Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 10:22
Static task
static1
Behavioral task
behavioral1
Sample
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe
Resource
win10v2004-20230220-en
General
-
Target
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe
-
Size
697KB
-
MD5
a87733f3ce7e4e4b35d7b241d0bfb745
-
SHA1
6d03f8323768c740afe097d19caaf6581695a7f9
-
SHA256
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d
-
SHA512
59e523a08eb61d286b294c3636e2cbede489dcae18b048dfab56044d17748922dca531ac0bbf6d238fb0833b3559605ea9e2dfa824a2474b18c26e0abda54bde
-
SSDEEP
12288:7Mrty90oxnVgoiiTOMk/WVhknKOiGGHv8Ikp8HOMJbL6nbGjTAxI9gTB9igz6eN6:uyXJVgfim/9nKONsv8RcOqGGjwI92r6r
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro3650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2728-195-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-193-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-198-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-200-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-202-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-204-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-206-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-210-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-212-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-208-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-214-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-216-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-218-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-220-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-222-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-224-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-226-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/2728-228-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un453041.exepro3650.exequ8171.exesi814474.exepid process 4704 un453041.exe 4548 pro3650.exe 2728 qu8171.exe 4852 si814474.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3650.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3650.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exeun453041.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un453041.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un453041.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3292 4548 WerFault.exe pro3650.exe 1264 2728 WerFault.exe qu8171.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3650.exequ8171.exesi814474.exepid process 4548 pro3650.exe 4548 pro3650.exe 2728 qu8171.exe 2728 qu8171.exe 4852 si814474.exe 4852 si814474.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3650.exequ8171.exesi814474.exedescription pid process Token: SeDebugPrivilege 4548 pro3650.exe Token: SeDebugPrivilege 2728 qu8171.exe Token: SeDebugPrivilege 4852 si814474.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exeun453041.exedescription pid process target process PID 1656 wrote to memory of 4704 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 1656 wrote to memory of 4704 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 1656 wrote to memory of 4704 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 4704 wrote to memory of 4548 4704 un453041.exe pro3650.exe PID 4704 wrote to memory of 4548 4704 un453041.exe pro3650.exe PID 4704 wrote to memory of 4548 4704 un453041.exe pro3650.exe PID 4704 wrote to memory of 2728 4704 un453041.exe qu8171.exe PID 4704 wrote to memory of 2728 4704 un453041.exe qu8171.exe PID 4704 wrote to memory of 2728 4704 un453041.exe qu8171.exe PID 1656 wrote to memory of 4852 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe si814474.exe PID 1656 wrote to memory of 4852 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe si814474.exe PID 1656 wrote to memory of 4852 1656 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe si814474.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe"C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10924⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4548 -ip 45481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2728 -ip 27281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exeFilesize
175KB
MD5f0aca40fc53afdf1e666fc2cacd3cac2
SHA11ec82028da2183517ab4497b7510ffa98b5dafdd
SHA2564adaa989e68664082d0f5dc8837ec47b7827514a3a5186f52f99e943c61bb729
SHA5125a3e1dc709b4316256f450f19ea4f69c11eae795a3ca88720192ec1cec8d3ecd3294cf4c81f81acc79e6c952984bbb727a820586bc51ad37c8a60b42b311aa69
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exeFilesize
175KB
MD5f0aca40fc53afdf1e666fc2cacd3cac2
SHA11ec82028da2183517ab4497b7510ffa98b5dafdd
SHA2564adaa989e68664082d0f5dc8837ec47b7827514a3a5186f52f99e943c61bb729
SHA5125a3e1dc709b4316256f450f19ea4f69c11eae795a3ca88720192ec1cec8d3ecd3294cf4c81f81acc79e6c952984bbb727a820586bc51ad37c8a60b42b311aa69
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exeFilesize
555KB
MD5f5d093bd6319bffd16285c668ef67853
SHA1ad5370b873cbc8ee9ea2873ffe00364867bc52b8
SHA2561b86bbcb1b28487b39bf3b8843a39727f6cbc32f21a68582c84c577db9ed58d5
SHA512f745355c191712abfc86062cb7f5f4db921e6aa5bcb9b43362169784e1c9b6af59cb762a3aed2ae69b221a80fce6751fa0e0d4b2f42404272064f233c1cdabba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exeFilesize
555KB
MD5f5d093bd6319bffd16285c668ef67853
SHA1ad5370b873cbc8ee9ea2873ffe00364867bc52b8
SHA2561b86bbcb1b28487b39bf3b8843a39727f6cbc32f21a68582c84c577db9ed58d5
SHA512f745355c191712abfc86062cb7f5f4db921e6aa5bcb9b43362169784e1c9b6af59cb762a3aed2ae69b221a80fce6751fa0e0d4b2f42404272064f233c1cdabba
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exeFilesize
347KB
MD59dfbb3893368b5089036af7e6625ab80
SHA1f2edbd6007b5f7be07094a9384a85081c7d4887f
SHA256b22532c1e13e483cf21701c3198eb02407546de62fc5bc6c32e50347aaf58042
SHA5124ba479ea0c83522c9367c27dcbfe559809f765ed790cf6e10081d10ed8de1a8fd6dc4200c73a4ea897dbd36ff9d68c8e104b3d5be545d5040b6502828a642035
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exeFilesize
347KB
MD59dfbb3893368b5089036af7e6625ab80
SHA1f2edbd6007b5f7be07094a9384a85081c7d4887f
SHA256b22532c1e13e483cf21701c3198eb02407546de62fc5bc6c32e50347aaf58042
SHA5124ba479ea0c83522c9367c27dcbfe559809f765ed790cf6e10081d10ed8de1a8fd6dc4200c73a4ea897dbd36ff9d68c8e104b3d5be545d5040b6502828a642035
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exeFilesize
406KB
MD5e8a7197f17b06297bc01095609f07a1a
SHA17bfae2ddc6144d41f6271e50211d231eddb360e0
SHA256ba6b5572c32b2797ab17e605f8dd4a566da51d051a32706624ef35c0008170ab
SHA512789ba62ed617750d57337045245b74e05eb8eb27601d968a962960800d1b51aa724d5168f6e819aec44ac30c072ff593f668ecb63cf7f8a07516a424e2b64cc7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exeFilesize
406KB
MD5e8a7197f17b06297bc01095609f07a1a
SHA17bfae2ddc6144d41f6271e50211d231eddb360e0
SHA256ba6b5572c32b2797ab17e605f8dd4a566da51d051a32706624ef35c0008170ab
SHA512789ba62ed617750d57337045245b74e05eb8eb27601d968a962960800d1b51aa724d5168f6e819aec44ac30c072ff593f668ecb63cf7f8a07516a424e2b64cc7
-
memory/2728-226-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/2728-1116-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-1114-0x0000000009090000-0x00000000095BC000-memory.dmpFilesize
5.2MB
-
memory/2728-1113-0x0000000008EB0000-0x0000000009072000-memory.dmpFilesize
1.8MB
-
memory/2728-1112-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-1111-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-1110-0x0000000008C00000-0x0000000008C50000-memory.dmpFilesize
320KB
-
memory/2728-1109-0x0000000008B60000-0x0000000008BD6000-memory.dmpFilesize
472KB
-
memory/2728-1108-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/2728-1107-0x00000000083D0000-0x0000000008436000-memory.dmpFilesize
408KB
-
memory/2728-1105-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-1104-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/2728-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/2728-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/2728-228-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-224-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-222-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-220-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-218-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-216-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-214-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-208-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-191-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/2728-195-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-193-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-194-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-192-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-198-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-197-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/2728-200-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-202-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-204-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-206-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-210-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/2728-212-0x0000000004D30000-0x0000000004D6F000-memory.dmpFilesize
252KB
-
memory/4548-174-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-160-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-151-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-184-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-183-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-182-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4548-150-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-180-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-178-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-176-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4548-172-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-156-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-164-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-166-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-168-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-162-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-152-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/4548-158-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-170-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-154-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/4548-149-0x0000000002B90000-0x0000000002BBD000-memory.dmpFilesize
180KB
-
memory/4548-148-0x0000000007210000-0x00000000077B4000-memory.dmpFilesize
5.6MB
-
memory/4852-1121-0x0000000000A00000-0x0000000000A32000-memory.dmpFilesize
200KB
-
memory/4852-1122-0x0000000005280000-0x0000000005290000-memory.dmpFilesize
64KB