Analysis
-
max time kernel
127s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe
Resource
win10v2004-20230220-en
General
-
Target
47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe
-
Size
682KB
-
MD5
f3d43aa1aba3589269b0040013ba2a98
-
SHA1
f8b2d971f8a37c3509885f9987feaec6f1a83369
-
SHA256
47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10
-
SHA512
b4fa5a331a5d019f37a81b49e15da4b58da5733086debe49835155c5a226f5333bf1c6ac1b9593ec8ca90671c90c767da09ed2f128666c867d773321ff9155d2
-
SSDEEP
12288:EMr8y90GGNmfAJPHOui2pTobKOrRCpC4JkGUktmMLFf12EzTrp:gyX2mWuuxp4NCRBmMLf2gp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8153.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8153.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3740-191-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-195-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-193-0x0000000007350000-0x0000000007360000-memory.dmp family_redline behavioral1/memory/3740-189-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-197-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-199-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-201-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-203-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-205-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-207-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-209-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-211-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-213-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-215-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-217-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-219-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-221-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-223-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3740-225-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un946767.exepro8153.exequ1020.exesi687662.exepid process 4932 un946767.exe 1236 pro8153.exe 3740 qu1020.exe 2716 si687662.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8153.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8153.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8153.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un946767.exe47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un946767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un946767.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4652 1236 WerFault.exe pro8153.exe 4564 3740 WerFault.exe qu1020.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8153.exequ1020.exesi687662.exepid process 1236 pro8153.exe 1236 pro8153.exe 3740 qu1020.exe 3740 qu1020.exe 2716 si687662.exe 2716 si687662.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8153.exequ1020.exesi687662.exedescription pid process Token: SeDebugPrivilege 1236 pro8153.exe Token: SeDebugPrivilege 3740 qu1020.exe Token: SeDebugPrivilege 2716 si687662.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exeun946767.exedescription pid process target process PID 4268 wrote to memory of 4932 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe un946767.exe PID 4268 wrote to memory of 4932 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe un946767.exe PID 4268 wrote to memory of 4932 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe un946767.exe PID 4932 wrote to memory of 1236 4932 un946767.exe pro8153.exe PID 4932 wrote to memory of 1236 4932 un946767.exe pro8153.exe PID 4932 wrote to memory of 1236 4932 un946767.exe pro8153.exe PID 4932 wrote to memory of 3740 4932 un946767.exe qu1020.exe PID 4932 wrote to memory of 3740 4932 un946767.exe qu1020.exe PID 4932 wrote to memory of 3740 4932 un946767.exe qu1020.exe PID 4268 wrote to memory of 2716 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe si687662.exe PID 4268 wrote to memory of 2716 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe si687662.exe PID 4268 wrote to memory of 2716 4268 47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe si687662.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe"C:\Users\Admin\AppData\Local\Temp\47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1236 -ip 12361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3740 -ip 37401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exeFilesize
175KB
MD52778c75bcfbfa2754e94f18febb8a0d4
SHA1e34c50802886a7efccfa53ef6c73a950051840e9
SHA25692b6d18d3512ac23db66a2db3c287fb9f552fa95fa949afe257b5d38895095c4
SHA5124c823b532ea12ca13be657db9efcd5729b7fa6b8829d8624ef522277dbd2fb7aefdef9b3b77de43d80378945205fca7c8681e5f1c2be55a212239b95ab5d9a80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exeFilesize
175KB
MD52778c75bcfbfa2754e94f18febb8a0d4
SHA1e34c50802886a7efccfa53ef6c73a950051840e9
SHA25692b6d18d3512ac23db66a2db3c287fb9f552fa95fa949afe257b5d38895095c4
SHA5124c823b532ea12ca13be657db9efcd5729b7fa6b8829d8624ef522277dbd2fb7aefdef9b3b77de43d80378945205fca7c8681e5f1c2be55a212239b95ab5d9a80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exeFilesize
540KB
MD51c2e3b940d2b057fc57f819d82a79782
SHA17ee0be78c3666aad32124e4afa6b86f84c2c14fc
SHA2561f50a769aac79df1b0e58768b2a416728186091be09bdac93673f94938748eab
SHA512e1b86128b762d31f58555b94eb1e924627236304a51cee9d57a5eebc6621bfe902254741acca9a5c7968e27a851b324eaaca8a57b7f229e22d7f14b23b74749d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exeFilesize
540KB
MD51c2e3b940d2b057fc57f819d82a79782
SHA17ee0be78c3666aad32124e4afa6b86f84c2c14fc
SHA2561f50a769aac79df1b0e58768b2a416728186091be09bdac93673f94938748eab
SHA512e1b86128b762d31f58555b94eb1e924627236304a51cee9d57a5eebc6621bfe902254741acca9a5c7968e27a851b324eaaca8a57b7f229e22d7f14b23b74749d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exeFilesize
321KB
MD569ee165cf7790bcf735beb08045a4583
SHA1b6b49cece6706ceed946bd77a7ce3b30688ab69d
SHA2564daf6fff28bc4ac7f4e3c5f7287dc090af3d57fddad660d1f6339c6aee825136
SHA5123b6836c312217274aa1662606e6e5ed9da1ca6ffcddc88e53245cbd0f9ba9f9ecbb6530af9903d097be01f25924f467685ba47e93ea6ff0b678d48d5a62dfd39
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exeFilesize
321KB
MD569ee165cf7790bcf735beb08045a4583
SHA1b6b49cece6706ceed946bd77a7ce3b30688ab69d
SHA2564daf6fff28bc4ac7f4e3c5f7287dc090af3d57fddad660d1f6339c6aee825136
SHA5123b6836c312217274aa1662606e6e5ed9da1ca6ffcddc88e53245cbd0f9ba9f9ecbb6530af9903d097be01f25924f467685ba47e93ea6ff0b678d48d5a62dfd39
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exeFilesize
380KB
MD5a6a8677decde80d90c67e6e0389a0a77
SHA1c59908a6c94a1ac43845d21c4fcbfad908f04ead
SHA256214c5ec65744657db51fe6039624994f6d0c998c4ae80e09904d046ee5b50a00
SHA512133fd29852650f4f08a6d235fc3d9c3f76445f12a3b7c0c4763109df6dfc50e52096253914471b70d06dc9f8be7fe3c52660267bbcc9c15c5aae4f4074d4b37f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exeFilesize
380KB
MD5a6a8677decde80d90c67e6e0389a0a77
SHA1c59908a6c94a1ac43845d21c4fcbfad908f04ead
SHA256214c5ec65744657db51fe6039624994f6d0c998c4ae80e09904d046ee5b50a00
SHA512133fd29852650f4f08a6d235fc3d9c3f76445f12a3b7c0c4763109df6dfc50e52096253914471b70d06dc9f8be7fe3c52660267bbcc9c15c5aae4f4074d4b37f
-
memory/1236-148-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/1236-149-0x00000000073A0000-0x0000000007944000-memory.dmpFilesize
5.6MB
-
memory/1236-150-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-151-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-153-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-155-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-157-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-159-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-161-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-163-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-165-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-167-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-169-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-171-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-173-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-175-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-177-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/1236-178-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/1236-179-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/1236-180-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1236-181-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/1236-182-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/1236-184-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2716-1119-0x0000000000570000-0x00000000005A2000-memory.dmpFilesize
200KB
-
memory/2716-1120-0x0000000004EA0000-0x0000000004EB0000-memory.dmpFilesize
64KB
-
memory/3740-191-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-221-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-195-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-193-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-189-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-197-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-199-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-201-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-203-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-205-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-207-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-209-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-211-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-213-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-215-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-217-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-219-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-192-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-223-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-225-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/3740-1098-0x0000000007910000-0x0000000007F28000-memory.dmpFilesize
6.1MB
-
memory/3740-1099-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/3740-1100-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/3740-1101-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-1102-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/3740-1104-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/3740-1105-0x0000000008A70000-0x0000000008B02000-memory.dmpFilesize
584KB
-
memory/3740-1106-0x0000000008B60000-0x0000000008BD6000-memory.dmpFilesize
472KB
-
memory/3740-1107-0x0000000008BF0000-0x0000000008C40000-memory.dmpFilesize
320KB
-
memory/3740-1108-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-1109-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-1110-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/3740-190-0x0000000002C80000-0x0000000002CCB000-memory.dmpFilesize
300KB
-
memory/3740-1111-0x0000000008D60000-0x0000000008F22000-memory.dmpFilesize
1.8MB
-
memory/3740-1112-0x0000000008F40000-0x000000000946C000-memory.dmpFilesize
5.2MB
-
memory/3740-1113-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB