Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 10:48
Static task
static1
Behavioral task
behavioral1
Sample
5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe
Resource
win10v2004-20230220-en
General
-
Target
5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe
-
Size
698KB
-
MD5
aa1e60a52c69762c14fc910463820528
-
SHA1
d78906a39f3e1bc82d9f3e0f679210adab8be418
-
SHA256
5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6
-
SHA512
b4d8bb320f5a23769e5c47118007e7b08ceda1b3521b448aa5bac23ad449a74e12968245ee403c88704f8fc7a7bcefcd3a15a395866efcf97bf801ee328c4c3c
-
SSDEEP
12288:RMrUy90wp2NpeSXwMXEhl181+z1C7lFYAVZYxL6mUGjAAxI9gd6b69MFXH:ty32NASg5l1TZCr3vQKGjRI9clqFXH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro9551.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9551.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9551.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4992-191-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-190-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-199-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-194-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-201-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-203-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-205-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-207-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-209-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-211-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-213-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-215-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-217-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-219-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-221-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-223-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-225-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4992-227-0x0000000007700000-0x000000000773F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un793373.exepro9551.exequ3905.exesi442441.exepid process 2024 un793373.exe 372 pro9551.exe 4992 qu3905.exe 4204 si442441.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9551.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9551.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exeun793373.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un793373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un793373.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 540 372 WerFault.exe pro9551.exe 4332 4992 WerFault.exe qu3905.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9551.exequ3905.exesi442441.exepid process 372 pro9551.exe 372 pro9551.exe 4992 qu3905.exe 4992 qu3905.exe 4204 si442441.exe 4204 si442441.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9551.exequ3905.exesi442441.exedescription pid process Token: SeDebugPrivilege 372 pro9551.exe Token: SeDebugPrivilege 4992 qu3905.exe Token: SeDebugPrivilege 4204 si442441.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exeun793373.exedescription pid process target process PID 1696 wrote to memory of 2024 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe un793373.exe PID 1696 wrote to memory of 2024 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe un793373.exe PID 1696 wrote to memory of 2024 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe un793373.exe PID 2024 wrote to memory of 372 2024 un793373.exe pro9551.exe PID 2024 wrote to memory of 372 2024 un793373.exe pro9551.exe PID 2024 wrote to memory of 372 2024 un793373.exe pro9551.exe PID 2024 wrote to memory of 4992 2024 un793373.exe qu3905.exe PID 2024 wrote to memory of 4992 2024 un793373.exe qu3905.exe PID 2024 wrote to memory of 4992 2024 un793373.exe qu3905.exe PID 1696 wrote to memory of 4204 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe si442441.exe PID 1696 wrote to memory of 4204 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe si442441.exe PID 1696 wrote to memory of 4204 1696 5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe si442441.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe"C:\Users\Admin\AppData\Local\Temp\5495d4dfbdaf6f98606f469a29d82cfc430bdb8f735c940f1bcd963cb1b2bdd6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793373.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793373.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9551.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9551.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3905.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 18524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442441.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 372 -ip 3721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442441.exeFilesize
175KB
MD591eabc4f2e903b6dbcdc7a0436a74cd2
SHA138c4f6fcb5d02c1e3b21adc3dbd74481c57664c5
SHA256dccf8844d9c25207ca715b8ba362d1919c8c0cf8ffcb5fc72511ec25829e7a32
SHA512cfb7876c2c4d2edc8adcfd7ceb866a32d6fa1846e126d71b37da2f3a0cf1044b647e854d07e1b872f325800853c26ef723d9ddb6ba9e675c1919f086ee29d022
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442441.exeFilesize
175KB
MD591eabc4f2e903b6dbcdc7a0436a74cd2
SHA138c4f6fcb5d02c1e3b21adc3dbd74481c57664c5
SHA256dccf8844d9c25207ca715b8ba362d1919c8c0cf8ffcb5fc72511ec25829e7a32
SHA512cfb7876c2c4d2edc8adcfd7ceb866a32d6fa1846e126d71b37da2f3a0cf1044b647e854d07e1b872f325800853c26ef723d9ddb6ba9e675c1919f086ee29d022
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793373.exeFilesize
556KB
MD5e5902acd60183eb5021a322f4bd5068a
SHA121f90960ac55741450cb34bba8cdef7ad0af423a
SHA256c72a5947bb95c365ea19c3a3971e5a30f526de19797e9e2e544b4395153abfb2
SHA512ca2e6a5d2965b291f6bc91ad9680742fdf6017329d4687e0582abc1fb49a31a019e345119f1dcbdb3a812b20364cc0ca59f51a6873b8bd531019686efc8f78d8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793373.exeFilesize
556KB
MD5e5902acd60183eb5021a322f4bd5068a
SHA121f90960ac55741450cb34bba8cdef7ad0af423a
SHA256c72a5947bb95c365ea19c3a3971e5a30f526de19797e9e2e544b4395153abfb2
SHA512ca2e6a5d2965b291f6bc91ad9680742fdf6017329d4687e0582abc1fb49a31a019e345119f1dcbdb3a812b20364cc0ca59f51a6873b8bd531019686efc8f78d8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9551.exeFilesize
347KB
MD558c60f130754a941842dadc4b9e5763f
SHA113930488c0e013e8918120e1eef8252600632208
SHA25660879e3edab666b85b99bf466708b48ed4db68aa0c19fb968f308e36aff641d6
SHA5126b9a9413ce29b2df83505316284b362565cde3abe6396c339a2bdc6c966ee546eeed9711442781f4133d26129dd9b953309bba2fce7d7ad1e991fa53bb631b7a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9551.exeFilesize
347KB
MD558c60f130754a941842dadc4b9e5763f
SHA113930488c0e013e8918120e1eef8252600632208
SHA25660879e3edab666b85b99bf466708b48ed4db68aa0c19fb968f308e36aff641d6
SHA5126b9a9413ce29b2df83505316284b362565cde3abe6396c339a2bdc6c966ee546eeed9711442781f4133d26129dd9b953309bba2fce7d7ad1e991fa53bb631b7a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3905.exeFilesize
406KB
MD551d66c5a4fd4c403f4bccd9548292b85
SHA1ba6d5396e3f083b015b5b1aeba8f04677eaf43ee
SHA256ccf3f83a625c2e05f59926b012fa530b65ecb3782ef660cfbd81b2db6a0c57af
SHA512befcb670c7117146aa6c232b80692357d691780c8aeb954e0dcf4aa096d2b93fc8e56ec113b7e8af9c415dc3c97493fe00103e20a086c40ad969ddf51a993816
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3905.exeFilesize
406KB
MD551d66c5a4fd4c403f4bccd9548292b85
SHA1ba6d5396e3f083b015b5b1aeba8f04677eaf43ee
SHA256ccf3f83a625c2e05f59926b012fa530b65ecb3782ef660cfbd81b2db6a0c57af
SHA512befcb670c7117146aa6c232b80692357d691780c8aeb954e0dcf4aa096d2b93fc8e56ec113b7e8af9c415dc3c97493fe00103e20a086c40ad969ddf51a993816
-
memory/372-148-0x0000000007320000-0x00000000078C4000-memory.dmpFilesize
5.6MB
-
memory/372-149-0x0000000002BB0000-0x0000000002BDD000-memory.dmpFilesize
180KB
-
memory/372-150-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/372-151-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/372-152-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/372-153-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-154-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-156-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-158-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-160-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-162-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-164-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-166-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-170-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-168-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-172-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-174-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-176-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-178-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-180-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/372-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/372-182-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/372-183-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/372-185-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4204-1121-0x0000000000990000-0x00000000009C2000-memory.dmpFilesize
200KB
-
memory/4204-1123-0x00000000055A0000-0x00000000055B0000-memory.dmpFilesize
64KB
-
memory/4204-1122-0x00000000055A0000-0x00000000055B0000-memory.dmpFilesize
64KB
-
memory/4992-199-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-227-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-198-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-195-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-194-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-193-0x0000000002DE0000-0x0000000002E2B000-memory.dmpFilesize
300KB
-
memory/4992-201-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-203-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-205-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-207-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-209-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-211-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-213-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-215-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-217-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-219-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-221-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-223-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-225-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-197-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-1100-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/4992-1101-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/4992-1102-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/4992-1103-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/4992-1104-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-1106-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/4992-1107-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/4992-1108-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-1109-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-1110-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB
-
memory/4992-1111-0x0000000008F20000-0x0000000008F96000-memory.dmpFilesize
472KB
-
memory/4992-1112-0x0000000008FA0000-0x0000000008FF0000-memory.dmpFilesize
320KB
-
memory/4992-190-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-191-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4992-1113-0x0000000009000000-0x00000000091C2000-memory.dmpFilesize
1.8MB
-
memory/4992-1114-0x00000000091D0000-0x00000000096FC000-memory.dmpFilesize
5.2MB
-
memory/4992-1115-0x00000000048B0000-0x00000000048C0000-memory.dmpFilesize
64KB