Analysis
-
max time kernel
93s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe
Resource
win10v2004-20230220-en
General
-
Target
f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe
-
Size
697KB
-
MD5
b2a0001215716d38d1d0e657ea149f59
-
SHA1
846d1b9ef92ed98368d9a42af891d7da281eaa9b
-
SHA256
f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222
-
SHA512
9deb8804f47bbc5b7d7539f11a3914f787a073a69d538fbff35f15fcc3c0047e5e43308b1a7c093f4e626c53ddd9194120c2d6c33b65f23005a635c64ecf3f29
-
SSDEEP
12288:vMrry90kk0gHGZa8B/Y6xyyY/L60NGjVAxI9gAwqz0A:cyhQmZa+x5QjGjmI9NfoA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro5133.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5133.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/968-191-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-192-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-194-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-196-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-198-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-202-0x0000000007260000-0x0000000007270000-memory.dmp family_redline behavioral1/memory/968-205-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-201-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-208-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-210-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-212-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-214-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-216-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-218-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-220-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-222-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-224-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-226-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/968-228-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un397698.exepro5133.exequ1681.exesi092616.exepid process 4368 un397698.exe 2136 pro5133.exe 968 qu1681.exe 4492 si092616.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5133.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5133.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exeun397698.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un397698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un397698.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 844 2136 WerFault.exe pro5133.exe 3696 968 WerFault.exe qu1681.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5133.exequ1681.exesi092616.exepid process 2136 pro5133.exe 2136 pro5133.exe 968 qu1681.exe 968 qu1681.exe 4492 si092616.exe 4492 si092616.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5133.exequ1681.exesi092616.exedescription pid process Token: SeDebugPrivilege 2136 pro5133.exe Token: SeDebugPrivilege 968 qu1681.exe Token: SeDebugPrivilege 4492 si092616.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exeun397698.exedescription pid process target process PID 4116 wrote to memory of 4368 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe un397698.exe PID 4116 wrote to memory of 4368 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe un397698.exe PID 4116 wrote to memory of 4368 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe un397698.exe PID 4368 wrote to memory of 2136 4368 un397698.exe pro5133.exe PID 4368 wrote to memory of 2136 4368 un397698.exe pro5133.exe PID 4368 wrote to memory of 2136 4368 un397698.exe pro5133.exe PID 4368 wrote to memory of 968 4368 un397698.exe qu1681.exe PID 4368 wrote to memory of 968 4368 un397698.exe qu1681.exe PID 4368 wrote to memory of 968 4368 un397698.exe qu1681.exe PID 4116 wrote to memory of 4492 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe si092616.exe PID 4116 wrote to memory of 4492 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe si092616.exe PID 4116 wrote to memory of 4492 4116 f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe si092616.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe"C:\Users\Admin\AppData\Local\Temp\f8c4bd2adc1c42fd58b9735881ba32304599d207edf1f8bc15fa478e34d17222.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un397698.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un397698.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5133.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 10804⤵
- Program crash
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1681.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 13364⤵
- Program crash
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092616.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2136 -ip 21361⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 968 -ip 9681⤵PID:2708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092616.exeFilesize
175KB
MD57c88671a18196c991192633d5ac5eec2
SHA1d1988d8d1803fbb873eb491e6c6566d257ea8329
SHA256a0077c157e575f91aab3e1a09d18d88d9b13a75ff1df3e155e1a41109c92d930
SHA51285ad14306532fb3935aca1131c76004bc1f80c2ed79bb897b333adc26c0ea4bb494ef7d72646bcbf0fb10e90545dcd77b845e420ec3f4c5f1e8ab8f2065c9af8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092616.exeFilesize
175KB
MD57c88671a18196c991192633d5ac5eec2
SHA1d1988d8d1803fbb873eb491e6c6566d257ea8329
SHA256a0077c157e575f91aab3e1a09d18d88d9b13a75ff1df3e155e1a41109c92d930
SHA51285ad14306532fb3935aca1131c76004bc1f80c2ed79bb897b333adc26c0ea4bb494ef7d72646bcbf0fb10e90545dcd77b845e420ec3f4c5f1e8ab8f2065c9af8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un397698.exeFilesize
555KB
MD598ef5202a86c40281ee67fff8439163b
SHA1c37e12cd1a2a703d6b2cec7771fa77a5df94b19c
SHA256224090020e76e47db97ed696a5815ed55c240dab0cadeef72a8bb3884dad7cd9
SHA5124fc8e052fe4036207b4d0fb3f9f310ba4abe9619c8944bf94cafe2ce982bf3f8302680003a4cfb6d9a2e765e5d85daf80dc814a9c3ef5698420f3beadadf6ff1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un397698.exeFilesize
555KB
MD598ef5202a86c40281ee67fff8439163b
SHA1c37e12cd1a2a703d6b2cec7771fa77a5df94b19c
SHA256224090020e76e47db97ed696a5815ed55c240dab0cadeef72a8bb3884dad7cd9
SHA5124fc8e052fe4036207b4d0fb3f9f310ba4abe9619c8944bf94cafe2ce982bf3f8302680003a4cfb6d9a2e765e5d85daf80dc814a9c3ef5698420f3beadadf6ff1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5133.exeFilesize
347KB
MD5b14618fbbd22bf5083f7a92969799d04
SHA1d553079be9e211257bb3f34e59a626bd0e9fcbd6
SHA2562b3093fee7257d320c97f459c28f1662bfcdf61d5620d66f0e9e702411c16a2d
SHA51297989c7d8fdecc4e326f17430f525a46187dd15a285a4b0fcb09c09f6bd678f4d223b7080c70103c5a349be60f82623ae7664ce948b40904d1444e74dad710f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5133.exeFilesize
347KB
MD5b14618fbbd22bf5083f7a92969799d04
SHA1d553079be9e211257bb3f34e59a626bd0e9fcbd6
SHA2562b3093fee7257d320c97f459c28f1662bfcdf61d5620d66f0e9e702411c16a2d
SHA51297989c7d8fdecc4e326f17430f525a46187dd15a285a4b0fcb09c09f6bd678f4d223b7080c70103c5a349be60f82623ae7664ce948b40904d1444e74dad710f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1681.exeFilesize
406KB
MD557e2e8bc2bb04b3a2d7ce1da29089492
SHA11dcf5e9bb0f7503bcde62b29d7ac9c963389653f
SHA256f0500169a64f802398a33df9ea3cc1e11a8b8dea22ca9c444efa3f11ac75c560
SHA51288e718b4688bf9637a23980c09734326bd6800fe3bcf82ea9393045e461494c70a3b753d94d775bac4b456a87ce4d0ff88ec70982d6468004cd01bb167ec8de7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1681.exeFilesize
406KB
MD557e2e8bc2bb04b3a2d7ce1da29089492
SHA11dcf5e9bb0f7503bcde62b29d7ac9c963389653f
SHA256f0500169a64f802398a33df9ea3cc1e11a8b8dea22ca9c444efa3f11ac75c560
SHA51288e718b4688bf9637a23980c09734326bd6800fe3bcf82ea9393045e461494c70a3b753d94d775bac4b456a87ce4d0ff88ec70982d6468004cd01bb167ec8de7
-
memory/968-226-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/968-1115-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-1114-0x0000000009160000-0x000000000968C000-memory.dmpFilesize
5.2MB
-
memory/968-1113-0x0000000008D90000-0x0000000008F52000-memory.dmpFilesize
1.8MB
-
memory/968-1112-0x0000000008D20000-0x0000000008D70000-memory.dmpFilesize
320KB
-
memory/968-1111-0x0000000008C90000-0x0000000008D06000-memory.dmpFilesize
472KB
-
memory/968-1110-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-1109-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-1108-0x0000000008A80000-0x0000000008B12000-memory.dmpFilesize
584KB
-
memory/968-1107-0x00000000083D0000-0x0000000008436000-memory.dmpFilesize
408KB
-
memory/968-1105-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-1104-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/968-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/968-1101-0x0000000007920000-0x0000000007F38000-memory.dmpFilesize
6.1MB
-
memory/968-228-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-224-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-222-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-220-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-218-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-216-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-214-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-212-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-191-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-192-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-194-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-196-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-198-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-200-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/968-202-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-204-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-205-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-201-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-206-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/968-208-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/968-210-0x0000000007170000-0x00000000071AF000-memory.dmpFilesize
252KB
-
memory/2136-177-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-163-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-151-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-185-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-184-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-183-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/2136-150-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-180-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-179-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-155-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-178-0x00000000071F0000-0x0000000007200000-memory.dmpFilesize
64KB
-
memory/2136-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/2136-175-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-159-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-171-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-169-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-167-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-165-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-161-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-173-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-157-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2136-149-0x0000000007200000-0x00000000077A4000-memory.dmpFilesize
5.6MB
-
memory/2136-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmpFilesize
180KB
-
memory/4492-1121-0x0000000000540000-0x0000000000572000-memory.dmpFilesize
200KB
-
memory/4492-1122-0x0000000004E30000-0x0000000004E40000-memory.dmpFilesize
64KB