Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:53
Static task
static1
Behavioral task
behavioral1
Sample
b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe
Resource
win10v2004-20230220-en
General
-
Target
b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe
-
Size
697KB
-
MD5
8a2d29bf212a299903c3d6bbce9fde0b
-
SHA1
938f1bc3cdc03db72910fb82314abb71328259d6
-
SHA256
b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b
-
SHA512
d7cdd68159c92ec9468a04ac6bbf9f18b81ee9c630737021ec359cec2bf2ac7065d46c0789a99f438383b670cb96eba250907760610d51185dfbfcbcb3f8495c
-
SSDEEP
12288:HMrxy90J3TGs1TopHEQ8B/Yq3yY9BQL6fSGjmAxI9gAWqfLk:uys3NopkQW3QjGjbI9l7k
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro7347.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7347.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7347.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4204-188-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-187-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-190-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-195-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-197-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-199-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-201-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-203-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-205-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-207-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-209-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-211-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-213-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-215-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-217-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-219-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-221-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4204-223-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un372957.exepro7347.exequ1375.exesi083545.exepid process 760 un372957.exe 4404 pro7347.exe 4204 qu1375.exe 2784 si083545.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7347.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7347.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exeun372957.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un372957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un372957.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3356 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4876 4204 WerFault.exe qu1375.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7347.exequ1375.exesi083545.exepid process 4404 pro7347.exe 4404 pro7347.exe 4204 qu1375.exe 4204 qu1375.exe 2784 si083545.exe 2784 si083545.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7347.exequ1375.exesi083545.exedescription pid process Token: SeDebugPrivilege 4404 pro7347.exe Token: SeDebugPrivilege 4204 qu1375.exe Token: SeDebugPrivilege 2784 si083545.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exeun372957.exedescription pid process target process PID 1832 wrote to memory of 760 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe un372957.exe PID 1832 wrote to memory of 760 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe un372957.exe PID 1832 wrote to memory of 760 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe un372957.exe PID 760 wrote to memory of 4404 760 un372957.exe pro7347.exe PID 760 wrote to memory of 4404 760 un372957.exe pro7347.exe PID 760 wrote to memory of 4404 760 un372957.exe pro7347.exe PID 760 wrote to memory of 4204 760 un372957.exe qu1375.exe PID 760 wrote to memory of 4204 760 un372957.exe qu1375.exe PID 760 wrote to memory of 4204 760 un372957.exe qu1375.exe PID 1832 wrote to memory of 2784 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe si083545.exe PID 1832 wrote to memory of 2784 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe si083545.exe PID 1832 wrote to memory of 2784 1832 b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe si083545.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe"C:\Users\Admin\AppData\Local\Temp\b5c812b6bf11f5291f4a005958a03ef51d6a0eceb9b38a17e2bc7a8c9c1be30b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un372957.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un372957.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7347.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1375.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1375.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 19004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083545.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083545.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4204 -ip 42041⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083545.exeFilesize
175KB
MD557b3ed05bb0873955e162e8019558f04
SHA14d79af7eaea1ffa7011c72e4aa9c8264e7c7579e
SHA256d558dc4b64a4549e8b4c065bfa467013a1aa4cc5cf09b5567090b68f5ce01358
SHA5123a42e0693cadd6b40a2fb16cb6e7c34b22c02228990c43252fc4ea1274731315888740bf0bc857c5871e0ef28a68c832395f535c88d48183a821e7746a335d08
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083545.exeFilesize
175KB
MD557b3ed05bb0873955e162e8019558f04
SHA14d79af7eaea1ffa7011c72e4aa9c8264e7c7579e
SHA256d558dc4b64a4549e8b4c065bfa467013a1aa4cc5cf09b5567090b68f5ce01358
SHA5123a42e0693cadd6b40a2fb16cb6e7c34b22c02228990c43252fc4ea1274731315888740bf0bc857c5871e0ef28a68c832395f535c88d48183a821e7746a335d08
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un372957.exeFilesize
555KB
MD58d431e0a6d5d529466b300e6e8e84864
SHA18692931f660675705a239207178456e8b03a9eb3
SHA2561b3cf29c55d6f5a8704faf20e18bb462237b193fc1e2596ddc1bb529564e6ed3
SHA5124cd237596a0726b25976b7fc8a473212857a7d60cdccee027fe6c796008737d32e05d4aac83bacd664a02cdae6bcd515774c0680229bb289275dde1596e7241c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un372957.exeFilesize
555KB
MD58d431e0a6d5d529466b300e6e8e84864
SHA18692931f660675705a239207178456e8b03a9eb3
SHA2561b3cf29c55d6f5a8704faf20e18bb462237b193fc1e2596ddc1bb529564e6ed3
SHA5124cd237596a0726b25976b7fc8a473212857a7d60cdccee027fe6c796008737d32e05d4aac83bacd664a02cdae6bcd515774c0680229bb289275dde1596e7241c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7347.exeFilesize
347KB
MD5868ab586d0e53cf530241698d17892ec
SHA12492f4a1d305e4dcb413bc8e67623659e740603c
SHA256fd64d7c2a35c2e1b6ccc13c250fca41cacd5ac6953ce0d5a21ce6b928c9e82ac
SHA512b296717abe7bb5c7b0f94b25eb4c94e69d82c521d3bfbdb20cc3ae9e26400d9665d4d021b8feef73fea1be60be9fc6422519f91617f6ec39f698bd486bee9bb1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7347.exeFilesize
347KB
MD5868ab586d0e53cf530241698d17892ec
SHA12492f4a1d305e4dcb413bc8e67623659e740603c
SHA256fd64d7c2a35c2e1b6ccc13c250fca41cacd5ac6953ce0d5a21ce6b928c9e82ac
SHA512b296717abe7bb5c7b0f94b25eb4c94e69d82c521d3bfbdb20cc3ae9e26400d9665d4d021b8feef73fea1be60be9fc6422519f91617f6ec39f698bd486bee9bb1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1375.exeFilesize
406KB
MD56280cf0cb57d931a90c5a03917fb338e
SHA10232196f4f36bc42c2694f8a07b4820821327454
SHA256a05dbec36871f6371447da2e3f629b7d7e2031fffeb2e6de6a3881ededf060c7
SHA512c89a190d8fb4dbe2e3dedab4604cccc3085ef906b1a47348f4a3ae70e066611b807108afeeb49250bac269ec4511a9f61a5f2b67b4ae32b4611aa643dddb7a5d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1375.exeFilesize
406KB
MD56280cf0cb57d931a90c5a03917fb338e
SHA10232196f4f36bc42c2694f8a07b4820821327454
SHA256a05dbec36871f6371447da2e3f629b7d7e2031fffeb2e6de6a3881ededf060c7
SHA512c89a190d8fb4dbe2e3dedab4604cccc3085ef906b1a47348f4a3ae70e066611b807108afeeb49250bac269ec4511a9f61a5f2b67b4ae32b4611aa643dddb7a5d
-
memory/2784-1118-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/2784-1117-0x0000000000040000-0x0000000000072000-memory.dmpFilesize
200KB
-
memory/4204-1096-0x0000000007940000-0x0000000007F58000-memory.dmpFilesize
6.1MB
-
memory/4204-1102-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/4204-1111-0x000000000A330000-0x000000000A85C000-memory.dmpFilesize
5.2MB
-
memory/4204-1110-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-1109-0x000000000A160000-0x000000000A322000-memory.dmpFilesize
1.8MB
-
memory/4204-1108-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-1107-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-1106-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-1105-0x0000000008D00000-0x0000000008D50000-memory.dmpFilesize
320KB
-
memory/4204-1104-0x0000000008C70000-0x0000000008CE6000-memory.dmpFilesize
472KB
-
memory/4204-1103-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/4204-1100-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-1099-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/4204-1098-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/4204-1097-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/4204-223-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-221-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-188-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-187-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-191-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/4204-194-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-193-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/4204-190-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-195-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-197-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-199-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-201-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-203-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-205-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-207-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-209-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-211-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-213-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-215-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-217-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4204-219-0x0000000007190000-0x00000000071CF000-memory.dmpFilesize
252KB
-
memory/4404-171-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-180-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4404-152-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-167-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-169-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-179-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-177-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-157-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-175-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-173-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-153-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-155-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-182-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4404-165-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-163-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-161-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-159-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4404-151-0x00000000072D0000-0x0000000007874000-memory.dmpFilesize
5.6MB
-
memory/4404-150-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/4404-149-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/4404-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB