Analysis
-
max time kernel
67s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:21
Static task
static1
Behavioral task
behavioral1
Sample
9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe
Resource
win10v2004-20230220-en
General
-
Target
9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe
-
Size
673KB
-
MD5
4df967f85cd9abdccad68c898177caf4
-
SHA1
3f75428fb0d79b38bd2d9011645ecc68333803b8
-
SHA256
9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f
-
SHA512
bf2eb2612c200517cbad624b7c3c3f3cc9f6d5fe56229aaa2257c51a79c7fcafa8dbdd3770fd93a3a47fb6e93e7b4bcac0f2d3c726f6a0a7b0b98684f73c8891
-
SSDEEP
12288:hMray903tEu7NPe8eyiFKo8tu+ZmCII0m/t278pYmom/V+YtZV6ppML0LEdr:HyC+UNm8j3LtjMst278+moJcqXa0G
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0942.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0942.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0942.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1324-191-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-192-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-194-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-196-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-198-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-200-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-202-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-207-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-210-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-212-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-214-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-216-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-218-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-220-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-222-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-224-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-226-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-228-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/1324-1108-0x00000000024B0000-0x00000000024C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un155596.exepro0942.exequ4810.exesi774394.exepid process 2684 un155596.exe 2356 pro0942.exe 1324 qu4810.exe 640 si774394.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0942.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0942.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exeun155596.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un155596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un155596.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 552 2356 WerFault.exe pro0942.exe 1292 1324 WerFault.exe qu4810.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0942.exequ4810.exesi774394.exepid process 2356 pro0942.exe 2356 pro0942.exe 1324 qu4810.exe 1324 qu4810.exe 640 si774394.exe 640 si774394.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0942.exequ4810.exesi774394.exedescription pid process Token: SeDebugPrivilege 2356 pro0942.exe Token: SeDebugPrivilege 1324 qu4810.exe Token: SeDebugPrivilege 640 si774394.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exeun155596.exedescription pid process target process PID 4732 wrote to memory of 2684 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe un155596.exe PID 4732 wrote to memory of 2684 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe un155596.exe PID 4732 wrote to memory of 2684 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe un155596.exe PID 2684 wrote to memory of 2356 2684 un155596.exe pro0942.exe PID 2684 wrote to memory of 2356 2684 un155596.exe pro0942.exe PID 2684 wrote to memory of 2356 2684 un155596.exe pro0942.exe PID 2684 wrote to memory of 1324 2684 un155596.exe qu4810.exe PID 2684 wrote to memory of 1324 2684 un155596.exe qu4810.exe PID 2684 wrote to memory of 1324 2684 un155596.exe qu4810.exe PID 4732 wrote to memory of 640 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe si774394.exe PID 4732 wrote to memory of 640 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe si774394.exe PID 4732 wrote to memory of 640 4732 9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe si774394.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe"C:\Users\Admin\AppData\Local\Temp\9c79ba54af0039ecc57d1a50830d36742ddf582510332209ad8068d0187d742f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155596.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0942.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 10644⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4810.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 13244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774394.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774394.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2356 -ip 23561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1324 -ip 13241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774394.exeFilesize
175KB
MD52f95f1c0d3405f1c16f024f7386cb6d7
SHA1e48355844a91c5d1f9092672b9a77c07d2b94b6d
SHA256a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf
SHA51274800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774394.exeFilesize
175KB
MD52f95f1c0d3405f1c16f024f7386cb6d7
SHA1e48355844a91c5d1f9092672b9a77c07d2b94b6d
SHA256a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf
SHA51274800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155596.exeFilesize
531KB
MD5f38d157354360c574529c67b9b93cfe2
SHA110454a7337b6921c0bbca96139d0ee745af92cdb
SHA25665f8136fa4d5eba673f583276c769982f390991a6fd4ade637da194bbff9a278
SHA512a0e58b70cb2263e76afc598503d9bbcf76336e5cc719e3f2b9d81a313d622d1db71067dca4d16427929079091b7347e91f427311a001dc6bc0e66afd51049e43
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155596.exeFilesize
531KB
MD5f38d157354360c574529c67b9b93cfe2
SHA110454a7337b6921c0bbca96139d0ee745af92cdb
SHA25665f8136fa4d5eba673f583276c769982f390991a6fd4ade637da194bbff9a278
SHA512a0e58b70cb2263e76afc598503d9bbcf76336e5cc719e3f2b9d81a313d622d1db71067dca4d16427929079091b7347e91f427311a001dc6bc0e66afd51049e43
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0942.exeFilesize
259KB
MD586d6f112237246c90545da8e9c0b8f6b
SHA15de70679bab4d169072901de3e3b6c0609a83d95
SHA2560d832d6d52fd6349c9e5d4da3a055fd42d5bf5047e9c82011934701b52bec249
SHA5128462c5ffebd18250f9d642f057061fac9e9a23e4ed090b84b012a31fd12ae2c8c8f3166405f1f18537315471af6e89b3a2d147a3d90ea65997d7d409bdc4de2c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0942.exeFilesize
259KB
MD586d6f112237246c90545da8e9c0b8f6b
SHA15de70679bab4d169072901de3e3b6c0609a83d95
SHA2560d832d6d52fd6349c9e5d4da3a055fd42d5bf5047e9c82011934701b52bec249
SHA5128462c5ffebd18250f9d642f057061fac9e9a23e4ed090b84b012a31fd12ae2c8c8f3166405f1f18537315471af6e89b3a2d147a3d90ea65997d7d409bdc4de2c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4810.exeFilesize
318KB
MD5c696bbc0b440ffd2216db0d91d8b608a
SHA13c46ca6407a7b3b07a43b383c2c3e411efe47ecb
SHA25631fa0bde94f2cb1dc3a64b1d38f83ee9ca45f04c28f8ed5d8200cdb2d359e927
SHA512b74ba3fbdde47f9b6a8a4486d37d26b372af249b2f97ac433a0177d629d6f016ff886862c0da19f847cf979a402e2de585f1b7f98b102cc0508e7a01510cad8b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4810.exeFilesize
318KB
MD5c696bbc0b440ffd2216db0d91d8b608a
SHA13c46ca6407a7b3b07a43b383c2c3e411efe47ecb
SHA25631fa0bde94f2cb1dc3a64b1d38f83ee9ca45f04c28f8ed5d8200cdb2d359e927
SHA512b74ba3fbdde47f9b6a8a4486d37d26b372af249b2f97ac433a0177d629d6f016ff886862c0da19f847cf979a402e2de585f1b7f98b102cc0508e7a01510cad8b
-
memory/640-1123-0x00000000054A0000-0x00000000054B0000-memory.dmpFilesize
64KB
-
memory/640-1122-0x0000000000840000-0x0000000000872000-memory.dmpFilesize
200KB
-
memory/1324-1102-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/1324-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/1324-1116-0x0000000008160000-0x00000000081B0000-memory.dmpFilesize
320KB
-
memory/1324-1115-0x00000000080E0000-0x0000000008156000-memory.dmpFilesize
472KB
-
memory/1324-1114-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-1113-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/1324-1112-0x00000000065B0000-0x0000000006772000-memory.dmpFilesize
1.8MB
-
memory/1324-1111-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/1324-1110-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/1324-1109-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-1108-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-1107-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-1105-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/1324-1101-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/1324-228-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-226-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-224-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-222-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-220-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-218-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-191-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-192-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-194-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-196-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-198-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-200-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-203-0x0000000002120000-0x000000000216B000-memory.dmpFilesize
300KB
-
memory/1324-205-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-202-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-206-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-207-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-209-0x00000000024B0000-0x00000000024C0000-memory.dmpFilesize
64KB
-
memory/1324-210-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-212-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-214-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/1324-216-0x0000000002650000-0x000000000268F000-memory.dmpFilesize
252KB
-
memory/2356-172-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-183-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-153-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-184-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-174-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-182-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2356-170-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-180-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-156-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-176-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-178-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2356-154-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-151-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-168-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-164-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-166-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-162-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-160-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-158-0x0000000002710000-0x0000000002722000-memory.dmpFilesize
72KB
-
memory/2356-152-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-150-0x0000000002790000-0x00000000027A0000-memory.dmpFilesize
64KB
-
memory/2356-149-0x0000000004BF0000-0x0000000005194000-memory.dmpFilesize
5.6MB
-
memory/2356-148-0x00000000005A0000-0x00000000005CD000-memory.dmpFilesize
180KB