Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 17:33
Static task
static1
Behavioral task
behavioral1
Sample
081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe
Resource
win10v2004-20230220-en
General
-
Target
081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe
-
Size
672KB
-
MD5
60543a19e34e7b2ce364f08a7ec315e5
-
SHA1
1e76ec2e4d6bc6f710a1306c532c9f6b99c15d02
-
SHA256
081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab
-
SHA512
a831b6c28e3a3ee874d6977ec31eeaf87989c3215665df606b09041979d1120c51d7053e87f703c337d2aa7ad6d0df5e26416557806a965202b3f441fef786ed
-
SSDEEP
12288:CMrmy90Pq9qnhqCoA19OwiS7/faKoYPQP4mWfKp1somev+Yv7rdpsa8vI:4yujnRoAKwVnqeUpKo+MdSa8A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7588.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7588.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7588.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4236-191-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-192-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-194-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-196-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-198-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-200-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-202-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-204-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-206-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-208-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-210-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-212-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-214-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-216-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-218-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-222-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-220-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4236-224-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un201103.exepro7588.exequ9016.exesi952773.exepid process 1184 un201103.exe 1180 pro7588.exe 4236 qu9016.exe 3908 si952773.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7588.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7588.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exeun201103.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un201103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un201103.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2112 1180 WerFault.exe pro7588.exe 3240 4236 WerFault.exe qu9016.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7588.exequ9016.exesi952773.exepid process 1180 pro7588.exe 1180 pro7588.exe 4236 qu9016.exe 4236 qu9016.exe 3908 si952773.exe 3908 si952773.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7588.exequ9016.exesi952773.exedescription pid process Token: SeDebugPrivilege 1180 pro7588.exe Token: SeDebugPrivilege 4236 qu9016.exe Token: SeDebugPrivilege 3908 si952773.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exeun201103.exedescription pid process target process PID 4280 wrote to memory of 1184 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe un201103.exe PID 4280 wrote to memory of 1184 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe un201103.exe PID 4280 wrote to memory of 1184 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe un201103.exe PID 1184 wrote to memory of 1180 1184 un201103.exe pro7588.exe PID 1184 wrote to memory of 1180 1184 un201103.exe pro7588.exe PID 1184 wrote to memory of 1180 1184 un201103.exe pro7588.exe PID 1184 wrote to memory of 4236 1184 un201103.exe qu9016.exe PID 1184 wrote to memory of 4236 1184 un201103.exe qu9016.exe PID 1184 wrote to memory of 4236 1184 un201103.exe qu9016.exe PID 4280 wrote to memory of 3908 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe si952773.exe PID 4280 wrote to memory of 3908 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe si952773.exe PID 4280 wrote to memory of 3908 4280 081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe si952773.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe"C:\Users\Admin\AppData\Local\Temp\081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 10964⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1180 -ip 11801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4236 -ip 42361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exeFilesize
175KB
MD53cedd6cd61a7aac29bd96962016bd4ac
SHA1e2b4fa280911117529ddb272dfc19d121d21b1a5
SHA2567674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50
SHA512c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exeFilesize
175KB
MD53cedd6cd61a7aac29bd96962016bd4ac
SHA1e2b4fa280911117529ddb272dfc19d121d21b1a5
SHA2567674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50
SHA512c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exeFilesize
530KB
MD5c3f238ba0f4fed6e4771f36bcd540043
SHA1ed4fff7fcd253539c1692da53763abd854e0906d
SHA256aaadca450a95624f3078102300db75509aa239959f9f805c0ea8779a00aec864
SHA5122ab7ea975dca9c0cf2e5ec34f6adddc13b327a6b6044c39971cc8fae35e64fc1e6dbc3c14d92ad740747446779e4fe320857e71aa3b142f36a5e8eee4b41cd64
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exeFilesize
530KB
MD5c3f238ba0f4fed6e4771f36bcd540043
SHA1ed4fff7fcd253539c1692da53763abd854e0906d
SHA256aaadca450a95624f3078102300db75509aa239959f9f805c0ea8779a00aec864
SHA5122ab7ea975dca9c0cf2e5ec34f6adddc13b327a6b6044c39971cc8fae35e64fc1e6dbc3c14d92ad740747446779e4fe320857e71aa3b142f36a5e8eee4b41cd64
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exeFilesize
259KB
MD55b7f1392fedda9267e0fac9379f72cff
SHA12a08564194f90c89f50946bb73f8ed0c87f6f0ce
SHA256658bf5c72161a5169d98e9c3391d23bac3f4f19d1601e092ecd0c014c7167942
SHA512158b3fdc68fa58bb83bb1a78a4ae71c64ba68b95cd350487f85da710b5a58a97ae957ca73899975b740c9231b375938a9509baea96f141a072f4304e286eb866
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exeFilesize
259KB
MD55b7f1392fedda9267e0fac9379f72cff
SHA12a08564194f90c89f50946bb73f8ed0c87f6f0ce
SHA256658bf5c72161a5169d98e9c3391d23bac3f4f19d1601e092ecd0c014c7167942
SHA512158b3fdc68fa58bb83bb1a78a4ae71c64ba68b95cd350487f85da710b5a58a97ae957ca73899975b740c9231b375938a9509baea96f141a072f4304e286eb866
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exeFilesize
318KB
MD56a1d73e3a96d111014d0ebd93ca31f92
SHA147f8942564242ed607101e270c436c5e2460819c
SHA256060bbc4aff477acf12d918843f66e29b8b3f7344156a0386198633b5fbd21082
SHA512426496f1b63a13667c937e328c85907265e2114978ad28a8e7dcba031eb11e94b0a325679ac4a7057c3b65d2d58dea6791e2cede8585c58ed285f7d2c2017543
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exeFilesize
318KB
MD56a1d73e3a96d111014d0ebd93ca31f92
SHA147f8942564242ed607101e270c436c5e2460819c
SHA256060bbc4aff477acf12d918843f66e29b8b3f7344156a0386198633b5fbd21082
SHA512426496f1b63a13667c937e328c85907265e2114978ad28a8e7dcba031eb11e94b0a325679ac4a7057c3b65d2d58dea6791e2cede8585c58ed285f7d2c2017543
-
memory/1180-162-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-168-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-150-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-151-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-152-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-153-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-154-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-156-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-158-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-160-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-148-0x0000000000640000-0x000000000066D000-memory.dmpFilesize
180KB
-
memory/1180-166-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-164-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-149-0x0000000004DB0000-0x0000000005354000-memory.dmpFilesize
5.6MB
-
memory/1180-170-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-172-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-174-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-176-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-178-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-180-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/1180-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1180-182-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-183-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-184-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/1180-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3908-1123-0x0000000000440000-0x0000000000472000-memory.dmpFilesize
200KB
-
memory/3908-1125-0x0000000004D20000-0x0000000004D30000-memory.dmpFilesize
64KB
-
memory/3908-1124-0x0000000004D20000-0x0000000004D30000-memory.dmpFilesize
64KB
-
memory/4236-194-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-196-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-198-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-200-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-202-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-204-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-206-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-208-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-210-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-212-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-214-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-216-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-218-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-222-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-220-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-224-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-441-0x0000000001FE0000-0x000000000202B000-memory.dmpFilesize
300KB
-
memory/4236-442-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-444-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1100-0x0000000005230000-0x0000000005848000-memory.dmpFilesize
6.1MB
-
memory/4236-1101-0x0000000005850000-0x000000000595A000-memory.dmpFilesize
1.0MB
-
memory/4236-1102-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4236-1103-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1104-0x0000000004BD0000-0x0000000004C0C000-memory.dmpFilesize
240KB
-
memory/4236-1105-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4236-1106-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4236-1108-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1109-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1110-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1111-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/4236-1113-0x00000000066D0000-0x0000000006746000-memory.dmpFilesize
472KB
-
memory/4236-192-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-191-0x0000000002570000-0x00000000025AF000-memory.dmpFilesize
252KB
-
memory/4236-1114-0x0000000006760000-0x00000000067B0000-memory.dmpFilesize
320KB
-
memory/4236-1116-0x0000000007AA0000-0x0000000007C62000-memory.dmpFilesize
1.8MB
-
memory/4236-1117-0x0000000007C70000-0x000000000819C000-memory.dmpFilesize
5.2MB