Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:08
Static task
static1
Behavioral task
behavioral1
Sample
472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe
Resource
win10v2004-20230220-en
General
-
Target
472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe
-
Size
699KB
-
MD5
965feada1c45d170931975b589e851d9
-
SHA1
66bd13882bb05bc2c69840f432e51b49096f2290
-
SHA256
472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90
-
SHA512
bd3911b8324b23721a81b07742e908e296f4f7070059a894a6d1525643411831cee3171f39dd5dbf4b5e7b3d008b471705f65320a876ffdbe91a92748f559f59
-
SSDEEP
12288:mMrvy90pSIRoOFjyV1N8xrff90NmzChyNb5tYwL6eCGjQAxI9gNgZYb:hy+RNK1NS9qmGAuG4GjhI90d
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro9865.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9865.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9865.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2716-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-219-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-223-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2716-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un614490.exepro9865.exequ5989.exesi472421.exepid process 3248 un614490.exe 1120 pro9865.exe 2716 qu5989.exe 220 si472421.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9865.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9865.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exeun614490.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un614490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un614490.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2292 1120 WerFault.exe pro9865.exe 5096 2716 WerFault.exe qu5989.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9865.exequ5989.exesi472421.exepid process 1120 pro9865.exe 1120 pro9865.exe 2716 qu5989.exe 2716 qu5989.exe 220 si472421.exe 220 si472421.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9865.exequ5989.exesi472421.exedescription pid process Token: SeDebugPrivilege 1120 pro9865.exe Token: SeDebugPrivilege 2716 qu5989.exe Token: SeDebugPrivilege 220 si472421.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exeun614490.exedescription pid process target process PID 3820 wrote to memory of 3248 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe un614490.exe PID 3820 wrote to memory of 3248 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe un614490.exe PID 3820 wrote to memory of 3248 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe un614490.exe PID 3248 wrote to memory of 1120 3248 un614490.exe pro9865.exe PID 3248 wrote to memory of 1120 3248 un614490.exe pro9865.exe PID 3248 wrote to memory of 1120 3248 un614490.exe pro9865.exe PID 3248 wrote to memory of 2716 3248 un614490.exe qu5989.exe PID 3248 wrote to memory of 2716 3248 un614490.exe qu5989.exe PID 3248 wrote to memory of 2716 3248 un614490.exe qu5989.exe PID 3820 wrote to memory of 220 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe si472421.exe PID 3820 wrote to memory of 220 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe si472421.exe PID 3820 wrote to memory of 220 3820 472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe si472421.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe"C:\Users\Admin\AppData\Local\Temp\472d3ed097a2bc9fce1fbc3f389b78eaec27586cf39010a593aeec993e8f9e90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614490.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9865.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9865.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 10804⤵
- Program crash
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5989.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5989.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 11924⤵
- Program crash
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si472421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si472421.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1120 -ip 11201⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2716 -ip 27161⤵PID:5092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si472421.exeFilesize
175KB
MD5b096bc32ae531c681835ed9ec9d2a3b6
SHA18556b54f8c5d9b77f86747c67a785491bce0c65d
SHA256b7c6a280c9fcff2e99f8cac83b191bbb24ad2c91a21f440e9eefa21db3d98247
SHA512b9327a12979c950bd9a46c483fafd6852779b8a5b790336cc652f568bd3d2477d6a833b409bcce0013bbc29f7d6048c2d781ba920b7ca1e990ac57a4b2cab923
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si472421.exeFilesize
175KB
MD5b096bc32ae531c681835ed9ec9d2a3b6
SHA18556b54f8c5d9b77f86747c67a785491bce0c65d
SHA256b7c6a280c9fcff2e99f8cac83b191bbb24ad2c91a21f440e9eefa21db3d98247
SHA512b9327a12979c950bd9a46c483fafd6852779b8a5b790336cc652f568bd3d2477d6a833b409bcce0013bbc29f7d6048c2d781ba920b7ca1e990ac57a4b2cab923
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614490.exeFilesize
556KB
MD5027da3a709d3868596e668a7b384bad9
SHA1787dd140af98c1ef5e9377a3058be9c1f6b5324d
SHA256667bc61436bb931b7961fd9adb1fd571a3eba58648e6976dc131492601e364af
SHA512a2801c7dc68213e1addc832f339f68bf03d22b128174d038b5277df69bd834c2330c3b8e4805f39dccd441775d0e55886f32bbe8b0913535543376c655189b0b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614490.exeFilesize
556KB
MD5027da3a709d3868596e668a7b384bad9
SHA1787dd140af98c1ef5e9377a3058be9c1f6b5324d
SHA256667bc61436bb931b7961fd9adb1fd571a3eba58648e6976dc131492601e364af
SHA512a2801c7dc68213e1addc832f339f68bf03d22b128174d038b5277df69bd834c2330c3b8e4805f39dccd441775d0e55886f32bbe8b0913535543376c655189b0b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9865.exeFilesize
347KB
MD5ca65c58dc36f068616584c57d1e4f1cc
SHA1a19784154643cff5db8b5fdf57212e0d2dc09f19
SHA256960604e7837d171b004b3ce0e1ecc13409b1bed92dfae0b5a97f0f2ff1d45c5f
SHA512d97bd45dcab557d76c3122af03c28ba4609cd449a349b315494d5de2b50e5997c0f9748e3d2e1448c835fbc03b1f46c990f6ca7c2a2fdef0426c710e75e65a49
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9865.exeFilesize
347KB
MD5ca65c58dc36f068616584c57d1e4f1cc
SHA1a19784154643cff5db8b5fdf57212e0d2dc09f19
SHA256960604e7837d171b004b3ce0e1ecc13409b1bed92dfae0b5a97f0f2ff1d45c5f
SHA512d97bd45dcab557d76c3122af03c28ba4609cd449a349b315494d5de2b50e5997c0f9748e3d2e1448c835fbc03b1f46c990f6ca7c2a2fdef0426c710e75e65a49
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5989.exeFilesize
406KB
MD5581841ccb58fceb3d666bd4aa181c6b4
SHA19f5c4d4f1dd8d33ae03d0659b2ff5d7e01ad6002
SHA256c419c77cad168fd073eb2e85bdbb11b320459b82f24c76ac186f389272afa606
SHA512da807b68391f9fa88fc7f0e2cc959763f7458d9803c801ee8b044c540b204a5924665e92ad3c46247a0ef01eedd32899cd1e5e92c13693f5fd6f3398acb9b0ec
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5989.exeFilesize
406KB
MD5581841ccb58fceb3d666bd4aa181c6b4
SHA19f5c4d4f1dd8d33ae03d0659b2ff5d7e01ad6002
SHA256c419c77cad168fd073eb2e85bdbb11b320459b82f24c76ac186f389272afa606
SHA512da807b68391f9fa88fc7f0e2cc959763f7458d9803c801ee8b044c540b204a5924665e92ad3c46247a0ef01eedd32899cd1e5e92c13693f5fd6f3398acb9b0ec
-
memory/220-1122-0x0000000000D60000-0x0000000000D92000-memory.dmpFilesize
200KB
-
memory/220-1123-0x0000000005970000-0x0000000005980000-memory.dmpFilesize
64KB
-
memory/220-1124-0x0000000005970000-0x0000000005980000-memory.dmpFilesize
64KB
-
memory/1120-163-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-175-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-151-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-155-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-157-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-159-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-161-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-150-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-165-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-167-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-169-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-171-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-173-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-153-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-177-0x0000000004D70000-0x0000000004D82000-memory.dmpFilesize
72KB
-
memory/1120-178-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-179-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-180-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/1120-183-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-184-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-185-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/1120-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/1120-149-0x00000000070E0000-0x0000000007684000-memory.dmpFilesize
5.6MB
-
memory/1120-148-0x0000000002C80000-0x0000000002CAD000-memory.dmpFilesize
180KB
-
memory/2716-193-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-228-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-219-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-223-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/2716-1101-0x0000000007880000-0x0000000007E98000-memory.dmpFilesize
6.1MB
-
memory/2716-1102-0x0000000007EA0000-0x0000000007FAA000-memory.dmpFilesize
1.0MB
-
memory/2716-1103-0x0000000007290000-0x00000000072A2000-memory.dmpFilesize
72KB
-
memory/2716-1104-0x0000000007FB0000-0x0000000007FEC000-memory.dmpFilesize
240KB
-
memory/2716-1105-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-1107-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/2716-1108-0x0000000008290000-0x0000000008322000-memory.dmpFilesize
584KB
-
memory/2716-1109-0x0000000008330000-0x0000000008396000-memory.dmpFilesize
408KB
-
memory/2716-1110-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-1111-0x0000000008B90000-0x0000000008D52000-memory.dmpFilesize
1.8MB
-
memory/2716-1112-0x0000000008D70000-0x000000000929C000-memory.dmpFilesize
5.2MB
-
memory/2716-1113-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-192-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2716-191-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/2716-1114-0x00000000093C0000-0x0000000009436000-memory.dmpFilesize
472KB
-
memory/2716-1115-0x0000000009460000-0x00000000094B0000-memory.dmpFilesize
320KB
-
memory/2716-1116-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB