Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:19
Static task
static1
Behavioral task
behavioral1
Sample
5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe
Resource
win10v2004-20230220-en
General
-
Target
5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe
-
Size
696KB
-
MD5
087fbb45f1779da72b3250842e52922f
-
SHA1
e993feb44644bbb564d168ce803c69fa902bea73
-
SHA256
5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b
-
SHA512
4d5c58e5b83233363c1671d5715849daf78f81a580f716813f878628a076dc201f6136037db7d17c7193492c2d27ef2888853afca0056797ba19aea688a041cb
-
SSDEEP
12288:SMrfy90ggKiysUDtdnbsLGe7SzuIdD8roMA8YL62zGjgAxI9gzgpdE:9yifUxdnQGe7SzM3QlGjxI988E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro1319.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1319.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4660-195-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4660-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un549368.exepro1319.exequ1302.exesi262484.exepid process 4184 un549368.exe 2096 pro1319.exe 4660 qu1302.exe 2728 si262484.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1319.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1319.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exeun549368.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un549368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un549368.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 220 2096 WerFault.exe pro1319.exe 2032 4660 WerFault.exe qu1302.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1319.exequ1302.exesi262484.exepid process 2096 pro1319.exe 2096 pro1319.exe 4660 qu1302.exe 4660 qu1302.exe 2728 si262484.exe 2728 si262484.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1319.exequ1302.exesi262484.exedescription pid process Token: SeDebugPrivilege 2096 pro1319.exe Token: SeDebugPrivilege 4660 qu1302.exe Token: SeDebugPrivilege 2728 si262484.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exeun549368.exedescription pid process target process PID 2648 wrote to memory of 4184 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe un549368.exe PID 2648 wrote to memory of 4184 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe un549368.exe PID 2648 wrote to memory of 4184 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe un549368.exe PID 4184 wrote to memory of 2096 4184 un549368.exe pro1319.exe PID 4184 wrote to memory of 2096 4184 un549368.exe pro1319.exe PID 4184 wrote to memory of 2096 4184 un549368.exe pro1319.exe PID 4184 wrote to memory of 4660 4184 un549368.exe qu1302.exe PID 4184 wrote to memory of 4660 4184 un549368.exe qu1302.exe PID 4184 wrote to memory of 4660 4184 un549368.exe qu1302.exe PID 2648 wrote to memory of 2728 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe si262484.exe PID 2648 wrote to memory of 2728 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe si262484.exe PID 2648 wrote to memory of 2728 2648 5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe si262484.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe"C:\Users\Admin\AppData\Local\Temp\5235be3d25acc4cbc5ea285e3b835d6180e5079ef39bcbff19088b126e70743b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549368.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 10124⤵
- Program crash
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1302.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 16644⤵
- Program crash
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262484.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262484.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2096 -ip 20961⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4660 -ip 46601⤵PID:4592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262484.exeFilesize
175KB
MD58027374aba59622c080a2faa5d1c7a77
SHA1a3cc1de86a8c0c4bce530d072209e3bf7e454941
SHA256ff83207cedb061fcf5fc740b32cec2c9f8d5f5bd60b09db732e3db14a7f4e535
SHA5122d7a3dc49d86bfd415ddcb7aa10563b5952126665c544a4a89e4ff2b67ba8aded7c4c3a99f2824c530d119dd9de2fd9823fce0435d2d1c73591dd18fdd960568
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262484.exeFilesize
175KB
MD58027374aba59622c080a2faa5d1c7a77
SHA1a3cc1de86a8c0c4bce530d072209e3bf7e454941
SHA256ff83207cedb061fcf5fc740b32cec2c9f8d5f5bd60b09db732e3db14a7f4e535
SHA5122d7a3dc49d86bfd415ddcb7aa10563b5952126665c544a4a89e4ff2b67ba8aded7c4c3a99f2824c530d119dd9de2fd9823fce0435d2d1c73591dd18fdd960568
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549368.exeFilesize
555KB
MD5d05f5d18bb4bdf2de7462bebade7a264
SHA1a3be46cfcded334fc2959ed382d462ccf02ff8a4
SHA2560ad6d89755938f141b0187489f2a663a245c71bc1f345172a13ef0bafbcc2d16
SHA512fb48aab09a36279cf75bb14a3f53384422b4e7617aef352cb3c515b9c5701d67ab652a0ae5e42d8d026a1eba3b66d55ea60072ff10909ea77f4edd3e5fae649f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549368.exeFilesize
555KB
MD5d05f5d18bb4bdf2de7462bebade7a264
SHA1a3be46cfcded334fc2959ed382d462ccf02ff8a4
SHA2560ad6d89755938f141b0187489f2a663a245c71bc1f345172a13ef0bafbcc2d16
SHA512fb48aab09a36279cf75bb14a3f53384422b4e7617aef352cb3c515b9c5701d67ab652a0ae5e42d8d026a1eba3b66d55ea60072ff10909ea77f4edd3e5fae649f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1319.exeFilesize
347KB
MD5efb6aa9f9dc1e51a667da39267f55fb2
SHA1cff110ceee2e2b24f8bb1452040de8d91c1b3edf
SHA25699145be2ae87d4fa532f8476b021c5be093c225858afe3ec669311b1240277e9
SHA5122876956988ab5ced64d64903af5125b92ccfa4e18a41f6c3ede0e990945e84f47c87c44865d410d93663fd9c894aae669fb5dd224451bb582b5c4a008bf3ad42
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1319.exeFilesize
347KB
MD5efb6aa9f9dc1e51a667da39267f55fb2
SHA1cff110ceee2e2b24f8bb1452040de8d91c1b3edf
SHA25699145be2ae87d4fa532f8476b021c5be093c225858afe3ec669311b1240277e9
SHA5122876956988ab5ced64d64903af5125b92ccfa4e18a41f6c3ede0e990945e84f47c87c44865d410d93663fd9c894aae669fb5dd224451bb582b5c4a008bf3ad42
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1302.exeFilesize
406KB
MD5a841f43cc788c2ee3f4a20cf746f70d6
SHA1ae510a9b3f2effe1e9d9ec3468bd9a6074c883a2
SHA256f064ed987b2edeaf60ddfe2e7f2f90024c92f27e31fb9112cbf27820e4cce370
SHA512e48d2c470d54870e7112a6c2c1b7d14e345991461b5e93691bc08e4ecb9097e40c7212ed683330d0b4a9d40bc77826fc25b286f981fc10c0d9b427102d4154cc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1302.exeFilesize
406KB
MD5a841f43cc788c2ee3f4a20cf746f70d6
SHA1ae510a9b3f2effe1e9d9ec3468bd9a6074c883a2
SHA256f064ed987b2edeaf60ddfe2e7f2f90024c92f27e31fb9112cbf27820e4cce370
SHA512e48d2c470d54870e7112a6c2c1b7d14e345991461b5e93691bc08e4ecb9097e40c7212ed683330d0b4a9d40bc77826fc25b286f981fc10c0d9b427102d4154cc
-
memory/2096-148-0x0000000002B90000-0x0000000002BBD000-memory.dmpFilesize
180KB
-
memory/2096-149-0x0000000007210000-0x00000000077B4000-memory.dmpFilesize
5.6MB
-
memory/2096-150-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-151-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-153-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-155-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-157-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-159-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-161-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-163-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-165-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-167-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-169-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-171-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-173-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-175-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-177-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2096-178-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-179-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-180-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/2096-183-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-184-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-185-0x0000000007200000-0x0000000007210000-memory.dmpFilesize
64KB
-
memory/2096-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/2728-1122-0x0000000000960000-0x0000000000992000-memory.dmpFilesize
200KB
-
memory/2728-1123-0x00000000054F0000-0x0000000005500000-memory.dmpFilesize
64KB
-
memory/4660-193-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-194-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-195-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-192-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/4660-1101-0x0000000007990000-0x0000000007FA8000-memory.dmpFilesize
6.1MB
-
memory/4660-1102-0x0000000007FB0000-0x00000000080BA000-memory.dmpFilesize
1.0MB
-
memory/4660-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/4660-1104-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-1105-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/4660-1107-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/4660-1108-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/4660-1109-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-1110-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-1111-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/4660-1112-0x0000000008BA0000-0x0000000008C16000-memory.dmpFilesize
472KB
-
memory/4660-1113-0x0000000008C20000-0x0000000008C70000-memory.dmpFilesize
320KB
-
memory/4660-191-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/4660-1114-0x0000000008D80000-0x0000000008F42000-memory.dmpFilesize
1.8MB
-
memory/4660-1115-0x0000000008F50000-0x000000000947C000-memory.dmpFilesize
5.2MB
-
memory/4660-1116-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB