Analysis
-
max time kernel
83s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:09
Static task
static1
Behavioral task
behavioral1
Sample
0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe
Resource
win10v2004-20230220-en
General
-
Target
0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe
-
Size
672KB
-
MD5
37717796d4fb1d688e53214bd97f42eb
-
SHA1
65bd3bf573f10ae74f761fe166a0cee99a452cf2
-
SHA256
0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526
-
SHA512
6c394f4b9f4b39b0976e1fd18ec067e9cbc6f56d994fcaef453632a9248f01dabbc63fbd9617dfb36c3ecaa49788ffa5e2a18274d611dffb1c2bc08cffc46752
-
SSDEEP
12288:EMrWy90DHX27bmQ4RNk8WUAuyBDeumNVV8iRAZqMomZs+YaUQTpY4NBqu7S6jQ1:iy8HmnmrRNfTAuluSVVeQMo0jdXbE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1744.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1744.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4556-191-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-192-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-194-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-196-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-203-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-199-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-206-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-208-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-210-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-212-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-214-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-216-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-218-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-220-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-222-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-224-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-226-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-228-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4556-1111-0x00000000024C0000-0x00000000024D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un638613.exepro1744.exequ8736.exesi688410.exepid process 4884 un638613.exe 3736 pro1744.exe 4556 qu8736.exe 1060 si688410.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1744.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1744.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exeun638613.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un638613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un638613.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3844 3736 WerFault.exe pro1744.exe 60 4556 WerFault.exe qu8736.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1744.exequ8736.exesi688410.exepid process 3736 pro1744.exe 3736 pro1744.exe 4556 qu8736.exe 4556 qu8736.exe 1060 si688410.exe 1060 si688410.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1744.exequ8736.exesi688410.exedescription pid process Token: SeDebugPrivilege 3736 pro1744.exe Token: SeDebugPrivilege 4556 qu8736.exe Token: SeDebugPrivilege 1060 si688410.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exeun638613.exedescription pid process target process PID 1600 wrote to memory of 4884 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe un638613.exe PID 1600 wrote to memory of 4884 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe un638613.exe PID 1600 wrote to memory of 4884 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe un638613.exe PID 4884 wrote to memory of 3736 4884 un638613.exe pro1744.exe PID 4884 wrote to memory of 3736 4884 un638613.exe pro1744.exe PID 4884 wrote to memory of 3736 4884 un638613.exe pro1744.exe PID 4884 wrote to memory of 4556 4884 un638613.exe qu8736.exe PID 4884 wrote to memory of 4556 4884 un638613.exe qu8736.exe PID 4884 wrote to memory of 4556 4884 un638613.exe qu8736.exe PID 1600 wrote to memory of 1060 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe si688410.exe PID 1600 wrote to memory of 1060 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe si688410.exe PID 1600 wrote to memory of 1060 1600 0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe si688410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe"C:\Users\Admin\AppData\Local\Temp\0966fbfcf3b6a320baff30f59f846c4668a956dbbc18e608314d521c564e2526.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638613.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1744.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8736.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8736.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 11764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688410.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3736 -ip 37361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4556 -ip 45561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688410.exeFilesize
175KB
MD570b7b0f46a0b4be17513b402c2f0695e
SHA1866b69f5e7f5b2a4d3d24688e21858e6368f2457
SHA256294d4b25761a395f13b964ce50633f9e5198d4df5436f041a803fcf4bdab4e3e
SHA512bf7ed473dfbd73be4ef7d4da379f06709c2824d9db8b7a4024581b260fd6a73f745ea809a6c6f8765928b790d03c2b42948c477f2aeb7def04eeee0408458c89
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688410.exeFilesize
175KB
MD570b7b0f46a0b4be17513b402c2f0695e
SHA1866b69f5e7f5b2a4d3d24688e21858e6368f2457
SHA256294d4b25761a395f13b964ce50633f9e5198d4df5436f041a803fcf4bdab4e3e
SHA512bf7ed473dfbd73be4ef7d4da379f06709c2824d9db8b7a4024581b260fd6a73f745ea809a6c6f8765928b790d03c2b42948c477f2aeb7def04eeee0408458c89
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638613.exeFilesize
530KB
MD5adb853c081c9b0fb5d9e0fd11ed30a4b
SHA114aa84ef284bca2ce64be0b8a40d39d9a177fb68
SHA256ae6feccb30e7b2667254a91895bb7cefe2fb17a5c972f634f0349ec548220a28
SHA512aed599fbb5280f59a4daeff0ad40529c377d78ef6ef416d31328cd1137c8b5063defaff8bab388cd0c3d66fa53c9cc096b787376f055c41ef73902388277ae95
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638613.exeFilesize
530KB
MD5adb853c081c9b0fb5d9e0fd11ed30a4b
SHA114aa84ef284bca2ce64be0b8a40d39d9a177fb68
SHA256ae6feccb30e7b2667254a91895bb7cefe2fb17a5c972f634f0349ec548220a28
SHA512aed599fbb5280f59a4daeff0ad40529c377d78ef6ef416d31328cd1137c8b5063defaff8bab388cd0c3d66fa53c9cc096b787376f055c41ef73902388277ae95
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1744.exeFilesize
259KB
MD58772b700b0e52f11e9a7e0d274e4de7e
SHA12e453d51739ffd83ef2f9eb9a6131a4c0983f9da
SHA256fba5bba413f33e599b865a8233c3d0b70a718202e4c3e2e055a73b7af247d62b
SHA51273833318ae778b8e4f439b4a840d60d02f6cd9c470f4b97db6ec9ddbf4356ad7f4d2cdd1f9cacf1f34f5cb94042f92624583bc49dff5eb48b645a4a4fb82a545
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1744.exeFilesize
259KB
MD58772b700b0e52f11e9a7e0d274e4de7e
SHA12e453d51739ffd83ef2f9eb9a6131a4c0983f9da
SHA256fba5bba413f33e599b865a8233c3d0b70a718202e4c3e2e055a73b7af247d62b
SHA51273833318ae778b8e4f439b4a840d60d02f6cd9c470f4b97db6ec9ddbf4356ad7f4d2cdd1f9cacf1f34f5cb94042f92624583bc49dff5eb48b645a4a4fb82a545
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8736.exeFilesize
318KB
MD547ed1dd0e6ae4fa08f270033cd55fc44
SHA1b35ce78bb8bc33912a80be838e41712f170a16be
SHA2563820b70ba12278c4e69fbe1eb3693aff4824380f0d68c4806d6afdf6557bb00c
SHA51244f94101d16f21f797228b0dd4abbd5a70f0ebd366ac28ed682077b77040376b04563e511bf85644422dc9cbee9b83cabfa4f25011036e85b1005cc1114fcf31
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8736.exeFilesize
318KB
MD547ed1dd0e6ae4fa08f270033cd55fc44
SHA1b35ce78bb8bc33912a80be838e41712f170a16be
SHA2563820b70ba12278c4e69fbe1eb3693aff4824380f0d68c4806d6afdf6557bb00c
SHA51244f94101d16f21f797228b0dd4abbd5a70f0ebd366ac28ed682077b77040376b04563e511bf85644422dc9cbee9b83cabfa4f25011036e85b1005cc1114fcf31
-
memory/1060-1122-0x0000000000730000-0x0000000000762000-memory.dmpFilesize
200KB
-
memory/1060-1123-0x00000000052B0000-0x00000000052C0000-memory.dmpFilesize
64KB
-
memory/3736-159-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-173-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-151-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-153-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-155-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-157-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-149-0x0000000004BE0000-0x0000000005184000-memory.dmpFilesize
5.6MB
-
memory/3736-161-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-163-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-165-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-167-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-169-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-171-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-150-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-175-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-177-0x00000000024E0000-0x00000000024F2000-memory.dmpFilesize
72KB
-
memory/3736-178-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-179-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-180-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3736-182-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-183-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-185-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3736-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3736-148-0x0000000000500000-0x000000000052D000-memory.dmpFilesize
180KB
-
memory/4556-194-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-226-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-196-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-198-0x0000000002150000-0x000000000219B000-memory.dmpFilesize
300KB
-
memory/4556-200-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-201-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-203-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-204-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-199-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-206-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-208-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-210-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-212-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-214-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-216-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-218-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-220-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-222-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-224-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-192-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-228-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-1101-0x0000000005280000-0x0000000005898000-memory.dmpFilesize
6.1MB
-
memory/4556-1102-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4556-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4556-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4556-1105-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4556-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4556-1109-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-1110-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-1111-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-1112-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/4556-1113-0x0000000006830000-0x00000000068A6000-memory.dmpFilesize
472KB
-
memory/4556-191-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/4556-1114-0x00000000068C0000-0x0000000006910000-memory.dmpFilesize
320KB
-
memory/4556-1115-0x0000000006920000-0x0000000006AE2000-memory.dmpFilesize
1.8MB
-
memory/4556-1116-0x0000000006B00000-0x000000000702C000-memory.dmpFilesize
5.2MB