Analysis
-
max time kernel
109s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:05
Static task
static1
Behavioral task
behavioral1
Sample
6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe
Resource
win10v2004-20230221-en
General
-
Target
6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe
-
Size
672KB
-
MD5
4dd38c37aa1c4b159d90d48ea6f46e8f
-
SHA1
22570778107eef0a6bc7bc3f3087041eede6363e
-
SHA256
6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10
-
SHA512
dbe731a5f4b6941ad1eac680cf7e497aca6f6927221eda83afac4fa1860bea2d4171701ceb95ff5c8bbaf5a98bda037cd94c774db306b6be3b738aa7b2ab9334
-
SSDEEP
12288:fMrqy900nwBjaadfUlWD/Domft+YqpPnpPoVvs:xyPnNalOC/DoZ3ZZoVvs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2119.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2119.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4116-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-222-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-224-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4116-226-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un626380.exepro2119.exequ2077.exesi918508.exepid process 2124 un626380.exe 732 pro2119.exe 4116 qu2077.exe 4632 si918508.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2119.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2119.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exeun626380.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un626380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un626380.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4420 732 WerFault.exe pro2119.exe 3740 4116 WerFault.exe qu2077.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2119.exequ2077.exesi918508.exepid process 732 pro2119.exe 732 pro2119.exe 4116 qu2077.exe 4116 qu2077.exe 4632 si918508.exe 4632 si918508.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2119.exequ2077.exesi918508.exedescription pid process Token: SeDebugPrivilege 732 pro2119.exe Token: SeDebugPrivilege 4116 qu2077.exe Token: SeDebugPrivilege 4632 si918508.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exeun626380.exedescription pid process target process PID 4472 wrote to memory of 2124 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe un626380.exe PID 4472 wrote to memory of 2124 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe un626380.exe PID 4472 wrote to memory of 2124 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe un626380.exe PID 2124 wrote to memory of 732 2124 un626380.exe pro2119.exe PID 2124 wrote to memory of 732 2124 un626380.exe pro2119.exe PID 2124 wrote to memory of 732 2124 un626380.exe pro2119.exe PID 2124 wrote to memory of 4116 2124 un626380.exe qu2077.exe PID 2124 wrote to memory of 4116 2124 un626380.exe qu2077.exe PID 2124 wrote to memory of 4116 2124 un626380.exe qu2077.exe PID 4472 wrote to memory of 4632 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe si918508.exe PID 4472 wrote to memory of 4632 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe si918508.exe PID 4472 wrote to memory of 4632 4472 6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe si918508.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe"C:\Users\Admin\AppData\Local\Temp\6a8ae2d55501d3951c7368eba4ab0c0ae78f7bf79d0ff09f2833ad8e45360c10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 10804⤵
- Program crash
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2077.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 18284⤵
- Program crash
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si918508.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si918508.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 732 -ip 7321⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4116 -ip 41161⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si918508.exeFilesize
175KB
MD5c1bce34ac5130a63422be2f27cc4edaf
SHA11b482e0944c72748b1a75251ca4e1334f7373802
SHA256c56b56137fbd5add94208b8fcdf04953fd72af5488c3a69267268a036680487d
SHA51202ba57500cef82d3d6a2f0f0afe6f307f56d949c5fb89a1c525954f915d2de1fe2ef7642eca0dfcc92a438e58f8d8490e085376d7cb6d0be4057611971bb94cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si918508.exeFilesize
175KB
MD5c1bce34ac5130a63422be2f27cc4edaf
SHA11b482e0944c72748b1a75251ca4e1334f7373802
SHA256c56b56137fbd5add94208b8fcdf04953fd72af5488c3a69267268a036680487d
SHA51202ba57500cef82d3d6a2f0f0afe6f307f56d949c5fb89a1c525954f915d2de1fe2ef7642eca0dfcc92a438e58f8d8490e085376d7cb6d0be4057611971bb94cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626380.exeFilesize
530KB
MD57b899c68c371ace531e0b0b2d7467d66
SHA1795de1f6a2ec232053a312222d384796d2e37f44
SHA256fade47c892981b4412ec8fe8d00b3a6c93d067dc55bbba5f460f0deda628d44c
SHA512cd07edf19e6b8a82dd8b2d912821cdcf010326aefbc7cf478d22f205bf88c2a96bcf573475f9b4a83ca4c65aeca0276ae4b30b91e92dc60b5815408224b990b4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626380.exeFilesize
530KB
MD57b899c68c371ace531e0b0b2d7467d66
SHA1795de1f6a2ec232053a312222d384796d2e37f44
SHA256fade47c892981b4412ec8fe8d00b3a6c93d067dc55bbba5f460f0deda628d44c
SHA512cd07edf19e6b8a82dd8b2d912821cdcf010326aefbc7cf478d22f205bf88c2a96bcf573475f9b4a83ca4c65aeca0276ae4b30b91e92dc60b5815408224b990b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2119.exeFilesize
259KB
MD5573fa2b5b10e6cf9d8329b379e36d6fb
SHA1b0914f4e900fc5121292781b1b8aecdef86556fa
SHA2562e363de2dafba6ae7a51580c3d0439a43a02f5c7ed2abff66a08086fc159c0bc
SHA51224e0adf0d5545d7f19281a9a033972c7468fe211398fbd55b3cdca670992faf48a793e1ce58c0ef1e4b16995ba128f68c97cee369fc4f91d28da644fb4d907bc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2119.exeFilesize
259KB
MD5573fa2b5b10e6cf9d8329b379e36d6fb
SHA1b0914f4e900fc5121292781b1b8aecdef86556fa
SHA2562e363de2dafba6ae7a51580c3d0439a43a02f5c7ed2abff66a08086fc159c0bc
SHA51224e0adf0d5545d7f19281a9a033972c7468fe211398fbd55b3cdca670992faf48a793e1ce58c0ef1e4b16995ba128f68c97cee369fc4f91d28da644fb4d907bc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2077.exeFilesize
318KB
MD55113c603a55b539d66359437d6f1e9d9
SHA17a8293d0458eddca11a7a601bba1621511524ec8
SHA25672ff5471eb24ab59cf267fce417721884c1484b07efb2b18d10c35b62955b4a3
SHA51244ca31be5308d4d4b1cbb99dca8eff46c7e2b2b4cb5f024e9cb32df4921d8007d17719bfece17b43bde19ad4e20adf142249cbff75c9435ca9eea6cf8fb838c4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2077.exeFilesize
318KB
MD55113c603a55b539d66359437d6f1e9d9
SHA17a8293d0458eddca11a7a601bba1621511524ec8
SHA25672ff5471eb24ab59cf267fce417721884c1484b07efb2b18d10c35b62955b4a3
SHA51244ca31be5308d4d4b1cbb99dca8eff46c7e2b2b4cb5f024e9cb32df4921d8007d17719bfece17b43bde19ad4e20adf142249cbff75c9435ca9eea6cf8fb838c4
-
memory/732-148-0x0000000000610000-0x000000000063D000-memory.dmpFilesize
180KB
-
memory/732-149-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/732-150-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/732-151-0x0000000004AC0000-0x0000000005064000-memory.dmpFilesize
5.6MB
-
memory/732-152-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-153-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-155-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-157-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-159-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-161-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-163-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-165-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-167-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-169-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-171-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-173-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-175-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-177-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-179-0x00000000025E0000-0x00000000025F2000-memory.dmpFilesize
72KB
-
memory/732-180-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/732-181-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/732-182-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/732-183-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/732-185-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4116-190-0x00000000009E0000-0x0000000000A2B000-memory.dmpFilesize
300KB
-
memory/4116-191-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-194-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-196-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-193-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-192-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-198-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-200-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-202-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-204-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-206-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-208-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-210-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-212-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-214-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-216-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-218-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-220-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-222-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-224-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-226-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4116-1099-0x0000000005180000-0x0000000005798000-memory.dmpFilesize
6.1MB
-
memory/4116-1100-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/4116-1101-0x00000000058B0000-0x00000000058C2000-memory.dmpFilesize
72KB
-
memory/4116-1102-0x00000000058D0000-0x000000000590C000-memory.dmpFilesize
240KB
-
memory/4116-1103-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-1104-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4116-1105-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4116-1107-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-1109-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-1108-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4116-1110-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/4116-1111-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/4116-1112-0x0000000006450000-0x0000000006612000-memory.dmpFilesize
1.8MB
-
memory/4116-1113-0x0000000006620000-0x0000000006B4C000-memory.dmpFilesize
5.2MB
-
memory/4116-1114-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4632-1120-0x0000000000450000-0x0000000000482000-memory.dmpFilesize
200KB
-
memory/4632-1121-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB