Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:16
Static task
static1
Behavioral task
behavioral1
Sample
14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe
Resource
win10v2004-20230220-en
General
-
Target
14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe
-
Size
697KB
-
MD5
062a864674aa43b7306c547ca96f0553
-
SHA1
424f89287ef99371c541bd0d7b753b9af3654e6a
-
SHA256
14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c
-
SHA512
1ad3dff8270040a9242a02e89ed50f1fef92ddf9536ab99abed296eff43dac1e22caaa6f2801b7aef852957edf965b985bac9049cb1699ed26cfa5eb81b1abc1
-
SSDEEP
12288:9MrBy90mJhcV+NPtqXBnaZiimOi6PUL6MhGjwAxI9g4ivCMtzuX:YyvJt0BaZiiv67GjBI9p7MtY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro8723.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8723.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8723.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1492-192-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-193-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-195-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-197-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-199-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-201-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-203-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-205-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-207-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-210-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-213-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-216-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-218-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-220-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-222-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-224-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-226-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-228-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/1492-1109-0x0000000007310000-0x0000000007320000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un577111.exepro8723.exequ1017.exesi042594.exepid process 4528 un577111.exe 1776 pro8723.exe 1492 qu1017.exe 3336 si042594.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8723.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8723.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exeun577111.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un577111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un577111.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5060 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4668 1776 WerFault.exe pro8723.exe 1784 1492 WerFault.exe qu1017.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8723.exequ1017.exesi042594.exepid process 1776 pro8723.exe 1776 pro8723.exe 1492 qu1017.exe 1492 qu1017.exe 3336 si042594.exe 3336 si042594.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8723.exequ1017.exesi042594.exedescription pid process Token: SeDebugPrivilege 1776 pro8723.exe Token: SeDebugPrivilege 1492 qu1017.exe Token: SeDebugPrivilege 3336 si042594.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exeun577111.exedescription pid process target process PID 264 wrote to memory of 4528 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe un577111.exe PID 264 wrote to memory of 4528 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe un577111.exe PID 264 wrote to memory of 4528 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe un577111.exe PID 4528 wrote to memory of 1776 4528 un577111.exe pro8723.exe PID 4528 wrote to memory of 1776 4528 un577111.exe pro8723.exe PID 4528 wrote to memory of 1776 4528 un577111.exe pro8723.exe PID 4528 wrote to memory of 1492 4528 un577111.exe qu1017.exe PID 4528 wrote to memory of 1492 4528 un577111.exe qu1017.exe PID 4528 wrote to memory of 1492 4528 un577111.exe qu1017.exe PID 264 wrote to memory of 3336 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe si042594.exe PID 264 wrote to memory of 3336 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe si042594.exe PID 264 wrote to memory of 3336 264 14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe si042594.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe"C:\Users\Admin\AppData\Local\Temp\14b4cc57443634b55b943a02180b877710e98718d28a2614df2dffbad9b2a70c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un577111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un577111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8723.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 10084⤵
- Program crash
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1017.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 14244⤵
- Program crash
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042594.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042594.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1776 -ip 17761⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1492 -ip 14921⤵PID:1756
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042594.exeFilesize
175KB
MD574113ea981d0eec9c0d84c077477cecb
SHA164294d26d54f7405c017e6571150a988087109f8
SHA2564f2a3f0bfdc1e632b46fb395294d59d32d96eab0b1cd6fc8e51e36f930b5122c
SHA5126aa02621a58cfcef86e659c70c87c1af2144ba6573a70a674d5d8ab93c21f330ce4575b0cae1c7758430e2dff9f82ba7145fd80c6a999d6b1bb169d10a50bf14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042594.exeFilesize
175KB
MD574113ea981d0eec9c0d84c077477cecb
SHA164294d26d54f7405c017e6571150a988087109f8
SHA2564f2a3f0bfdc1e632b46fb395294d59d32d96eab0b1cd6fc8e51e36f930b5122c
SHA5126aa02621a58cfcef86e659c70c87c1af2144ba6573a70a674d5d8ab93c21f330ce4575b0cae1c7758430e2dff9f82ba7145fd80c6a999d6b1bb169d10a50bf14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un577111.exeFilesize
555KB
MD58093cbb708becb5b91d2b20c8b73fb94
SHA1ba1cfd9db7de5e8894864a4537daafc05aad0701
SHA2564e425d9efc7375beed4c05c37f54262391d9ae061dc48ddd15bbff9bfa398f6c
SHA512d45591351f635a5cb4f3584cfa731e4a92c3b8c9e9a637bbd953e7440a1269b078365cf777ff0799a4d0e48dac4f510b0c305e2d6cdcc67217588c95d67e63e8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un577111.exeFilesize
555KB
MD58093cbb708becb5b91d2b20c8b73fb94
SHA1ba1cfd9db7de5e8894864a4537daafc05aad0701
SHA2564e425d9efc7375beed4c05c37f54262391d9ae061dc48ddd15bbff9bfa398f6c
SHA512d45591351f635a5cb4f3584cfa731e4a92c3b8c9e9a637bbd953e7440a1269b078365cf777ff0799a4d0e48dac4f510b0c305e2d6cdcc67217588c95d67e63e8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8723.exeFilesize
347KB
MD54b4b7421b06993e6c946bbf0b3213976
SHA10e56c503343985fd7d672ca4b3cd5574ac79080a
SHA2565856dcc088e1213af973fb2a4f2a2e42fd78a249b8993c73316673c13d1305d8
SHA512136e1d02d026047765b8de81897a7822a510e61bd197e7dd029acaae72b82ca8837648e8920ce4d4a67ca96bbb557e435ea827b44cf8aceccaa6da61475a3b48
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8723.exeFilesize
347KB
MD54b4b7421b06993e6c946bbf0b3213976
SHA10e56c503343985fd7d672ca4b3cd5574ac79080a
SHA2565856dcc088e1213af973fb2a4f2a2e42fd78a249b8993c73316673c13d1305d8
SHA512136e1d02d026047765b8de81897a7822a510e61bd197e7dd029acaae72b82ca8837648e8920ce4d4a67ca96bbb557e435ea827b44cf8aceccaa6da61475a3b48
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1017.exeFilesize
406KB
MD5e3a4e7fc7273f8ba39b2eeabc0a6ac1a
SHA1d5e369265d8854ec724ad2f8afd950f8001a6815
SHA256e843eb260bedd6cdc6c7c8a7c283b584c07cd7e890f415a15acccb5e0609731f
SHA51229dfa0ac5e9218f878600430c39c4af6e295e43a73eedf7954c491710ca0483511302e7025df30912130c1db96a55e481d3aa7e50d62c65793ef9326ded3040f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1017.exeFilesize
406KB
MD5e3a4e7fc7273f8ba39b2eeabc0a6ac1a
SHA1d5e369265d8854ec724ad2f8afd950f8001a6815
SHA256e843eb260bedd6cdc6c7c8a7c283b584c07cd7e890f415a15acccb5e0609731f
SHA51229dfa0ac5e9218f878600430c39c4af6e295e43a73eedf7954c491710ca0483511302e7025df30912130c1db96a55e481d3aa7e50d62c65793ef9326ded3040f
-
memory/1492-1102-0x0000000007EF0000-0x0000000007FFA000-memory.dmpFilesize
1.0MB
-
memory/1492-226-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-1117-0x000000000A630000-0x000000000A680000-memory.dmpFilesize
320KB
-
memory/1492-1116-0x000000000A5B0000-0x000000000A626000-memory.dmpFilesize
472KB
-
memory/1492-1114-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-207-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-1113-0x0000000009EE0000-0x000000000A40C000-memory.dmpFilesize
5.2MB
-
memory/1492-1112-0x0000000009D10000-0x0000000009ED2000-memory.dmpFilesize
1.8MB
-
memory/1492-1111-0x0000000008950000-0x00000000089E2000-memory.dmpFilesize
584KB
-
memory/1492-1110-0x0000000008290000-0x00000000082F6000-memory.dmpFilesize
408KB
-
memory/1492-1109-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-1108-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-1107-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-210-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-1105-0x00000000072B0000-0x00000000072EC000-memory.dmpFilesize
240KB
-
memory/1492-1104-0x0000000007290000-0x00000000072A2000-memory.dmpFilesize
72KB
-
memory/1492-1103-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/1492-228-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-213-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-224-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-222-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-220-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-191-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/1492-192-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-209-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-195-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-197-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-199-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-201-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-203-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-205-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-218-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-216-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-193-0x00000000071A0000-0x00000000071DF000-memory.dmpFilesize
252KB
-
memory/1492-214-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1492-212-0x0000000007310000-0x0000000007320000-memory.dmpFilesize
64KB
-
memory/1776-182-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-176-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-160-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-151-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-152-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/1776-185-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-184-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-156-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-150-0x0000000007140000-0x00000000076E4000-memory.dmpFilesize
5.6MB
-
memory/1776-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/1776-178-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-180-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-174-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-172-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-168-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-170-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-166-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-164-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-162-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-161-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-158-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-154-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/1776-149-0x0000000007130000-0x0000000007140000-memory.dmpFilesize
64KB
-
memory/1776-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmpFilesize
180KB
-
memory/3336-1123-0x0000000000F20000-0x0000000000F52000-memory.dmpFilesize
200KB
-
memory/3336-1124-0x0000000005880000-0x0000000005890000-memory.dmpFilesize
64KB
-
memory/3336-1125-0x0000000005880000-0x0000000005890000-memory.dmpFilesize
64KB