Analysis
-
max time kernel
101s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:59
Static task
static1
Behavioral task
behavioral1
Sample
583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe
Resource
win10v2004-20230221-en
General
-
Target
583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe
-
Size
698KB
-
MD5
4dd830e464180da7ef6c40d1f6355172
-
SHA1
f0c53afe9152d38a15d9e88fbd5ed84ea532c890
-
SHA256
583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc
-
SHA512
f88337df2a6f091e5b21dfc6c24209d6a673e6fe3dd66b9886ee5609a28ea22cd406a6790f84b04b446b657e908ac208582de9058f231ada714065c267af47d5
-
SSDEEP
12288:HMrHy90mQEpYx9YtRLVbKG/Lh6k4MyfpCHN+12Y4GL6JfGjyAxI9gQMwX5xP/n:wyWVr2JK8FB4MyIg12Y4MKGjvI9HVX5p
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro5147.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5147.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5147.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-199-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-203-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-205-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-209-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-211-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-215-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-217-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-219-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-221-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-223-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-225-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2784-227-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un593325.exepro5147.exequ7309.exesi119392.exepid process 4768 un593325.exe 3932 pro5147.exe 2784 qu7309.exe 4684 si119392.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5147.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5147.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exeun593325.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un593325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un593325.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4456 3932 WerFault.exe pro5147.exe 3456 2784 WerFault.exe qu7309.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5147.exequ7309.exesi119392.exepid process 3932 pro5147.exe 3932 pro5147.exe 2784 qu7309.exe 2784 qu7309.exe 4684 si119392.exe 4684 si119392.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5147.exequ7309.exesi119392.exedescription pid process Token: SeDebugPrivilege 3932 pro5147.exe Token: SeDebugPrivilege 2784 qu7309.exe Token: SeDebugPrivilege 4684 si119392.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exeun593325.exedescription pid process target process PID 4904 wrote to memory of 4768 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe un593325.exe PID 4904 wrote to memory of 4768 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe un593325.exe PID 4904 wrote to memory of 4768 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe un593325.exe PID 4768 wrote to memory of 3932 4768 un593325.exe pro5147.exe PID 4768 wrote to memory of 3932 4768 un593325.exe pro5147.exe PID 4768 wrote to memory of 3932 4768 un593325.exe pro5147.exe PID 4768 wrote to memory of 2784 4768 un593325.exe qu7309.exe PID 4768 wrote to memory of 2784 4768 un593325.exe qu7309.exe PID 4768 wrote to memory of 2784 4768 un593325.exe qu7309.exe PID 4904 wrote to memory of 4684 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe si119392.exe PID 4904 wrote to memory of 4684 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe si119392.exe PID 4904 wrote to memory of 4684 4904 583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe si119392.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe"C:\Users\Admin\AppData\Local\Temp\583ed64e87ebaaaa2ae633151578b288927818d189303851fe1d125f4456d3dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un593325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un593325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5147.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7309.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7309.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 15844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si119392.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si119392.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3932 -ip 39321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2784 -ip 27841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si119392.exeFilesize
175KB
MD5366ec4e1ee0267cc95de0e58dd62c476
SHA1f3fb89634bf7684f548582c8d8294054d48614e8
SHA25653bd54f3e3e64737d8fd7ecf9e17c28a642aa769c2ae4f266bda0f872b2ed753
SHA512a140d677da15ae471ee55eee37cb1f2ac0cefe024cae4a915d18d17c3388fb808f6ad02be120617fbd73afbe9c67fda9f18fe512e86a1f12a60b3ee9387de989
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si119392.exeFilesize
175KB
MD5366ec4e1ee0267cc95de0e58dd62c476
SHA1f3fb89634bf7684f548582c8d8294054d48614e8
SHA25653bd54f3e3e64737d8fd7ecf9e17c28a642aa769c2ae4f266bda0f872b2ed753
SHA512a140d677da15ae471ee55eee37cb1f2ac0cefe024cae4a915d18d17c3388fb808f6ad02be120617fbd73afbe9c67fda9f18fe512e86a1f12a60b3ee9387de989
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un593325.exeFilesize
556KB
MD563849ef01dde1d634d961b9837007b26
SHA13247aa8647bd10c8b3517c0e92a5482b9c569e8c
SHA25677c718ea9e1090968a2db1cd6352d6146c9d0a736a44fb383dcb9e8c6c04d004
SHA512110ef20efced481992a6d552ca331f19e304d43faff996c133169dea923a3282e2f6ffc08828ad6eaacc0ded837970ddcae04b6b3f6f8bfdedb2afebb00bd402
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un593325.exeFilesize
556KB
MD563849ef01dde1d634d961b9837007b26
SHA13247aa8647bd10c8b3517c0e92a5482b9c569e8c
SHA25677c718ea9e1090968a2db1cd6352d6146c9d0a736a44fb383dcb9e8c6c04d004
SHA512110ef20efced481992a6d552ca331f19e304d43faff996c133169dea923a3282e2f6ffc08828ad6eaacc0ded837970ddcae04b6b3f6f8bfdedb2afebb00bd402
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5147.exeFilesize
347KB
MD5864404792a4c2ebbd65116670cf39369
SHA1da589e8a1080281441b60a1ffb69e5455a239c12
SHA256fa75544617f8767be846c9af2f9c226246477aeb8add96046e9010af2624f75b
SHA51224d2f50c52ff2bf5441c9a00df4a777668f7a2c9bbd8782603770034f0be017d3258ee4a3c3e37fb28caf221b28946c531ecb2441691a42de5d78934c88ebe4b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5147.exeFilesize
347KB
MD5864404792a4c2ebbd65116670cf39369
SHA1da589e8a1080281441b60a1ffb69e5455a239c12
SHA256fa75544617f8767be846c9af2f9c226246477aeb8add96046e9010af2624f75b
SHA51224d2f50c52ff2bf5441c9a00df4a777668f7a2c9bbd8782603770034f0be017d3258ee4a3c3e37fb28caf221b28946c531ecb2441691a42de5d78934c88ebe4b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7309.exeFilesize
406KB
MD5b457b43328cf8c5d956739d786bc17b8
SHA126cc0542f27ba2142a4ea5dee6e63ee8e558c0a5
SHA256b7ddbfacc1d74912206813a22c5059ac3043b5b140e5eeed14024e12e195eba7
SHA512653e0f291124695519aa6f7a42a296b429f835b0d0757d84bb5ef776835e373bf6414a4af0286c2bc9758df93935f4eda7a4651e0d87c022e47279bdc13cc47f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7309.exeFilesize
406KB
MD5b457b43328cf8c5d956739d786bc17b8
SHA126cc0542f27ba2142a4ea5dee6e63ee8e558c0a5
SHA256b7ddbfacc1d74912206813a22c5059ac3043b5b140e5eeed14024e12e195eba7
SHA512653e0f291124695519aa6f7a42a296b429f835b0d0757d84bb5ef776835e373bf6414a4af0286c2bc9758df93935f4eda7a4651e0d87c022e47279bdc13cc47f
-
memory/2784-227-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-1102-0x0000000007F90000-0x0000000007FA2000-memory.dmpFilesize
72KB
-
memory/2784-1115-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-1114-0x0000000009320000-0x0000000009370000-memory.dmpFilesize
320KB
-
memory/2784-1113-0x00000000092A0000-0x0000000009316000-memory.dmpFilesize
472KB
-
memory/2784-1112-0x0000000008C20000-0x000000000914C000-memory.dmpFilesize
5.2MB
-
memory/2784-1111-0x0000000008A50000-0x0000000008C12000-memory.dmpFilesize
1.8MB
-
memory/2784-1110-0x0000000008950000-0x00000000089E2000-memory.dmpFilesize
584KB
-
memory/2784-1109-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-1108-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-1107-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-1106-0x0000000008290000-0x00000000082F6000-memory.dmpFilesize
408KB
-
memory/2784-1104-0x0000000007FB0000-0x0000000007FEC000-memory.dmpFilesize
240KB
-
memory/2784-1103-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-1101-0x0000000007E80000-0x0000000007F8A000-memory.dmpFilesize
1.0MB
-
memory/2784-1100-0x0000000007860000-0x0000000007E78000-memory.dmpFilesize
6.1MB
-
memory/2784-225-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-223-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-221-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-219-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-217-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-215-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-190-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/2784-191-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-192-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-193-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-195-0x00000000072A0000-0x00000000072B0000-memory.dmpFilesize
64KB
-
memory/2784-194-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-197-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-199-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-201-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-203-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-205-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-207-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-209-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-211-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/2784-213-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/3932-172-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-185-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/3932-170-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-168-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-183-0x0000000004880000-0x0000000004890000-memory.dmpFilesize
64KB
-
memory/3932-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/3932-150-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-180-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-178-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-158-0x0000000004880000-0x0000000004890000-memory.dmpFilesize
64KB
-
memory/3932-176-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-174-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-152-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-155-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-184-0x0000000004880000-0x0000000004890000-memory.dmpFilesize
64KB
-
memory/3932-166-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-164-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-162-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-154-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB
-
memory/3932-156-0x0000000004880000-0x0000000004890000-memory.dmpFilesize
64KB
-
memory/3932-159-0x0000000004880000-0x0000000004890000-memory.dmpFilesize
64KB
-
memory/3932-160-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-149-0x0000000004B40000-0x0000000004B52000-memory.dmpFilesize
72KB
-
memory/3932-148-0x0000000007330000-0x00000000078D4000-memory.dmpFilesize
5.6MB
-
memory/4684-1121-0x00000000000E0000-0x0000000000112000-memory.dmpFilesize
200KB
-
memory/4684-1122-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB