Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:33
Static task
static1
Behavioral task
behavioral1
Sample
a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe
Resource
win10v2004-20230220-en
General
-
Target
a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe
-
Size
697KB
-
MD5
0ebd8340abfaa6e0236adb2e8e874046
-
SHA1
c3f1c47e4929db078f8db1f944f9878370e002c7
-
SHA256
a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0
-
SHA512
d357ec6703ef90b98546a4c62da151ccea9a214b1f1c88170c67dd615a530d3e95bb012549981a9f077fb01de7830991ef546ab05ee7d17f8fa301fa500548a8
-
SSDEEP
12288:dMrjy903TShUFyL0YfT8B/YixyGaSSTmLL643GjJAxI9goIRq:Gy8yV0YfT2x3aS9XGjCI95sq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro6713.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6713.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1180-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-196-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1180-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un108424.exepro6713.exequ5196.exesi130733.exepid process 4268 un108424.exe 4688 pro6713.exe 1180 qu5196.exe 5016 si130733.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6713.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6713.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exeun108424.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un108424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un108424.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3752 4688 WerFault.exe pro6713.exe 524 1180 WerFault.exe qu5196.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6713.exequ5196.exesi130733.exepid process 4688 pro6713.exe 4688 pro6713.exe 1180 qu5196.exe 1180 qu5196.exe 5016 si130733.exe 5016 si130733.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6713.exequ5196.exesi130733.exedescription pid process Token: SeDebugPrivilege 4688 pro6713.exe Token: SeDebugPrivilege 1180 qu5196.exe Token: SeDebugPrivilege 5016 si130733.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exeun108424.exedescription pid process target process PID 4424 wrote to memory of 4268 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe un108424.exe PID 4424 wrote to memory of 4268 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe un108424.exe PID 4424 wrote to memory of 4268 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe un108424.exe PID 4268 wrote to memory of 4688 4268 un108424.exe pro6713.exe PID 4268 wrote to memory of 4688 4268 un108424.exe pro6713.exe PID 4268 wrote to memory of 4688 4268 un108424.exe pro6713.exe PID 4268 wrote to memory of 1180 4268 un108424.exe qu5196.exe PID 4268 wrote to memory of 1180 4268 un108424.exe qu5196.exe PID 4268 wrote to memory of 1180 4268 un108424.exe qu5196.exe PID 4424 wrote to memory of 5016 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe si130733.exe PID 4424 wrote to memory of 5016 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe si130733.exe PID 4424 wrote to memory of 5016 4424 a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe si130733.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe"C:\Users\Admin\AppData\Local\Temp\a1c2137af99ca160899b6a826e3c1bdf7e98f3d1401508d5ed80afbaff2b8cb0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108424.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6713.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5196.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 19444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130733.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130733.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4688 -ip 46881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1180 -ip 11801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130733.exeFilesize
175KB
MD5f31ccf7a72c69cfc992152ff1d9ef6f2
SHA161efba3f8a1e876fa4d596a855540490f6894d97
SHA256ea34f2a736e1d42c650819ac98de2e334c0b66551b45eb965b806be56ea60531
SHA512335d9ca6d8a950c43c430aa4d6cfe8fff6bec4db3e6d4d02aa904746cb49d2156e6062fe6c00a6b163b824a4368576c91140535624e5fcbecd391f7557b31409
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130733.exeFilesize
175KB
MD5f31ccf7a72c69cfc992152ff1d9ef6f2
SHA161efba3f8a1e876fa4d596a855540490f6894d97
SHA256ea34f2a736e1d42c650819ac98de2e334c0b66551b45eb965b806be56ea60531
SHA512335d9ca6d8a950c43c430aa4d6cfe8fff6bec4db3e6d4d02aa904746cb49d2156e6062fe6c00a6b163b824a4368576c91140535624e5fcbecd391f7557b31409
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108424.exeFilesize
555KB
MD5ea4855a58ab2f2be692f104238ade475
SHA152f1c43711c8f90f839debc5fdbfa0bec45b6625
SHA25671ff5a17ff929a75e467ccaed6925492e7d8bb76801d09c25fd157b5148fdfb6
SHA51278e32267a8c356599c8ab2c078aabd18b4d6fa78ff3d53111b3f85c8395da3165ade8c0b0aeb7aaab851ee1cfb70303a89325c6eb82d5fbe2178049ecde90f46
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108424.exeFilesize
555KB
MD5ea4855a58ab2f2be692f104238ade475
SHA152f1c43711c8f90f839debc5fdbfa0bec45b6625
SHA25671ff5a17ff929a75e467ccaed6925492e7d8bb76801d09c25fd157b5148fdfb6
SHA51278e32267a8c356599c8ab2c078aabd18b4d6fa78ff3d53111b3f85c8395da3165ade8c0b0aeb7aaab851ee1cfb70303a89325c6eb82d5fbe2178049ecde90f46
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6713.exeFilesize
347KB
MD5466539c6ce2267a293704895f2ce175a
SHA100cc2bb6afef75acc87477dc3ac1178772d082e8
SHA256dc38360695ff4bf3d5d412d370f9afa91743955d990f51a2f5807d48c36dfd07
SHA5122c0bf33ec9cd8792e9e9ae237d7f4f2590dddae2b4949a84c188351688a4f275cc42bf93a97aa05ee9a76c4e918b68ded14c61b848df0120eb6ae24b72f921dc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6713.exeFilesize
347KB
MD5466539c6ce2267a293704895f2ce175a
SHA100cc2bb6afef75acc87477dc3ac1178772d082e8
SHA256dc38360695ff4bf3d5d412d370f9afa91743955d990f51a2f5807d48c36dfd07
SHA5122c0bf33ec9cd8792e9e9ae237d7f4f2590dddae2b4949a84c188351688a4f275cc42bf93a97aa05ee9a76c4e918b68ded14c61b848df0120eb6ae24b72f921dc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5196.exeFilesize
406KB
MD56d1800d06f23b05def8163c8e482c496
SHA1264a069af0d7fb12eabc05a20520bf6a43f3308f
SHA256d933b40dd8a46574bc9f264f0e21cd3a662fdf8e3166a21a1334679aec547d63
SHA51238e265185c4f8a0528e053698ce5a25054ebd550f69247a0dfa2632e9be63d86d163e487d7b03e3e1873d503feb59c66562b9c4daa780f80b272347a7eb13195
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5196.exeFilesize
406KB
MD56d1800d06f23b05def8163c8e482c496
SHA1264a069af0d7fb12eabc05a20520bf6a43f3308f
SHA256d933b40dd8a46574bc9f264f0e21cd3a662fdf8e3166a21a1334679aec547d63
SHA51238e265185c4f8a0528e053698ce5a25054ebd550f69247a0dfa2632e9be63d86d163e487d7b03e3e1873d503feb59c66562b9c4daa780f80b272347a7eb13195
-
memory/1180-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/1180-226-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-202-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-206-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-1115-0x0000000009210000-0x00000000093D2000-memory.dmpFilesize
1.8MB
-
memory/1180-1114-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-1113-0x0000000008E50000-0x0000000008EA0000-memory.dmpFilesize
320KB
-
memory/1180-1112-0x0000000008DB0000-0x0000000008E26000-memory.dmpFilesize
472KB
-
memory/1180-1111-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-1110-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-203-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-1109-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-1108-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/1180-1107-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/1180-1105-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/1180-1104-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/1180-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/1180-228-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-214-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-224-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-222-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-220-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-191-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-192-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-194-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-196-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-198-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-201-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-200-0x0000000002DE0000-0x0000000002E2B000-memory.dmpFilesize
300KB
-
memory/1180-218-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-1116-0x00000000093E0000-0x000000000990C000-memory.dmpFilesize
5.2MB
-
memory/1180-216-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-205-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1180-208-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-212-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/1180-210-0x0000000007140000-0x000000000717F000-memory.dmpFilesize
252KB
-
memory/4688-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4688-173-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-148-0x0000000002B90000-0x0000000002BBD000-memory.dmpFilesize
180KB
-
memory/4688-151-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-153-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4688-184-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-185-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-183-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-150-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-155-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-180-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-179-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-178-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/4688-177-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-175-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-171-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-169-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-167-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-165-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-163-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-161-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-159-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/4688-149-0x00000000073B0000-0x0000000007954000-memory.dmpFilesize
5.6MB
-
memory/4688-157-0x0000000004930000-0x0000000004942000-memory.dmpFilesize
72KB
-
memory/5016-1122-0x0000000000E70000-0x0000000000EA2000-memory.dmpFilesize
200KB
-
memory/5016-1123-0x0000000005770000-0x0000000005780000-memory.dmpFilesize
64KB