Analysis
-
max time kernel
60s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 10:36
Static task
static1
Behavioral task
behavioral1
Sample
b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe
Resource
win10v2004-20230220-en
General
-
Target
b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe
-
Size
697KB
-
MD5
de9d0e8903fa5069aca9fbe4cb32057d
-
SHA1
bc19f48f4879d35846b0b39369cb593f5b6dcfb1
-
SHA256
b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867
-
SHA512
efba32b16a7abda397c9cdbbddb6aabcb01fc4ac38d887b1b77d30cd59a8d24466a3cdd6e27f065147d343829bf474278f75501a2bef8ccfdf43580aa9f83acf
-
SSDEEP
12288:LMrpy90CdIfay4G6XwzuIdDo9sewe3BL6olGjuAxI9gThcZx/:yySGXwz493rGjDI9oEZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro6862.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6862.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6862.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/920-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-202-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/920-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un737404.exepro6862.exequ1473.exesi338653.exepid process 4052 un737404.exe 4688 pro6862.exe 920 qu1473.exe 3388 si338653.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6862.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6862.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exeun737404.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un737404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un737404.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3524 4688 WerFault.exe pro6862.exe 3984 920 WerFault.exe qu1473.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6862.exequ1473.exesi338653.exepid process 4688 pro6862.exe 4688 pro6862.exe 920 qu1473.exe 920 qu1473.exe 3388 si338653.exe 3388 si338653.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6862.exequ1473.exesi338653.exedescription pid process Token: SeDebugPrivilege 4688 pro6862.exe Token: SeDebugPrivilege 920 qu1473.exe Token: SeDebugPrivilege 3388 si338653.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exeun737404.exedescription pid process target process PID 2516 wrote to memory of 4052 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe un737404.exe PID 2516 wrote to memory of 4052 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe un737404.exe PID 2516 wrote to memory of 4052 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe un737404.exe PID 4052 wrote to memory of 4688 4052 un737404.exe pro6862.exe PID 4052 wrote to memory of 4688 4052 un737404.exe pro6862.exe PID 4052 wrote to memory of 4688 4052 un737404.exe pro6862.exe PID 4052 wrote to memory of 920 4052 un737404.exe qu1473.exe PID 4052 wrote to memory of 920 4052 un737404.exe qu1473.exe PID 4052 wrote to memory of 920 4052 un737404.exe qu1473.exe PID 2516 wrote to memory of 3388 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe si338653.exe PID 2516 wrote to memory of 3388 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe si338653.exe PID 2516 wrote to memory of 3388 2516 b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe si338653.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe"C:\Users\Admin\AppData\Local\Temp\b606c698227da52d362ae1115f8f5e437f9eae989e4a19ec59e82a55a7791867.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737404.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737404.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6862.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10804⤵
- Program crash
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1473.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1473.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 13564⤵
- Program crash
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338653.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338653.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4688 -ip 46881⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 920 -ip 9201⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338653.exeFilesize
175KB
MD59304b745656a5b3ec3435c7e011035f4
SHA1a8eab6d5445355983ba7a28cc72133cba315dea8
SHA256cc7e4965f6393313ba854817d592dc0e441248f980828a994c87d69a7d269345
SHA5121801f177712d9c4d9667226afb006e86e5f9cfd82c6dce8d97ecc1c60a5349a04f9d1ee8f3e42ceed356bb12fe7caaa60ab06bff190798e4ff84f823b278eb94
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338653.exeFilesize
175KB
MD59304b745656a5b3ec3435c7e011035f4
SHA1a8eab6d5445355983ba7a28cc72133cba315dea8
SHA256cc7e4965f6393313ba854817d592dc0e441248f980828a994c87d69a7d269345
SHA5121801f177712d9c4d9667226afb006e86e5f9cfd82c6dce8d97ecc1c60a5349a04f9d1ee8f3e42ceed356bb12fe7caaa60ab06bff190798e4ff84f823b278eb94
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737404.exeFilesize
555KB
MD5be818bfda93eb583a2798ccc639086f2
SHA18ac753c841871f1eec9e0c7ab63b12525927e1aa
SHA25694a46ffc3ae6690d1594deef8edf48db9f699be79a15d24ce9fcc8400337cf51
SHA51222078b487fba99dd37ca6dc5c66456772a54398f7566eb6897e6c4d6b2feffea530bb6004768ad75b3f6b33ba5d5d6cd71f507e628c6e4803ac4b3097e3c5ad7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737404.exeFilesize
555KB
MD5be818bfda93eb583a2798ccc639086f2
SHA18ac753c841871f1eec9e0c7ab63b12525927e1aa
SHA25694a46ffc3ae6690d1594deef8edf48db9f699be79a15d24ce9fcc8400337cf51
SHA51222078b487fba99dd37ca6dc5c66456772a54398f7566eb6897e6c4d6b2feffea530bb6004768ad75b3f6b33ba5d5d6cd71f507e628c6e4803ac4b3097e3c5ad7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6862.exeFilesize
347KB
MD5ee1cc33784904fccee45805e6ade92c7
SHA1ca3d2a3aa49d2b31234a062e51b070de70f731e9
SHA2567123b3297136dc67a8db33ded9afec8f797a625b7d85294f8f08ded348c2c245
SHA5120137056e6b1dbeb8db90385bd503cfd308407d0d404f451c8db39ec2505414ed58ccd51416df169c7a72ffc061163158c19d69ed64ed4da50488b4f5fb68decd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6862.exeFilesize
347KB
MD5ee1cc33784904fccee45805e6ade92c7
SHA1ca3d2a3aa49d2b31234a062e51b070de70f731e9
SHA2567123b3297136dc67a8db33ded9afec8f797a625b7d85294f8f08ded348c2c245
SHA5120137056e6b1dbeb8db90385bd503cfd308407d0d404f451c8db39ec2505414ed58ccd51416df169c7a72ffc061163158c19d69ed64ed4da50488b4f5fb68decd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1473.exeFilesize
406KB
MD5102351dc653970e39d3c4b5d03753278
SHA198d40b4e533b7971c565b87cde145ac933e1fccc
SHA25616cd050d50c74bd4e7d75ed6cafcd82bba6bb557ebe7dd9689ccf9b86e7e6ab6
SHA512bb822a19f2e958d8676f17d4be0a91d4d94952c09cf0dcbb668ed70888e5c74c319e00a00cfb110eaef13332e1c7f6f03978b899650ba7b4790c3e81aeb063a7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1473.exeFilesize
406KB
MD5102351dc653970e39d3c4b5d03753278
SHA198d40b4e533b7971c565b87cde145ac933e1fccc
SHA25616cd050d50c74bd4e7d75ed6cafcd82bba6bb557ebe7dd9689ccf9b86e7e6ab6
SHA512bb822a19f2e958d8676f17d4be0a91d4d94952c09cf0dcbb668ed70888e5c74c319e00a00cfb110eaef13332e1c7f6f03978b899650ba7b4790c3e81aeb063a7
-
memory/920-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/920-1101-0x0000000007940000-0x0000000007F58000-memory.dmpFilesize
6.1MB
-
memory/920-216-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-214-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-202-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-201-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-1115-0x0000000009600000-0x0000000009676000-memory.dmpFilesize
472KB
-
memory/920-1114-0x0000000008FB0000-0x00000000094DC000-memory.dmpFilesize
5.2MB
-
memory/920-1113-0x0000000008DD0000-0x0000000008F92000-memory.dmpFilesize
1.8MB
-
memory/920-1112-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-204-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-1111-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-1110-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-1109-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-1108-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/920-1107-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/920-1105-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/920-1104-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/920-218-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-224-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-228-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-226-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-191-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-192-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-194-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-196-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/920-198-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-197-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-200-0x0000000007280000-0x0000000007290000-memory.dmpFilesize
64KB
-
memory/920-222-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-1116-0x00000000096A0000-0x00000000096F0000-memory.dmpFilesize
320KB
-
memory/920-220-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-206-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-208-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-210-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/920-212-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3388-1122-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/3388-1123-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/4688-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4688-173-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB
-
memory/4688-151-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-153-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4688-185-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-150-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-184-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-183-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-155-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-180-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-179-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-178-0x0000000007290000-0x00000000072A0000-memory.dmpFilesize
64KB
-
memory/4688-177-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-175-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-171-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-169-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-167-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-165-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-163-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-149-0x00000000072A0000-0x0000000007844000-memory.dmpFilesize
5.6MB
-
memory/4688-161-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-159-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4688-157-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB