Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:02
Static task
static1
Behavioral task
behavioral1
Sample
f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe
Resource
win10v2004-20230221-en
General
-
Target
f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe
-
Size
682KB
-
MD5
398506934f082e95d05e38f266bb0e7a
-
SHA1
68ee723fd8c835c93e9b94ea11f1a3104dce8dbe
-
SHA256
f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1
-
SHA512
0f0a06c0989f8264718a44706235781f5b95fc9991a6e00d8e09d6a1c40f67218511d502b367d6c2de40cb2b8680b84f08f2e7020e1e2d9ebd32309389b286af
-
SSDEEP
12288:+Mrcy90YRlaAKxi9taa4uPY/Es6fEA3l5nGUkVmyLGTOFygF:uyX5QVyPGZmyL+gF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5965.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3260-190-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-191-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-193-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-195-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-197-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-199-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-209-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-211-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-213-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-215-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-217-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-219-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-223-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-221-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-225-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/3260-227-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un027723.exepro5965.exequ7084.exesi038969.exepid process 4424 un027723.exe 4400 pro5965.exe 3260 qu7084.exe 2448 si038969.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5965.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exeun027723.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un027723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un027723.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3756 4400 WerFault.exe pro5965.exe 3160 3260 WerFault.exe qu7084.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5965.exequ7084.exesi038969.exepid process 4400 pro5965.exe 4400 pro5965.exe 3260 qu7084.exe 3260 qu7084.exe 2448 si038969.exe 2448 si038969.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5965.exequ7084.exesi038969.exedescription pid process Token: SeDebugPrivilege 4400 pro5965.exe Token: SeDebugPrivilege 3260 qu7084.exe Token: SeDebugPrivilege 2448 si038969.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exeun027723.exedescription pid process target process PID 4836 wrote to memory of 4424 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe un027723.exe PID 4836 wrote to memory of 4424 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe un027723.exe PID 4836 wrote to memory of 4424 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe un027723.exe PID 4424 wrote to memory of 4400 4424 un027723.exe pro5965.exe PID 4424 wrote to memory of 4400 4424 un027723.exe pro5965.exe PID 4424 wrote to memory of 4400 4424 un027723.exe pro5965.exe PID 4424 wrote to memory of 3260 4424 un027723.exe qu7084.exe PID 4424 wrote to memory of 3260 4424 un027723.exe qu7084.exe PID 4424 wrote to memory of 3260 4424 un027723.exe qu7084.exe PID 4836 wrote to memory of 2448 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe si038969.exe PID 4836 wrote to memory of 2448 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe si038969.exe PID 4836 wrote to memory of 2448 4836 f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe si038969.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe"C:\Users\Admin\AppData\Local\Temp\f0670f4eeff9393ca03c552fe84bff42769d21194b2cf75ef4e8d70e557275e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027723.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 10164⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7084.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 17244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038969.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4400 -ip 44001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3260 -ip 32601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038969.exeFilesize
175KB
MD50fec0a4885aba7bf4088a55e0f7c1e10
SHA13662c980780bdced4efb4ec3475f6c4e422e9521
SHA256231dc5d7d97810883d7d33b3665f36218c640de6642a467ec84e8a2744bbc8a5
SHA512330869052e7dd46ae30252d2cc4e532d1eea8c7f062bfd2fe3126d915d7a29b5f3313f8ca85c79f8c6a75db30e27423d0a349e50c38b1010d31c923422105b80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038969.exeFilesize
175KB
MD50fec0a4885aba7bf4088a55e0f7c1e10
SHA13662c980780bdced4efb4ec3475f6c4e422e9521
SHA256231dc5d7d97810883d7d33b3665f36218c640de6642a467ec84e8a2744bbc8a5
SHA512330869052e7dd46ae30252d2cc4e532d1eea8c7f062bfd2fe3126d915d7a29b5f3313f8ca85c79f8c6a75db30e27423d0a349e50c38b1010d31c923422105b80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027723.exeFilesize
541KB
MD5c5632aa8d83c2e7cf8c7b62a09eef72a
SHA1c7be4fc00fa8b7ab1a64f3984da45714052c464e
SHA256a2e1af0e7c4c6c909e557c70af5fc2c12eb9e46e07ef3466fe42ee94ae38196e
SHA512fa3b6fba2334d3324c370f00c0f0a9bb3fd70fb18a1f95e372e77ed71958e47e9c1e1581ba231b5e1f9b6e4206b9303fcc0f941835f4a21a4e75472316ad8d20
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027723.exeFilesize
541KB
MD5c5632aa8d83c2e7cf8c7b62a09eef72a
SHA1c7be4fc00fa8b7ab1a64f3984da45714052c464e
SHA256a2e1af0e7c4c6c909e557c70af5fc2c12eb9e46e07ef3466fe42ee94ae38196e
SHA512fa3b6fba2334d3324c370f00c0f0a9bb3fd70fb18a1f95e372e77ed71958e47e9c1e1581ba231b5e1f9b6e4206b9303fcc0f941835f4a21a4e75472316ad8d20
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5965.exeFilesize
321KB
MD5845da1be72626a0844e5d1dac9400ccd
SHA1daedf04961ec8dfe6e82de4a1f7c205797fb03fc
SHA256b9fc690cf9203f506e3a0fb77f631d7f8e2ab1d6272595d782b4622a657b2a3a
SHA5126589f359ed8c58eb6830eb1e9593d0c88d0fd2af494a38a779aae5d6ea231dc8dd766de65be91eb031994377ea918ac1e557159c592740f6bea183871863329c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5965.exeFilesize
321KB
MD5845da1be72626a0844e5d1dac9400ccd
SHA1daedf04961ec8dfe6e82de4a1f7c205797fb03fc
SHA256b9fc690cf9203f506e3a0fb77f631d7f8e2ab1d6272595d782b4622a657b2a3a
SHA5126589f359ed8c58eb6830eb1e9593d0c88d0fd2af494a38a779aae5d6ea231dc8dd766de65be91eb031994377ea918ac1e557159c592740f6bea183871863329c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7084.exeFilesize
380KB
MD5d9e8945aefda33b37acf4c236c615fd5
SHA1aa4e098375280455a9399fcbe759e3a08e0cb0e9
SHA256f2493059679d91cf87a122c96824a1727b21ca0ae440a6bb71bde8acf9160e6f
SHA512191565abf85bd2451797d0973f4f5f72760d56acc5c494c9f3c88ca03e67be1be3f5d477a779810e2dc932548d2bee44eed7135fd66a37b4249afc0b1a670cb3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7084.exeFilesize
380KB
MD5d9e8945aefda33b37acf4c236c615fd5
SHA1aa4e098375280455a9399fcbe759e3a08e0cb0e9
SHA256f2493059679d91cf87a122c96824a1727b21ca0ae440a6bb71bde8acf9160e6f
SHA512191565abf85bd2451797d0973f4f5f72760d56acc5c494c9f3c88ca03e67be1be3f5d477a779810e2dc932548d2bee44eed7135fd66a37b4249afc0b1a670cb3
-
memory/2448-1123-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/2448-1122-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/2448-1121-0x0000000000060000-0x0000000000092000-memory.dmpFilesize
200KB
-
memory/3260-1102-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/3260-1106-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/3260-1115-0x000000000A760000-0x000000000A7B0000-memory.dmpFilesize
320KB
-
memory/3260-1114-0x0000000004B60000-0x0000000004BD6000-memory.dmpFilesize
472KB
-
memory/3260-1113-0x000000000A110000-0x000000000A63C000-memory.dmpFilesize
5.2MB
-
memory/3260-1112-0x0000000009F30000-0x000000000A0F2000-memory.dmpFilesize
1.8MB
-
memory/3260-1111-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-1110-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-1109-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-1108-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-1107-0x0000000008A70000-0x0000000008B02000-memory.dmpFilesize
584KB
-
memory/3260-1104-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-1103-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/3260-1101-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/3260-1100-0x0000000007960000-0x0000000007F78000-memory.dmpFilesize
6.1MB
-
memory/3260-227-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-225-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-221-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-223-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-190-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-191-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-193-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-195-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-197-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-199-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-202-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-203-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-205-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-207-0x0000000004680000-0x0000000004690000-memory.dmpFilesize
64KB
-
memory/3260-206-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-201-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/3260-209-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-211-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-213-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-215-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-217-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/3260-219-0x0000000004C10000-0x0000000004C4F000-memory.dmpFilesize
252KB
-
memory/4400-172-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-151-0x00000000071E0000-0x0000000007784000-memory.dmpFilesize
5.6MB
-
memory/4400-185-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4400-183-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4400-182-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4400-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4400-153-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-180-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-178-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-158-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-148-0x0000000002C90000-0x0000000002CBD000-memory.dmpFilesize
180KB
-
memory/4400-156-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-168-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-170-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-154-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-166-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-164-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-162-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-160-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-152-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4400-150-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4400-174-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB
-
memory/4400-149-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4400-176-0x00000000077E0000-0x00000000077F2000-memory.dmpFilesize
72KB