Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:30
Static task
static1
Behavioral task
behavioral1
Sample
4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe
Resource
win10v2004-20230220-en
General
-
Target
4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe
-
Size
684KB
-
MD5
d2ed6d2dc316e07269ac9ee8b583ddad
-
SHA1
e31c8bc60090f6b5a0be27b7740256b60e10f634
-
SHA256
4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50
-
SHA512
bd07f71a0369613949a0f0225edf21da7cea3077cbb85068d9b37fe2803ee03221cae72d5e0b18943410b5d613ce0a87d135a5f370880394bc03a36965a96e23
-
SSDEEP
12288:CMr2y90CLvRYT1T8E0CAph4287g5t49Kyzz0peeILUl2mLL3oY:IyrLRYT1T8gAo2C9Kyzy8NmLLYY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0690.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0690.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-191-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-192-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-194-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-196-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-198-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-200-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-202-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-204-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-206-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-208-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-210-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-212-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-214-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-216-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-218-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-226-0x0000000003090000-0x00000000030A0000-memory.dmp family_redline behavioral1/memory/2172-224-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-228-0x0000000003090000-0x00000000030A0000-memory.dmp family_redline behavioral1/memory/2172-227-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/2172-220-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un958752.exepro0690.exequ1021.exesi923888.exepid process 4116 un958752.exe 4576 pro0690.exe 2172 qu1021.exe 4108 si923888.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0690.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0690.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exeun958752.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un958752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un958752.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 652 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4792 4576 WerFault.exe pro0690.exe 2528 2172 WerFault.exe qu1021.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0690.exequ1021.exesi923888.exepid process 4576 pro0690.exe 4576 pro0690.exe 2172 qu1021.exe 2172 qu1021.exe 4108 si923888.exe 4108 si923888.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0690.exequ1021.exesi923888.exedescription pid process Token: SeDebugPrivilege 4576 pro0690.exe Token: SeDebugPrivilege 2172 qu1021.exe Token: SeDebugPrivilege 4108 si923888.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exeun958752.exedescription pid process target process PID 3480 wrote to memory of 4116 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe un958752.exe PID 3480 wrote to memory of 4116 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe un958752.exe PID 3480 wrote to memory of 4116 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe un958752.exe PID 4116 wrote to memory of 4576 4116 un958752.exe pro0690.exe PID 4116 wrote to memory of 4576 4116 un958752.exe pro0690.exe PID 4116 wrote to memory of 4576 4116 un958752.exe pro0690.exe PID 4116 wrote to memory of 2172 4116 un958752.exe qu1021.exe PID 4116 wrote to memory of 2172 4116 un958752.exe qu1021.exe PID 4116 wrote to memory of 2172 4116 un958752.exe qu1021.exe PID 3480 wrote to memory of 4108 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe si923888.exe PID 3480 wrote to memory of 4108 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe si923888.exe PID 3480 wrote to memory of 4108 3480 4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe si923888.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe"C:\Users\Admin\AppData\Local\Temp\4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 11564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4576 -ip 45761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2172 -ip 21721⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exeFilesize
175KB
MD5ff580fba67bd407cf1fbbfcf0d61612b
SHA1e778846db56b45d61490803ee4fbb95a8bc14fc2
SHA256c8cfa4abf719c1bf9c805567848c23d308db567754eba51425ff331834870b9e
SHA5121cb3e658ef008d318b73b9aa4ece49cbce312c7dfd767655ef9520083085247c0dc2fba0e598dfbc5d6ede6a42f3a8f0dbf43a78b851a603eabdcca7ed370a14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exeFilesize
175KB
MD5ff580fba67bd407cf1fbbfcf0d61612b
SHA1e778846db56b45d61490803ee4fbb95a8bc14fc2
SHA256c8cfa4abf719c1bf9c805567848c23d308db567754eba51425ff331834870b9e
SHA5121cb3e658ef008d318b73b9aa4ece49cbce312c7dfd767655ef9520083085247c0dc2fba0e598dfbc5d6ede6a42f3a8f0dbf43a78b851a603eabdcca7ed370a14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exeFilesize
542KB
MD593aecf0dc3ca45ddc6c6b1903f7d1bd1
SHA16ad88dff36bef44d6509f2eb991e66eaa36f35a6
SHA256bc25abb88fd2d5c1479df5bff139c24e2e44a35621130afe15247dfe91cd2d2c
SHA51259fe2dcec7e447e30be69f28df366d20abbd00cafc661a40459ac5a9360b5167faa201fc14693bb574c27e73efdd17dd3339c0d835dfaeb6256f7faa919ce9e3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exeFilesize
542KB
MD593aecf0dc3ca45ddc6c6b1903f7d1bd1
SHA16ad88dff36bef44d6509f2eb991e66eaa36f35a6
SHA256bc25abb88fd2d5c1479df5bff139c24e2e44a35621130afe15247dfe91cd2d2c
SHA51259fe2dcec7e447e30be69f28df366d20abbd00cafc661a40459ac5a9360b5167faa201fc14693bb574c27e73efdd17dd3339c0d835dfaeb6256f7faa919ce9e3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exeFilesize
321KB
MD516ecd53adaaf887ea550efaaa5548ade
SHA14a499e02bfdbf287b92fca7edc1e622170f7130f
SHA2568f83f28d75c0b8660e33d7bdb3e7251225ac1584b6ebe5ba5e16bf7d18de8796
SHA51219a3a275ad3fe7fb7696e01ded70f5928b13c7511af3b51f6218e2f06d407abc0bcbf1ec89828e67099987d6ed474955be58bf5c0fcf9fb98a45aa83328e6cb0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exeFilesize
321KB
MD516ecd53adaaf887ea550efaaa5548ade
SHA14a499e02bfdbf287b92fca7edc1e622170f7130f
SHA2568f83f28d75c0b8660e33d7bdb3e7251225ac1584b6ebe5ba5e16bf7d18de8796
SHA51219a3a275ad3fe7fb7696e01ded70f5928b13c7511af3b51f6218e2f06d407abc0bcbf1ec89828e67099987d6ed474955be58bf5c0fcf9fb98a45aa83328e6cb0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exeFilesize
380KB
MD57bc5396b12218d7e044c246c4d2d16a9
SHA197718d7e3e22b3c11d69e8d7c4d5ed7f13e989e9
SHA2561ee645283c808a2bb874303e98344884ca134d7d7314a77c355b91b0c4ab6324
SHA5120ab9b73ad533a82183996b1bd620ed98386b118b09cdf5d2f4b90af528fca2fa54767e4653a32584682f1992b6c129ea5c08fcb1152015a8aefc7fe532724f6c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exeFilesize
380KB
MD57bc5396b12218d7e044c246c4d2d16a9
SHA197718d7e3e22b3c11d69e8d7c4d5ed7f13e989e9
SHA2561ee645283c808a2bb874303e98344884ca134d7d7314a77c355b91b0c4ab6324
SHA5120ab9b73ad533a82183996b1bd620ed98386b118b09cdf5d2f4b90af528fca2fa54767e4653a32584682f1992b6c129ea5c08fcb1152015a8aefc7fe532724f6c
-
memory/2172-1102-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/2172-1103-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-223-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-221-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/2172-218-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-208-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-1116-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-1115-0x0000000009540000-0x0000000009590000-memory.dmpFilesize
320KB
-
memory/2172-1114-0x00000000094C0000-0x0000000009536000-memory.dmpFilesize
472KB
-
memory/2172-1113-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-1112-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-1111-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-1110-0x0000000008E50000-0x000000000937C000-memory.dmpFilesize
5.2MB
-
memory/2172-210-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-1109-0x0000000008C80000-0x0000000008E42000-memory.dmpFilesize
1.8MB
-
memory/2172-1108-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/2172-1107-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/2172-1105-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/2172-1104-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/2172-226-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/2172-220-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-227-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-191-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-192-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-212-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-196-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-198-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-200-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-202-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-204-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-206-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-228-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2172-224-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-194-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-214-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/2172-216-0x00000000076F0000-0x000000000772F000-memory.dmpFilesize
252KB
-
memory/4108-1122-0x0000000000850000-0x0000000000882000-memory.dmpFilesize
200KB
-
memory/4108-1123-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/4108-1125-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/4576-183-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-178-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-163-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-151-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-153-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4576-150-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-185-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-184-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-155-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4576-180-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-179-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/4576-177-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-175-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-173-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-171-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-169-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-167-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-165-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-149-0x0000000007290000-0x0000000007834000-memory.dmpFilesize
5.6MB
-
memory/4576-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4576-161-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-159-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB
-
memory/4576-157-0x00000000049C0000-0x00000000049D2000-memory.dmpFilesize
72KB