Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 10:28
Static task
static1
Behavioral task
behavioral1
Sample
afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe
Resource
win10v2004-20230220-en
General
-
Target
afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe
-
Size
697KB
-
MD5
fcc1c2723a1556a110dcb62b15ef2135
-
SHA1
a31ba25443887f521ad6f6fdd2c9d3f3f237cd72
-
SHA256
afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d
-
SHA512
7f2099aad8f201f4e515e320f686e8251d11457f2af526949b920a50834e218aa87d638d7a405d581ab983525448eac839410ca61168b8d8a29c1a564d978d28
-
SSDEEP
12288:LMrry90AJ+TiIH+2VIer6If8NMneWL7BbvX5wxZyL6T3GjqAxI9gRRQ7v9F0:0yb+TiIHDOgeWL7d5wQSGjnI9Ej
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro3263.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3263.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1752-192-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-193-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-195-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-197-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-199-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-201-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-203-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-205-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-207-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-209-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-211-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-213-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-215-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-217-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-219-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-221-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-223-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/1752-225-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un643718.exepro3263.exequ1649.exesi366383.exepid process 4268 un643718.exe 4164 pro3263.exe 1752 qu1649.exe 1428 si366383.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3263.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3263.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exeun643718.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un643718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un643718.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 824 4164 WerFault.exe pro3263.exe 2544 1752 WerFault.exe qu1649.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3263.exequ1649.exesi366383.exepid process 4164 pro3263.exe 4164 pro3263.exe 1752 qu1649.exe 1752 qu1649.exe 1428 si366383.exe 1428 si366383.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3263.exequ1649.exesi366383.exedescription pid process Token: SeDebugPrivilege 4164 pro3263.exe Token: SeDebugPrivilege 1752 qu1649.exe Token: SeDebugPrivilege 1428 si366383.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exeun643718.exedescription pid process target process PID 4432 wrote to memory of 4268 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe un643718.exe PID 4432 wrote to memory of 4268 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe un643718.exe PID 4432 wrote to memory of 4268 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe un643718.exe PID 4268 wrote to memory of 4164 4268 un643718.exe pro3263.exe PID 4268 wrote to memory of 4164 4268 un643718.exe pro3263.exe PID 4268 wrote to memory of 4164 4268 un643718.exe pro3263.exe PID 4268 wrote to memory of 1752 4268 un643718.exe qu1649.exe PID 4268 wrote to memory of 1752 4268 un643718.exe qu1649.exe PID 4268 wrote to memory of 1752 4268 un643718.exe qu1649.exe PID 4432 wrote to memory of 1428 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe si366383.exe PID 4432 wrote to memory of 1428 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe si366383.exe PID 4432 wrote to memory of 1428 4432 afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe si366383.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe"C:\Users\Admin\AppData\Local\Temp\afc70503fd14e9e181067d60d17d77318423f44c87f9c7434f6f396c4a2b558d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un643718.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un643718.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3263.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3263.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1649.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366383.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1752 -ip 17521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366383.exeFilesize
175KB
MD5aec5028cbf5a2507abee88800e0fe65d
SHA154494a882eca54ea178b0fed911f694c63e76979
SHA256892b4b91088e251854ee860f3605f8295cae40e3a90f8df814e6f9bb785cc7af
SHA51248de9db644f2af0638a59ee9866fe4d79ffe3bd652c3b965dd1603ae293352cb8ba110f4dadaa97fb945a2df06246b8ac2bc32c7ebffc4ad079f8069381859ff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366383.exeFilesize
175KB
MD5aec5028cbf5a2507abee88800e0fe65d
SHA154494a882eca54ea178b0fed911f694c63e76979
SHA256892b4b91088e251854ee860f3605f8295cae40e3a90f8df814e6f9bb785cc7af
SHA51248de9db644f2af0638a59ee9866fe4d79ffe3bd652c3b965dd1603ae293352cb8ba110f4dadaa97fb945a2df06246b8ac2bc32c7ebffc4ad079f8069381859ff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un643718.exeFilesize
555KB
MD5aeed5eb44d7474bc0b4138bd2ef11012
SHA112619166b792107a4ab8f24f341c026102f79bde
SHA2560bc4cf08be1e9863068adc88ff40af5d5b907b2bdf3e31c100d121f8d860224d
SHA512752e5da752cf7bc314c9cf96edeca84187ced1bbdb41a703f41cdbee053d680e2718af6455f7070598ea3c2a319f282da684366f860628f74460c1cf47d90a01
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un643718.exeFilesize
555KB
MD5aeed5eb44d7474bc0b4138bd2ef11012
SHA112619166b792107a4ab8f24f341c026102f79bde
SHA2560bc4cf08be1e9863068adc88ff40af5d5b907b2bdf3e31c100d121f8d860224d
SHA512752e5da752cf7bc314c9cf96edeca84187ced1bbdb41a703f41cdbee053d680e2718af6455f7070598ea3c2a319f282da684366f860628f74460c1cf47d90a01
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3263.exeFilesize
347KB
MD5f4f7f6506de6202ceded73f2130b62e5
SHA17c85d42537d4bae1c45bf7c098ef7cc8eaed29f2
SHA256786ed198bed398da5b57abefe945ee7087a98029d0310a94572c5d83453ad19a
SHA512ebb528491efff2083d3550c98c975537761d40036cf7e8bad123834b313628446a4051fdfeb66c5ddc29aead2eba19f952d526d27cfa26a0c40ca3126447b5bc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3263.exeFilesize
347KB
MD5f4f7f6506de6202ceded73f2130b62e5
SHA17c85d42537d4bae1c45bf7c098ef7cc8eaed29f2
SHA256786ed198bed398da5b57abefe945ee7087a98029d0310a94572c5d83453ad19a
SHA512ebb528491efff2083d3550c98c975537761d40036cf7e8bad123834b313628446a4051fdfeb66c5ddc29aead2eba19f952d526d27cfa26a0c40ca3126447b5bc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1649.exeFilesize
406KB
MD5b1ab55fba17c27e791059678af2d4677
SHA18cc61e13def88b67c14c43f879cc229c90930d32
SHA256516585e540675a10fa879a95e8e5286592ab0f5d8149845a8e57793664c5b4de
SHA51258b0007c3c954d860cd971c38d243fdd6b81c233e6d467821f9405c173be95298add9382f130e91b9026f7aebff7275bf60de73f6c8146faee3c2674aca0a036
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1649.exeFilesize
406KB
MD5b1ab55fba17c27e791059678af2d4677
SHA18cc61e13def88b67c14c43f879cc229c90930d32
SHA256516585e540675a10fa879a95e8e5286592ab0f5d8149845a8e57793664c5b4de
SHA51258b0007c3c954d860cd971c38d243fdd6b81c233e6d467821f9405c173be95298add9382f130e91b9026f7aebff7275bf60de73f6c8146faee3c2674aca0a036
-
memory/1428-1120-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1428-1119-0x00000000004B0000-0x00000000004E2000-memory.dmpFilesize
200KB
-
memory/1752-1099-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/1752-1101-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/1752-1113-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-1112-0x00000000095A0000-0x00000000095F0000-memory.dmpFilesize
320KB
-
memory/1752-1111-0x0000000009510000-0x0000000009586000-memory.dmpFilesize
472KB
-
memory/1752-1110-0x0000000008D70000-0x000000000929C000-memory.dmpFilesize
5.2MB
-
memory/1752-1109-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-1106-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-1108-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-1107-0x0000000008BA0000-0x0000000008D62000-memory.dmpFilesize
1.8MB
-
memory/1752-1105-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/1752-1104-0x00000000083D0000-0x0000000008436000-memory.dmpFilesize
408KB
-
memory/1752-1102-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-1100-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/1752-1098-0x0000000007910000-0x0000000007F28000-memory.dmpFilesize
6.1MB
-
memory/1752-225-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-223-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-221-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-219-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-190-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-189-0x0000000002CC0000-0x0000000002D0B000-memory.dmpFilesize
300KB
-
memory/1752-191-0x0000000007350000-0x0000000007360000-memory.dmpFilesize
64KB
-
memory/1752-192-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-193-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-195-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-197-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-199-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-201-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-203-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-205-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-207-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-209-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-211-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-213-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-215-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/1752-217-0x0000000004C60000-0x0000000004C9F000-memory.dmpFilesize
252KB
-
memory/4164-175-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB
-
memory/4164-151-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-182-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/4164-181-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/4164-153-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-180-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4164-159-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-179-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-172-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/4164-184-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4164-157-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-177-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-169-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-170-0x00000000071C0000-0x00000000071D0000-memory.dmpFilesize
64KB
-
memory/4164-167-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-165-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-163-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-161-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-155-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-150-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB
-
memory/4164-149-0x00000000071D0000-0x0000000007774000-memory.dmpFilesize
5.6MB
-
memory/4164-173-0x0000000007120000-0x0000000007132000-memory.dmpFilesize
72KB