Analysis
-
max time kernel
53s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 09:52
Static task
static1
Behavioral task
behavioral1
Sample
4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe
Resource
win10v2004-20230220-en
General
-
Target
4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe
-
Size
685KB
-
MD5
93854044c994f67e540c72aebba6bc21
-
SHA1
fcb7184ec1a64f9ba795d16044536f9fc59bf019
-
SHA256
4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14
-
SHA512
d7d95d31fb3d38846e04c96e24ddb0ab52157c1c94a6ff4d77a18db138afbeb74349297396b008d6fa763dc4c9ba3450baada6414e4535b595ce475e02372b87
-
SSDEEP
12288:7MrUy905bll40KdoeWXmcUzZZzWzHW3AcaPr/dtjMt3Ha:rycKjdoeVrzWz2PaPjR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro8455.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8455.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8455.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2880-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-201-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-203-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-205-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-207-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-209-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-211-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-217-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-219-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-221-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-223-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-225-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2880-227-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un290296.exepro8455.exequ8688.exesi733354.exepid process 1156 un290296.exe 4720 pro8455.exe 2880 qu8688.exe 1736 si733354.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8455.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8455.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exeun290296.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un290296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un290296.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4968 4720 WerFault.exe pro8455.exe 376 2880 WerFault.exe qu8688.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8455.exequ8688.exesi733354.exepid process 4720 pro8455.exe 4720 pro8455.exe 2880 qu8688.exe 2880 qu8688.exe 1736 si733354.exe 1736 si733354.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8455.exequ8688.exesi733354.exedescription pid process Token: SeDebugPrivilege 4720 pro8455.exe Token: SeDebugPrivilege 2880 qu8688.exe Token: SeDebugPrivilege 1736 si733354.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exeun290296.exedescription pid process target process PID 3904 wrote to memory of 1156 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe un290296.exe PID 3904 wrote to memory of 1156 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe un290296.exe PID 3904 wrote to memory of 1156 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe un290296.exe PID 1156 wrote to memory of 4720 1156 un290296.exe pro8455.exe PID 1156 wrote to memory of 4720 1156 un290296.exe pro8455.exe PID 1156 wrote to memory of 4720 1156 un290296.exe pro8455.exe PID 1156 wrote to memory of 2880 1156 un290296.exe qu8688.exe PID 1156 wrote to memory of 2880 1156 un290296.exe qu8688.exe PID 1156 wrote to memory of 2880 1156 un290296.exe qu8688.exe PID 3904 wrote to memory of 1736 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe si733354.exe PID 3904 wrote to memory of 1736 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe si733354.exe PID 3904 wrote to memory of 1736 3904 4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe si733354.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe"C:\Users\Admin\AppData\Local\Temp\4def422c50398af6e0757fa6070cfce0e702849b70538780da99fee801ad3e14.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un290296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un290296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8688.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 13604⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733354.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4720 -ip 47201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2880 -ip 28801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733354.exeFilesize
175KB
MD578822054d60c32c9e8722099a03402cd
SHA1a3dd84ed2befe90ecb2d4b8a7b382ad330c35d83
SHA256dccaafb68dfabcc5adafde8b8e6f5274c29149ae8480eb3475024f08625c1e67
SHA512b49eeb587dd71ddbab342f7098910b6731044f50d0c165222d851b18fb354bcbb34bb157c4dd6a9e9409c7d26c5a4353a9e277fc91479232ac2f5807f0f260ed
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733354.exeFilesize
175KB
MD578822054d60c32c9e8722099a03402cd
SHA1a3dd84ed2befe90ecb2d4b8a7b382ad330c35d83
SHA256dccaafb68dfabcc5adafde8b8e6f5274c29149ae8480eb3475024f08625c1e67
SHA512b49eeb587dd71ddbab342f7098910b6731044f50d0c165222d851b18fb354bcbb34bb157c4dd6a9e9409c7d26c5a4353a9e277fc91479232ac2f5807f0f260ed
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un290296.exeFilesize
543KB
MD5639426472ccb5b2890828ee2bc22f74a
SHA140b8dc99db7e916761651ea633abb4bdde2c5725
SHA256240bc984f20d81d6beba7c2420b2a45109416789aa6e7cfd2ea7470790711869
SHA512cf96d4a2c50de3501432b95a4f9eb348a4744bce8227227f8f03fd8b115bb44b97fe473939c92ac77d91a9df0384226f472e590d212eede612a55d8fa3b66d3a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un290296.exeFilesize
543KB
MD5639426472ccb5b2890828ee2bc22f74a
SHA140b8dc99db7e916761651ea633abb4bdde2c5725
SHA256240bc984f20d81d6beba7c2420b2a45109416789aa6e7cfd2ea7470790711869
SHA512cf96d4a2c50de3501432b95a4f9eb348a4744bce8227227f8f03fd8b115bb44b97fe473939c92ac77d91a9df0384226f472e590d212eede612a55d8fa3b66d3a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exeFilesize
322KB
MD5d424e30101123b80e92181e4c6893d9f
SHA1194182994e788be440ebc17b82ff24888caab575
SHA2566f6933e3c53e0cc5b0b89a23c819b598415be18128592a481818bc2d2e893d90
SHA512885eba3f50c7fa800422ff3eca67127c299282fece792ed5c789b72e82b468a4bfe50bbab25473f6f936d154ef4b22b044faf96c4e5d36bdda51c0c780cb1a4d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exeFilesize
322KB
MD5d424e30101123b80e92181e4c6893d9f
SHA1194182994e788be440ebc17b82ff24888caab575
SHA2566f6933e3c53e0cc5b0b89a23c819b598415be18128592a481818bc2d2e893d90
SHA512885eba3f50c7fa800422ff3eca67127c299282fece792ed5c789b72e82b468a4bfe50bbab25473f6f936d154ef4b22b044faf96c4e5d36bdda51c0c780cb1a4d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8688.exeFilesize
379KB
MD5b0e266bf6edad5e879c9b9404a510e4a
SHA1efbc6cc1177fa9b874ec3abf46fd30c38fb650f9
SHA256071b844f26afa56ea2aaa89a8bacabb666ea94993e59105f786b87b9bbdec32b
SHA512c15867e0ac6051a7627890843ad8643821a985cac54caccd65114b2132ca643c92fd12b2c142be73070b51b54b074e7eada5e62676186816ba117afb8c03c29e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8688.exeFilesize
379KB
MD5b0e266bf6edad5e879c9b9404a510e4a
SHA1efbc6cc1177fa9b874ec3abf46fd30c38fb650f9
SHA256071b844f26afa56ea2aaa89a8bacabb666ea94993e59105f786b87b9bbdec32b
SHA512c15867e0ac6051a7627890843ad8643821a985cac54caccd65114b2132ca643c92fd12b2c142be73070b51b54b074e7eada5e62676186816ba117afb8c03c29e
-
memory/1736-1124-0x0000000005820000-0x0000000005830000-memory.dmpFilesize
64KB
-
memory/1736-1123-0x0000000005820000-0x0000000005830000-memory.dmpFilesize
64KB
-
memory/1736-1122-0x0000000000EE0000-0x0000000000F12000-memory.dmpFilesize
200KB
-
memory/2880-1102-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/2880-1106-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-1116-0x000000000A830000-0x000000000A880000-memory.dmpFilesize
320KB
-
memory/2880-1115-0x000000000A7B0000-0x000000000A826000-memory.dmpFilesize
472KB
-
memory/2880-1113-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-1112-0x0000000008E50000-0x000000000937C000-memory.dmpFilesize
5.2MB
-
memory/2880-1111-0x0000000008C80000-0x0000000008E42000-memory.dmpFilesize
1.8MB
-
memory/2880-1110-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB
-
memory/2880-1109-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/2880-1108-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-1107-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-1104-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-1103-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/2880-1101-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/2880-1100-0x0000000007950000-0x0000000007F68000-memory.dmpFilesize
6.1MB
-
memory/2880-227-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-225-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-223-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-221-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-219-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-191-0x0000000002C90000-0x0000000002CDB000-memory.dmpFilesize
300KB
-
memory/2880-193-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-192-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/2880-194-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-195-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-197-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-199-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-201-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-203-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-205-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-207-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-209-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-211-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-213-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-215-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/2880-217-0x0000000007130000-0x000000000716F000-memory.dmpFilesize
252KB
-
memory/4720-174-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-184-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-154-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-185-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-172-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-183-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-181-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4720-170-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-180-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-178-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-158-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-176-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-186-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/4720-156-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-153-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-168-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-166-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-164-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-162-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-160-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-152-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/4720-150-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-151-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/4720-149-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4720-148-0x0000000007200000-0x00000000077A4000-memory.dmpFilesize
5.6MB