264309627816a7d567ca5e7caa6575b
SHA194bfdd40f609efc34666468be190b9685084af60
SHA25609e52b053b70e9e9fc451d88278c8674ee6eb506310b9773bfdd9e8aa0269d41
SHA512928f318d4415d8fb0a9ea1e60022eb7f4082cc51394350116a985464cb0150ce74020cdf110738e5d33cc5f91c6c7643a14253dc147221e6a8822ed109103753
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exeFilesize
541KB
MD53264309627816a7d567ca5e7caa6575b
SHA194bfdd40f609efc34666468be190b9685084af60
SHA25609e52b053b70e9e9fc451d88278c8674ee6eb506310b9773bfdd9e8aa0269d41
SHA512928f318d4415d8fb0a9ea1e60022eb7f4082cc51394350116a985464cb0150ce74020cdf110738e5d33cc5f91c6c7643a14253dc147221e6a8822ed109103753
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exeFilesize
321KB
MD59c43318a20a2e87744c67a617557cff9
SHA1496e6bf28d59ef8916dda3ff447c30c432195ee6
SHA25603e7c5764776efb1997d401048563d5d84cd3e0ac74cf0f496473c809990c651
SHA512b431a611ce8c306a6c2e1a90ce0abb6aa282c63cc55942afbfc2a0993196a1846ce70d6c0faba203e88351a846a71ce0a57fd60c093ce7ec65fef39895351262
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exeFilesize
321KB
MD59c43318a20a2e87744c67a617557cff9
SHA1496e6bf28d59ef8916dda3ff447c30c432195ee6
SHA25603e7c5764776efb1997d401048563d5d84cd3e0ac74cf0f496473c809990c651
SHA512b431a611ce8c306a6c2e1a90ce0abb6aa282c63cc55942afbfc2a0993196a1846ce70d6c0faba203e88351a846a71ce0a57fd60c093ce7ec65fef39895351262
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exeFilesize
380KB
MD5096df3333d27f27ae362f003266069cf
SHA1c2cdaf94040df03c98ede773c5d0baccca58d9b3
SHA2560d6ac302c3186e26763bf9004ae24463c254e66c67fdd431e397ca37fd674cf3
SHA51281365b5c3f860e68969eaf261cc14133f93c1ca19f305487c37b729809dc3d39471023514ce9267f770b1cfe34a714d66a1aa5348908edf29541c84023097f99
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exeFilesize
380KB
MD5096df3333d27f27ae362f003266069cf
SHA1c2cdaf94040df03c98ede773c5d0baccca58d9b3
SHA2560d6ac302c3186e26763bf9004ae24463c254e66c67fdd431e397ca37fd674cf3
SHA51281365b5c3f860e68969eaf261cc14133f93c1ca19f305487c37b729809dc3d39471023514ce9267f770b1cfe34a714d66a1aa5348908edf29541c84023097f99
-
memory/548-148-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/548-149-0x0000000007300000-0x00000000078A4000-memory.dmpFilesize
5.6MB
-
memory/548-150-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-151-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-153-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-155-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-157-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-159-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-161-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-163-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-165-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-167-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-169-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-171-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-175-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-177-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-173-0x0000000004ED0000-0x0000000004EE2000-memory.dmpFilesize
72KB
-
memory/548-178-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/548-179-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/548-180-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/548-182-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/548-183-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/548-184-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/548-185-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2748-1121-0x0000000000240000-0x0000000000272000-memory.dmpFilesize
200KB
-
memory/2748-1122-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4788-191-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-225-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-195-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-196-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/4788-199-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-201-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-203-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-205-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-207-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-202-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-198-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-209-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-211-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-213-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-215-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-217-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-219-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-221-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-223-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-193-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-227-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-1100-0x0000000007900000-0x0000000007F18000-memory.dmpFilesize
6.1MB
-
memory/4788-1101-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/4788-1102-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/4788-1103-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/4788-1104-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-1106-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-1107-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-1108-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/4788-1109-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/4788-1110-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/4788-1111-0x0000000008CA0000-0x0000000008D16000-memory.dmpFilesize
472KB
-
memory/4788-1112-0x0000000008D30000-0x0000000008D80000-memory.dmpFilesize
320KB
-
memory/4788-190-0x0000000004BE0000-0x0000000004C1F000-memory.dmpFilesize
252KB
-
memory/4788-1113-0x0000000008EB0000-0x0000000009072000-memory.dmpFilesize
1.8MB
-
memory/4788-1114-0x0000000009080000-0x00000000095AC000-memory.dmpFilesize
5.2MB
-
memory/4788-1115-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB