Analysis
-
max time kernel
83s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:14
Static task
static1
Behavioral task
behavioral1
Sample
795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe
Resource
win10v2004-20230220-en
General
-
Target
795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe
-
Size
698KB
-
MD5
afdbd4fdd25fca51eb5cff90be3e3578
-
SHA1
5e4e7264cff8aafe7fc13b4a3028f7dc37e2851a
-
SHA256
795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488
-
SHA512
16b908b88fd66c9c904397b0522aa472344dd33e3b0ba50f8b57983a05612703270f4b8b2028bb6eeca565a9f79a0c491daef6b09be8cb44e560baee2ff9ad08
-
SSDEEP
12288:VMrpy90HBO3sbx/FHB35LfZtwNJZmSg9+L6OyGjtAxI9gjXFKO1WD:MyF3sbB35LfgxmkYGjeI90sOE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro0357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0357.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3900-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-192-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-194-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-196-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-198-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-200-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-202-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-210-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-212-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-214-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-216-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-218-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-220-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-222-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-224-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-226-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/3900-228-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un305951.exepro0357.exequ9211.exesi438077.exepid process 4704 un305951.exe 1756 pro0357.exe 3900 qu9211.exe 3888 si438077.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0357.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exeun305951.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un305951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un305951.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3328 1756 WerFault.exe pro0357.exe 536 3900 WerFault.exe qu9211.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0357.exequ9211.exesi438077.exepid process 1756 pro0357.exe 1756 pro0357.exe 3900 qu9211.exe 3900 qu9211.exe 3888 si438077.exe 3888 si438077.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0357.exequ9211.exesi438077.exedescription pid process Token: SeDebugPrivilege 1756 pro0357.exe Token: SeDebugPrivilege 3900 qu9211.exe Token: SeDebugPrivilege 3888 si438077.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exeun305951.exedescription pid process target process PID 1072 wrote to memory of 4704 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe un305951.exe PID 1072 wrote to memory of 4704 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe un305951.exe PID 1072 wrote to memory of 4704 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe un305951.exe PID 4704 wrote to memory of 1756 4704 un305951.exe pro0357.exe PID 4704 wrote to memory of 1756 4704 un305951.exe pro0357.exe PID 4704 wrote to memory of 1756 4704 un305951.exe pro0357.exe PID 4704 wrote to memory of 3900 4704 un305951.exe qu9211.exe PID 4704 wrote to memory of 3900 4704 un305951.exe qu9211.exe PID 4704 wrote to memory of 3900 4704 un305951.exe qu9211.exe PID 1072 wrote to memory of 3888 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe si438077.exe PID 1072 wrote to memory of 3888 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe si438077.exe PID 1072 wrote to memory of 3888 1072 795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe si438077.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe"C:\Users\Admin\AppData\Local\Temp\795ed6e9358d37f23a259ea77e8a47ef4c56503fa8cee5620bc6b20187d3e488.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0357.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 10844⤵
- Program crash
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9211.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 17204⤵
- Program crash
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438077.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1756 -ip 17561⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3900 -ip 39001⤵PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438077.exeFilesize
175KB
MD5d4d60d5a2662b9254447bff196dce905
SHA1e84500081a1447bab75d21cb3b43436a8eb28a54
SHA2566d21001afd68d323fcfbd7e03007fc0460cfd96d78689b29193c49c8ed5b688e
SHA512a246637df8df10441dccd148ea1ca8c10e0ecdbf6d4c31f439563d6f063d7dbff6f7ddd0003e849cb9b3a38009d3d283af53f0a9b5e3cf0280e2a2c5c9e0d59d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438077.exeFilesize
175KB
MD5d4d60d5a2662b9254447bff196dce905
SHA1e84500081a1447bab75d21cb3b43436a8eb28a54
SHA2566d21001afd68d323fcfbd7e03007fc0460cfd96d78689b29193c49c8ed5b688e
SHA512a246637df8df10441dccd148ea1ca8c10e0ecdbf6d4c31f439563d6f063d7dbff6f7ddd0003e849cb9b3a38009d3d283af53f0a9b5e3cf0280e2a2c5c9e0d59d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305951.exeFilesize
556KB
MD58858a219fa130f1b1e6706eb4545d996
SHA11605b3a658d5fd83d9a05ae45a84a4ee6302391a
SHA2562fa3bba7c3002d6542e48d7ae747cde61d33486548de04fb87149a12788937e7
SHA512c4964de239718edc3513fad83ee30a553b54a2c5b67abf2bf710484fe6e4e8e659f4dc960c224605d50441373742da830ab9d2a66723741305d851a07c08a746
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305951.exeFilesize
556KB
MD58858a219fa130f1b1e6706eb4545d996
SHA11605b3a658d5fd83d9a05ae45a84a4ee6302391a
SHA2562fa3bba7c3002d6542e48d7ae747cde61d33486548de04fb87149a12788937e7
SHA512c4964de239718edc3513fad83ee30a553b54a2c5b67abf2bf710484fe6e4e8e659f4dc960c224605d50441373742da830ab9d2a66723741305d851a07c08a746
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0357.exeFilesize
347KB
MD56e87a55e949a049fdbabc2ad57f001d1
SHA1af98d21d0d167781f85889f80abfa2b04b9502f6
SHA25674ea0bc04e9a57ea1d64067bc89582bd9e796e7f8c3033217d468833c1c1c9e0
SHA5124d2140f7c990931574648719b3b3c9848f5dd425b047945d40cda463c2b356a21f14799f212734c5d0091dc5078e0566d00acf62ea2fc0a77a42959b3d89c557
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0357.exeFilesize
347KB
MD56e87a55e949a049fdbabc2ad57f001d1
SHA1af98d21d0d167781f85889f80abfa2b04b9502f6
SHA25674ea0bc04e9a57ea1d64067bc89582bd9e796e7f8c3033217d468833c1c1c9e0
SHA5124d2140f7c990931574648719b3b3c9848f5dd425b047945d40cda463c2b356a21f14799f212734c5d0091dc5078e0566d00acf62ea2fc0a77a42959b3d89c557
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9211.exeFilesize
406KB
MD591b38db789f72ceb7d94d75839f6a1ea
SHA168d88c9b675b4cde6ac91ef736c95016dead0474
SHA256410bf370538cb96cb66f8ca676d643cb626ac12d951e274b41fafd8907f40229
SHA51251ae9e5a41c05c5a1af6b003c56584ffdcd0fcaf8866195f3b7b02d8888edc12ed2e9d2ca7dca1c1808d638a37e12b157de7e3792c8a339c457cabb6b35d3ff3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9211.exeFilesize
406KB
MD591b38db789f72ceb7d94d75839f6a1ea
SHA168d88c9b675b4cde6ac91ef736c95016dead0474
SHA256410bf370538cb96cb66f8ca676d643cb626ac12d951e274b41fafd8907f40229
SHA51251ae9e5a41c05c5a1af6b003c56584ffdcd0fcaf8866195f3b7b02d8888edc12ed2e9d2ca7dca1c1808d638a37e12b157de7e3792c8a339c457cabb6b35d3ff3
-
memory/1756-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB
-
memory/1756-149-0x00000000073C0000-0x0000000007964000-memory.dmpFilesize
5.6MB
-
memory/1756-150-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-151-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-153-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-155-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-157-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-159-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-161-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-163-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-165-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-167-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-169-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-171-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-173-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-175-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-177-0x0000000004EA0000-0x0000000004EB2000-memory.dmpFilesize
72KB
-
memory/1756-178-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-179-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-180-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/1756-184-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-183-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-185-0x00000000073B0000-0x00000000073C0000-memory.dmpFilesize
64KB
-
memory/1756-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/3888-1123-0x0000000000100000-0x0000000000132000-memory.dmpFilesize
200KB
-
memory/3888-1125-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/3888-1124-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/3900-194-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-228-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-198-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-200-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-202-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-203-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/3900-205-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-207-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-209-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-210-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-212-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-214-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-216-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-218-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-220-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-222-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-224-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-226-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-196-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-1101-0x00000000079F0000-0x0000000008008000-memory.dmpFilesize
6.1MB
-
memory/3900-1102-0x0000000008010000-0x000000000811A000-memory.dmpFilesize
1.0MB
-
memory/3900-1103-0x0000000004E80000-0x0000000004E92000-memory.dmpFilesize
72KB
-
memory/3900-1104-0x0000000008120000-0x000000000815C000-memory.dmpFilesize
240KB
-
memory/3900-1105-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-1107-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-1108-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-1109-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-1110-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/3900-1111-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/3900-1112-0x0000000008CA0000-0x0000000008E62000-memory.dmpFilesize
1.8MB
-
memory/3900-1113-0x0000000008E70000-0x000000000939C000-memory.dmpFilesize
5.2MB
-
memory/3900-192-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmpFilesize
252KB
-
memory/3900-1114-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3900-1115-0x0000000009620000-0x0000000009696000-memory.dmpFilesize
472KB
-
memory/3900-1116-0x00000000096B0000-0x0000000009700000-memory.dmpFilesize
320KB