Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:06
Static task
static1
Behavioral task
behavioral1
Sample
f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe
Resource
win10v2004-20230220-en
General
-
Target
f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe
-
Size
698KB
-
MD5
0defd57bd352281a1419c7ff521a3aeb
-
SHA1
3107955f4902909e1c49e3b83a118eb01e0400c2
-
SHA256
f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956
-
SHA512
61e3ccc87bcb464369dbbc636dee8144bf7ff47362e1cdf30fc8dd862b5973c19728dfbe3e8f0a68942a1c46703a02e6e94a4f30945b261ff0d87f8b9143dbd6
-
SSDEEP
12288:fMr4y90vFUAT35/iq/tW+qIIaqfRvHZa85pAzaYntL6meGjUAxI9gPlM4bIx:vytK5L1W+ZIJpvH085pAXnRyGjtI9SCv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro9469.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9469.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9469.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4788-193-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-198-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-200-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-202-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-204-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-206-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-208-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-210-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-212-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-214-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-216-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-218-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-220-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-222-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-224-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-226-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-228-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4788-1109-0x0000000004F50000-0x0000000004F60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un595279.exepro9469.exequ3124.exesi527276.exepid process 1604 un595279.exe 3972 pro9469.exe 4788 qu3124.exe 3532 si527276.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9469.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9469.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9469.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exeun595279.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un595279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un595279.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 896 3972 WerFault.exe pro9469.exe 880 4788 WerFault.exe qu3124.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9469.exequ3124.exesi527276.exepid process 3972 pro9469.exe 3972 pro9469.exe 4788 qu3124.exe 4788 qu3124.exe 3532 si527276.exe 3532 si527276.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9469.exequ3124.exesi527276.exedescription pid process Token: SeDebugPrivilege 3972 pro9469.exe Token: SeDebugPrivilege 4788 qu3124.exe Token: SeDebugPrivilege 3532 si527276.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exeun595279.exedescription pid process target process PID 2680 wrote to memory of 1604 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe un595279.exe PID 2680 wrote to memory of 1604 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe un595279.exe PID 2680 wrote to memory of 1604 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe un595279.exe PID 1604 wrote to memory of 3972 1604 un595279.exe pro9469.exe PID 1604 wrote to memory of 3972 1604 un595279.exe pro9469.exe PID 1604 wrote to memory of 3972 1604 un595279.exe pro9469.exe PID 1604 wrote to memory of 4788 1604 un595279.exe qu3124.exe PID 1604 wrote to memory of 4788 1604 un595279.exe qu3124.exe PID 1604 wrote to memory of 4788 1604 un595279.exe qu3124.exe PID 2680 wrote to memory of 3532 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe si527276.exe PID 2680 wrote to memory of 3532 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe si527276.exe PID 2680 wrote to memory of 3532 2680 f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe si527276.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe"C:\Users\Admin\AppData\Local\Temp\f905cf98eb044886f34dde566967f04b44fc4f97e7a1312bafe03dc911e24956.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595279.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595279.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9469.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 10804⤵
- Program crash
PID:896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3124.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 15524⤵
- Program crash
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527276.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3972 -ip 39721⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4788 -ip 47881⤵PID:4156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527276.exeFilesize
175KB
MD51fc756b97dd0520aca3a0a39002900c3
SHA1872647c04f66c63a4b891e65f0936792b88efc51
SHA2560a56ea68e2042de7c6891134f9618f2af4d9e378f14713c053a16aa8dd77aecc
SHA5127878b633c439156b248019251f6bdf47ac9fc529dd63ef3c2ff92463e6c0527c46b768317801fee22bae57ea30bef1dacf898631ff0ee690f16169d3c4b320a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527276.exeFilesize
175KB
MD51fc756b97dd0520aca3a0a39002900c3
SHA1872647c04f66c63a4b891e65f0936792b88efc51
SHA2560a56ea68e2042de7c6891134f9618f2af4d9e378f14713c053a16aa8dd77aecc
SHA5127878b633c439156b248019251f6bdf47ac9fc529dd63ef3c2ff92463e6c0527c46b768317801fee22bae57ea30bef1dacf898631ff0ee690f16169d3c4b320a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595279.exeFilesize
556KB
MD5a722714f164aa023a432082d61659bbe
SHA15ff710ae606d5bafd9a204da36cd60e3c175de22
SHA2562266883c8943dd23e27b5f41f442de5ec080d4b5586400da97babb9f47aba915
SHA512a4c0e929fccdb695d6ff428976802f9eedb452dfb143ae0ed6bb0b96dc6b9ab97092defefc15de5e4647dab0ecb1df6230f80de9d39349f78432b1a5f4e0b691
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595279.exeFilesize
556KB
MD5a722714f164aa023a432082d61659bbe
SHA15ff710ae606d5bafd9a204da36cd60e3c175de22
SHA2562266883c8943dd23e27b5f41f442de5ec080d4b5586400da97babb9f47aba915
SHA512a4c0e929fccdb695d6ff428976802f9eedb452dfb143ae0ed6bb0b96dc6b9ab97092defefc15de5e4647dab0ecb1df6230f80de9d39349f78432b1a5f4e0b691
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9469.exeFilesize
347KB
MD5416b948f3f7d6f425cdc1ea3a16c68b9
SHA135781d0b519b80962e78219b28a032e62ac39f01
SHA256f8ec7dbcf3fc2415cfe5e0cd200c8dbc5fbfd2e87be8a34563377d77cb7f4928
SHA51270486aee678e225fb8a3e369f42e005f6c027eb66abd8ce0ba04a3359314c6268d43a766ee7b88a2f87e17424fa55023bb7ca94acf76ef6eccce538a215b77b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9469.exeFilesize
347KB
MD5416b948f3f7d6f425cdc1ea3a16c68b9
SHA135781d0b519b80962e78219b28a032e62ac39f01
SHA256f8ec7dbcf3fc2415cfe5e0cd200c8dbc5fbfd2e87be8a34563377d77cb7f4928
SHA51270486aee678e225fb8a3e369f42e005f6c027eb66abd8ce0ba04a3359314c6268d43a766ee7b88a2f87e17424fa55023bb7ca94acf76ef6eccce538a215b77b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3124.exeFilesize
406KB
MD591b2f1e07206ab9f6d10ca2127f8d19e
SHA1d84cd6d156a0221f939e7f0f9f61eda6c37bcc46
SHA256fadfadc8bec9d5a5edde267337b769daa0310b8e92a0c9e308adec5e1f515fda
SHA5129e78e71ec10689c247a7f8404c00622a2d6e708af1fdc6eb154a7529fb25d2ad4ee51e76fc20084a419bdde4294f10d86b06053e979cfbaf8e1fc48e3e7317bc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3124.exeFilesize
406KB
MD591b2f1e07206ab9f6d10ca2127f8d19e
SHA1d84cd6d156a0221f939e7f0f9f61eda6c37bcc46
SHA256fadfadc8bec9d5a5edde267337b769daa0310b8e92a0c9e308adec5e1f515fda
SHA5129e78e71ec10689c247a7f8404c00622a2d6e708af1fdc6eb154a7529fb25d2ad4ee51e76fc20084a419bdde4294f10d86b06053e979cfbaf8e1fc48e3e7317bc
-
memory/3532-1122-0x0000000000580000-0x00000000005B2000-memory.dmpFilesize
200KB
-
memory/3532-1123-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/3972-161-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-171-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-153-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-155-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-157-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-159-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-150-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-163-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-166-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-165-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-168-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-169-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-172-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-151-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-174-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-176-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-178-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-180-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/3972-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/3972-183-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-185-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-184-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3972-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/3972-149-0x00000000071B0000-0x0000000007754000-memory.dmpFilesize
5.6MB
-
memory/3972-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB
-
memory/4788-195-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-228-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-197-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-198-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-200-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-202-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-204-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-206-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-208-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-210-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-212-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-214-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-216-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-218-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-220-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-222-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-224-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-226-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-193-0x0000000004DF0000-0x0000000004E2F000-memory.dmpFilesize
252KB
-
memory/4788-1101-0x00000000079C0000-0x0000000007FD8000-memory.dmpFilesize
6.1MB
-
memory/4788-1102-0x0000000007FE0000-0x00000000080EA000-memory.dmpFilesize
1.0MB
-
memory/4788-1103-0x0000000004F90000-0x0000000004FA2000-memory.dmpFilesize
72KB
-
memory/4788-1104-0x00000000080F0000-0x000000000812C000-memory.dmpFilesize
240KB
-
memory/4788-1105-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-1107-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-1108-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-1109-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-1110-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/4788-1111-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/4788-1112-0x0000000008B90000-0x0000000008D52000-memory.dmpFilesize
1.8MB
-
memory/4788-1113-0x0000000008D70000-0x000000000929C000-memory.dmpFilesize
5.2MB
-
memory/4788-1114-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-192-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/4788-191-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/4788-1115-0x0000000009620000-0x0000000009696000-memory.dmpFilesize
472KB
-
memory/4788-1116-0x00000000096B0000-0x0000000009700000-memory.dmpFilesize
320KB