Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe
Resource
win10v2004-20230220-en
General
-
Target
03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe
-
Size
684KB
-
MD5
77f445b51fd1f39e254e2bbe2d6901cf
-
SHA1
1301a282f02eb587c19c87aa176441a0002fa2fb
-
SHA256
03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725
-
SHA512
9f05fdc3c1a4c1489c40222dc470d17b643f7e0acf74bbf47b63700ff1d3f860a4a630083598fddad22f756e6f71f4fbd7951480191152aeb50208d847774836
-
SSDEEP
12288:8Mrcy90HOwgkC0lN6zS9vkZ/RrguQpYoOVz4veUX2m8L3+uyjb/:Yy6OwFNyS9vkZ/Npdt421m8LVW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5081.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5081.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5081.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2752-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-193-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-196-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2752-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un800695.exepro5081.exequ3807.exesi067412.exepid process 4268 un800695.exe 1416 pro5081.exe 2752 qu3807.exe 452 si067412.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5081.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5081.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exeun800695.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un800695.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un800695.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 640 1416 WerFault.exe pro5081.exe 2328 2752 WerFault.exe qu3807.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5081.exequ3807.exesi067412.exepid process 1416 pro5081.exe 1416 pro5081.exe 2752 qu3807.exe 2752 qu3807.exe 452 si067412.exe 452 si067412.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5081.exequ3807.exesi067412.exedescription pid process Token: SeDebugPrivilege 1416 pro5081.exe Token: SeDebugPrivilege 2752 qu3807.exe Token: SeDebugPrivilege 452 si067412.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exeun800695.exedescription pid process target process PID 4424 wrote to memory of 4268 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe un800695.exe PID 4424 wrote to memory of 4268 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe un800695.exe PID 4424 wrote to memory of 4268 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe un800695.exe PID 4268 wrote to memory of 1416 4268 un800695.exe pro5081.exe PID 4268 wrote to memory of 1416 4268 un800695.exe pro5081.exe PID 4268 wrote to memory of 1416 4268 un800695.exe pro5081.exe PID 4268 wrote to memory of 2752 4268 un800695.exe qu3807.exe PID 4268 wrote to memory of 2752 4268 un800695.exe qu3807.exe PID 4268 wrote to memory of 2752 4268 un800695.exe qu3807.exe PID 4424 wrote to memory of 452 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe si067412.exe PID 4424 wrote to memory of 452 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe si067412.exe PID 4424 wrote to memory of 452 4424 03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe si067412.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe"C:\Users\Admin\AppData\Local\Temp\03c0f3907702f05b97633d6a2b8f5c9854d94e555ed2225f91bfb4a4634e0725.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800695.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800695.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5081.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 11084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3807.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3807.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 18564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067412.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067412.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1416 -ip 14161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2752 -ip 27521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067412.exeFilesize
175KB
MD5157187c3a1b150e987c64115cfcf6f60
SHA1b34b9e45d28f7bb4ce36812bfb955b2432bba55b
SHA2564858e4efb4000ef3c238ff0906542ef7db3779e4ba9ca1346e24105f584897a2
SHA512317e39e8dfe3d0d66605643318412f9e1b80d889f7d0c8d72944ad35a8e93906e401fee1375d572f1d8fcc73c49993dc5c756b3eeb1c26fbda29fadcb52d7013
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067412.exeFilesize
175KB
MD5157187c3a1b150e987c64115cfcf6f60
SHA1b34b9e45d28f7bb4ce36812bfb955b2432bba55b
SHA2564858e4efb4000ef3c238ff0906542ef7db3779e4ba9ca1346e24105f584897a2
SHA512317e39e8dfe3d0d66605643318412f9e1b80d889f7d0c8d72944ad35a8e93906e401fee1375d572f1d8fcc73c49993dc5c756b3eeb1c26fbda29fadcb52d7013
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800695.exeFilesize
542KB
MD5b9bdd8b848fc6e34476431fbab54cb66
SHA14153b755ebcd35a5f04d853bf994079d03e3f32e
SHA2564998542c6fe57e98db76bf2ed43678c20e509aee73a135d05f1bfe7ed596b6c9
SHA51212af3f563190439537c943ed00e419c76680638f06837c3a17f2a71deb9d0856ca73dddc7f2919b83ecdac75cb07528c3aee4c256b3eff016fe161e3a58de511
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800695.exeFilesize
542KB
MD5b9bdd8b848fc6e34476431fbab54cb66
SHA14153b755ebcd35a5f04d853bf994079d03e3f32e
SHA2564998542c6fe57e98db76bf2ed43678c20e509aee73a135d05f1bfe7ed596b6c9
SHA51212af3f563190439537c943ed00e419c76680638f06837c3a17f2a71deb9d0856ca73dddc7f2919b83ecdac75cb07528c3aee4c256b3eff016fe161e3a58de511
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5081.exeFilesize
321KB
MD55c1b42aca5571b599c96e8a2ad476e6b
SHA137f5cbd512dad0b854555c2abca9140689e1cf8b
SHA256615424aa9a812d88c28f5e8bfd9662275298dd618c9676b8eebbb7942bdafc86
SHA512c880cc72c3bb99638a0b478c7d5579bb6b278c2e5ba55703bdf0283ca53609e071cc1cdb1ab268ea06e6eeeba6db59b677a7cb60b54c8cf7c7e90c4a67e79779
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5081.exeFilesize
321KB
MD55c1b42aca5571b599c96e8a2ad476e6b
SHA137f5cbd512dad0b854555c2abca9140689e1cf8b
SHA256615424aa9a812d88c28f5e8bfd9662275298dd618c9676b8eebbb7942bdafc86
SHA512c880cc72c3bb99638a0b478c7d5579bb6b278c2e5ba55703bdf0283ca53609e071cc1cdb1ab268ea06e6eeeba6db59b677a7cb60b54c8cf7c7e90c4a67e79779
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3807.exeFilesize
380KB
MD5c37c87b0d6b9ec68bf02dd8a029ce497
SHA18e5212a9bbc83b6b5bf39913b1c067f3a6a2be6a
SHA256eadc07228b1d5444a48c55ba6ffa43193e854e8425bb82ba38e59f60b26f3ea4
SHA512c2cb68a7568b994b7fa11d40d97e14288785513b57800ad43cf103143c67e8d369879c50d0cf9c72770b17be08415847732760f121533fcf668d189b8391a105
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3807.exeFilesize
380KB
MD5c37c87b0d6b9ec68bf02dd8a029ce497
SHA18e5212a9bbc83b6b5bf39913b1c067f3a6a2be6a
SHA256eadc07228b1d5444a48c55ba6ffa43193e854e8425bb82ba38e59f60b26f3ea4
SHA512c2cb68a7568b994b7fa11d40d97e14288785513b57800ad43cf103143c67e8d369879c50d0cf9c72770b17be08415847732760f121533fcf668d189b8391a105
-
memory/452-1120-0x0000000000730000-0x0000000000762000-memory.dmpFilesize
200KB
-
memory/452-1121-0x0000000005160000-0x0000000005170000-memory.dmpFilesize
64KB
-
memory/1416-158-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-168-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-151-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-152-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-154-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-156-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-149-0x0000000002C80000-0x0000000002CAD000-memory.dmpFilesize
180KB
-
memory/1416-160-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-162-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-164-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-166-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-150-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/1416-170-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-172-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-174-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-176-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-178-0x0000000004CD0000-0x0000000004CE2000-memory.dmpFilesize
72KB
-
memory/1416-179-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1416-180-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/1416-182-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/1416-181-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/1416-184-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1416-148-0x00000000074A0000-0x0000000007A44000-memory.dmpFilesize
5.6MB
-
memory/2752-192-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-224-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-194-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-193-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-191-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-196-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-198-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-200-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-204-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-202-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-206-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-208-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-210-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-212-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-214-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-216-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-218-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-220-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-222-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-190-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-226-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2752-1099-0x0000000007900000-0x0000000007F18000-memory.dmpFilesize
6.1MB
-
memory/2752-1100-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/2752-1101-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/2752-1102-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/2752-1103-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-1105-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/2752-1106-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/2752-1107-0x0000000008B60000-0x0000000008BD6000-memory.dmpFilesize
472KB
-
memory/2752-1108-0x0000000008BF0000-0x0000000008C40000-memory.dmpFilesize
320KB
-
memory/2752-1109-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-1110-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-1111-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2752-189-0x0000000004550000-0x000000000459B000-memory.dmpFilesize
300KB
-
memory/2752-1112-0x0000000008C70000-0x0000000008E32000-memory.dmpFilesize
1.8MB
-
memory/2752-1113-0x0000000008E40000-0x000000000936C000-memory.dmpFilesize
5.2MB
-
memory/2752-1114-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB