Analysis
-
max time kernel
59s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:33
Static task
static1
Behavioral task
behavioral1
Sample
2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe
Resource
win10v2004-20230220-en
General
-
Target
2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe
-
Size
697KB
-
MD5
f6e9635a00410c2158620e961a142033
-
SHA1
2fd20f035a8f34ba461338de9e8df2c1355f39e9
-
SHA256
2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43
-
SHA512
bbe7c4c242529c0916c365228e799a7808c2aa73922db1d9b70587c75376d7d51f79cd672cfff76f80a5f0842417f6c8f453cafa3590644d8959cd66f020277b
-
SSDEEP
12288:nMrzy90QyplmnQjq8aoGsG58G/YWRjF2d7fCN39CdEf/ap/TGgIw:oy8jjqDobG5FRjF29KNtCM/e/igIw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro0538.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0538.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0538.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4224-191-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-192-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-195-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-199-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-202-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-200-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline behavioral1/memory/4224-204-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-206-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-208-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-210-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-212-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-214-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-216-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-218-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-220-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-222-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-224-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-226-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-228-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/4224-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un557072.exepro0538.exequ6261.exesi972783.exepid process 552 un557072.exe 4340 pro0538.exe 4224 qu6261.exe 1424 si972783.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0538.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0538.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exeun557072.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un557072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un557072.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1892 4340 WerFault.exe pro0538.exe 4912 4224 WerFault.exe qu6261.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0538.exequ6261.exesi972783.exepid process 4340 pro0538.exe 4340 pro0538.exe 4224 qu6261.exe 4224 qu6261.exe 1424 si972783.exe 1424 si972783.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0538.exequ6261.exesi972783.exedescription pid process Token: SeDebugPrivilege 4340 pro0538.exe Token: SeDebugPrivilege 4224 qu6261.exe Token: SeDebugPrivilege 1424 si972783.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exeun557072.exedescription pid process target process PID 1044 wrote to memory of 552 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe un557072.exe PID 1044 wrote to memory of 552 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe un557072.exe PID 1044 wrote to memory of 552 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe un557072.exe PID 552 wrote to memory of 4340 552 un557072.exe pro0538.exe PID 552 wrote to memory of 4340 552 un557072.exe pro0538.exe PID 552 wrote to memory of 4340 552 un557072.exe pro0538.exe PID 552 wrote to memory of 4224 552 un557072.exe qu6261.exe PID 552 wrote to memory of 4224 552 un557072.exe qu6261.exe PID 552 wrote to memory of 4224 552 un557072.exe qu6261.exe PID 1044 wrote to memory of 1424 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe si972783.exe PID 1044 wrote to memory of 1424 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe si972783.exe PID 1044 wrote to memory of 1424 1044 2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe si972783.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe"C:\Users\Admin\AppData\Local\Temp\2eb2266800e2abfe657d64f4b9b6fec331bc0b31e6f3c4d6a7556836b72bff43.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un557072.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un557072.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0538.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0538.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 10804⤵
- Program crash
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6261.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 15364⤵
- Program crash
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si972783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si972783.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4340 -ip 43401⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4224 -ip 42241⤵PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si972783.exeFilesize
175KB
MD5cdb6a810f86662ee419547e61083cf0b
SHA1cbde6fabd9659881263fb6286ca4a9c76dd66e5d
SHA25682b32f464096b34f47374b935f88264215cedff3ca4207cc4aacf9b7fb6469f3
SHA51286ba160971569d459df6df6007c4f5ef344976b55aeefb043deda091c6f9651f8f15a2f09bed63a4e804836da55dc1807c2d4557d3617c20d9990e5e650d0cbd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si972783.exeFilesize
175KB
MD5cdb6a810f86662ee419547e61083cf0b
SHA1cbde6fabd9659881263fb6286ca4a9c76dd66e5d
SHA25682b32f464096b34f47374b935f88264215cedff3ca4207cc4aacf9b7fb6469f3
SHA51286ba160971569d459df6df6007c4f5ef344976b55aeefb043deda091c6f9651f8f15a2f09bed63a4e804836da55dc1807c2d4557d3617c20d9990e5e650d0cbd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un557072.exeFilesize
555KB
MD508bf74f378f9089bafa65a8c4e537c10
SHA1554c816c8f979cf61e1f70bd40bb443724573061
SHA25603963c80b313211c2c30712d942b200877ad6a2b64cb671b535be2b7e67ed6ee
SHA5123e394ba880527599e95a57181c99c7e1b46f166778f3726f15b6d426abe0b5cbc96969c8f1f9a3235708e5b0ef2a13378a0562cde4a42f7968dfde7fb8fb3025
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un557072.exeFilesize
555KB
MD508bf74f378f9089bafa65a8c4e537c10
SHA1554c816c8f979cf61e1f70bd40bb443724573061
SHA25603963c80b313211c2c30712d942b200877ad6a2b64cb671b535be2b7e67ed6ee
SHA5123e394ba880527599e95a57181c99c7e1b46f166778f3726f15b6d426abe0b5cbc96969c8f1f9a3235708e5b0ef2a13378a0562cde4a42f7968dfde7fb8fb3025
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0538.exeFilesize
347KB
MD5f1c3ae56196f966adbe0dcefcf463173
SHA184f15d18c30b44ae384dbc77d021cbca176c1abf
SHA256be3ddd2013dd7be8183ea5a3d3c663ca1bbef52b018afc6cc6fda33b54481fe2
SHA512cca13a41ea31785ef62e7a575d30f0a35d7656eda7e84f2bbc3b7e74f8eadb987c08096b0f7ddb0ef8f6d651ef8eeb5703552c25adbbc846fcc3b86512c7fbcb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0538.exeFilesize
347KB
MD5f1c3ae56196f966adbe0dcefcf463173
SHA184f15d18c30b44ae384dbc77d021cbca176c1abf
SHA256be3ddd2013dd7be8183ea5a3d3c663ca1bbef52b018afc6cc6fda33b54481fe2
SHA512cca13a41ea31785ef62e7a575d30f0a35d7656eda7e84f2bbc3b7e74f8eadb987c08096b0f7ddb0ef8f6d651ef8eeb5703552c25adbbc846fcc3b86512c7fbcb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6261.exeFilesize
405KB
MD56f6aaacd220c254b6be6a2e74d7e59a0
SHA11972c18dfde6ab4b8136b98e00b1f0927e847227
SHA256cdc1db1655108a6d68bff9ab7e85d327956159b343c29020186f959a4a047bff
SHA5125931d2f5c706acd3193aaa6515b24a50cef04223e16a4cc98a40a0bfb86e747c4ff790afddea8e303f06d043535a886557a8d0098632147ef6a9966a0af04569
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6261.exeFilesize
405KB
MD56f6aaacd220c254b6be6a2e74d7e59a0
SHA11972c18dfde6ab4b8136b98e00b1f0927e847227
SHA256cdc1db1655108a6d68bff9ab7e85d327956159b343c29020186f959a4a047bff
SHA5125931d2f5c706acd3193aaa6515b24a50cef04223e16a4cc98a40a0bfb86e747c4ff790afddea8e303f06d043535a886557a8d0098632147ef6a9966a0af04569
-
memory/1424-1124-0x00000000057F0000-0x0000000005800000-memory.dmpFilesize
64KB
-
memory/1424-1123-0x00000000057F0000-0x0000000005800000-memory.dmpFilesize
64KB
-
memory/1424-1122-0x0000000000EC0000-0x0000000000EF2000-memory.dmpFilesize
200KB
-
memory/4224-1102-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/4224-1105-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/4224-1116-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-1115-0x00000000096A0000-0x00000000096F0000-memory.dmpFilesize
320KB
-
memory/4224-1114-0x0000000009620000-0x0000000009696000-memory.dmpFilesize
472KB
-
memory/4224-1113-0x0000000008D60000-0x000000000928C000-memory.dmpFilesize
5.2MB
-
memory/4224-1112-0x0000000008B90000-0x0000000008D52000-memory.dmpFilesize
1.8MB
-
memory/4224-1111-0x0000000008470000-0x00000000084D6000-memory.dmpFilesize
408KB
-
memory/4224-1110-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-1109-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-1108-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-1107-0x00000000083D0000-0x0000000008462000-memory.dmpFilesize
584KB
-
memory/4224-1104-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-1103-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/4224-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/4224-228-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-226-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-224-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-222-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-220-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-191-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-192-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-193-0x0000000002BA0000-0x0000000002BEB000-memory.dmpFilesize
300KB
-
memory/4224-195-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-196-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-199-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-202-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-200-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-204-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-198-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4224-206-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-208-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-210-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-212-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-214-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-216-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4224-218-0x0000000007700000-0x000000000773F000-memory.dmpFilesize
252KB
-
memory/4340-174-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-183-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-157-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-184-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-172-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-182-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-155-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-169-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-180-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-161-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-178-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-176-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4340-159-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/4340-170-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-168-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-165-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-166-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/4340-163-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-153-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-151-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-150-0x0000000004A00000-0x0000000004A12000-memory.dmpFilesize
72KB
-
memory/4340-149-0x00000000071F0000-0x0000000007794000-memory.dmpFilesize
5.6MB
-
memory/4340-148-0x0000000002C60000-0x0000000002C8D000-memory.dmpFilesize
180KB