Analysis
-
max time kernel
77s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe
Resource
win10v2004-20230220-en
General
-
Target
d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe
-
Size
674KB
-
MD5
ac8938770b8acd1a61f7c40c6d5bdf46
-
SHA1
7be9e516ed176387aa0e3b301b0506f6ec969189
-
SHA256
d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955
-
SHA512
212b41227ecafc0b5ef023bec9afa8d9202d48d266ac6ef5a7f780057406926a92d41fc110818f581a61b487afbe48292d67531039dae5b1b63a9ccf77ee3027
-
SSDEEP
12288:3Mrzy90p+UyjxpSma2RHV1N9m5EHlCgFG/pedaObirQmLAIFaGlUJqn:0ykVeJa011N9AEHYgFpfbTmAIm2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro8793.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8793.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/100-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-226-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-228-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/100-1113-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un907825.exepro8793.exequ5146.exesi039919.exepid process 4268 un907825.exe 4164 pro8793.exe 100 qu5146.exe 4840 si039919.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8793.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8793.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exeun907825.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un907825.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un907825.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 376 4164 WerFault.exe pro8793.exe 4876 100 WerFault.exe qu5146.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8793.exequ5146.exesi039919.exepid process 4164 pro8793.exe 4164 pro8793.exe 100 qu5146.exe 100 qu5146.exe 4840 si039919.exe 4840 si039919.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8793.exequ5146.exesi039919.exedescription pid process Token: SeDebugPrivilege 4164 pro8793.exe Token: SeDebugPrivilege 100 qu5146.exe Token: SeDebugPrivilege 4840 si039919.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exeun907825.exedescription pid process target process PID 4432 wrote to memory of 4268 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe un907825.exe PID 4432 wrote to memory of 4268 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe un907825.exe PID 4432 wrote to memory of 4268 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe un907825.exe PID 4268 wrote to memory of 4164 4268 un907825.exe pro8793.exe PID 4268 wrote to memory of 4164 4268 un907825.exe pro8793.exe PID 4268 wrote to memory of 4164 4268 un907825.exe pro8793.exe PID 4268 wrote to memory of 100 4268 un907825.exe qu5146.exe PID 4268 wrote to memory of 100 4268 un907825.exe qu5146.exe PID 4268 wrote to memory of 100 4268 un907825.exe qu5146.exe PID 4432 wrote to memory of 4840 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe si039919.exe PID 4432 wrote to memory of 4840 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe si039919.exe PID 4432 wrote to memory of 4840 4432 d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe si039919.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe"C:\Users\Admin\AppData\Local\Temp\d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 15404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 100 -ip 1001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exeFilesize
175KB
MD555d3c8d73eb0b22fafde5ddba108e56c
SHA187e45459aa6cad9824b4cd0c07ba2743d22ff6a0
SHA2567c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7
SHA512e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exeFilesize
175KB
MD555d3c8d73eb0b22fafde5ddba108e56c
SHA187e45459aa6cad9824b4cd0c07ba2743d22ff6a0
SHA2567c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7
SHA512e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exeFilesize
531KB
MD5fe5f856f624569e84176b595545b64f9
SHA1ce1d2abfe95f9ecf8ee79fad9a0f22737fcc84e9
SHA256a447e8857563a900e806a2aad65d1ca22b82a2e88bd71497e3e25f68b4ee0fb0
SHA5121e667cf770bdce5df59a06ec67b8f785a275cbfd4c84b493ac775006e423a309e3acb3b2f616344501be206f6c52ec0fd8ba8c0ee614dfbca8c3709176802681
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exeFilesize
531KB
MD5fe5f856f624569e84176b595545b64f9
SHA1ce1d2abfe95f9ecf8ee79fad9a0f22737fcc84e9
SHA256a447e8857563a900e806a2aad65d1ca22b82a2e88bd71497e3e25f68b4ee0fb0
SHA5121e667cf770bdce5df59a06ec67b8f785a275cbfd4c84b493ac775006e423a309e3acb3b2f616344501be206f6c52ec0fd8ba8c0ee614dfbca8c3709176802681
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exeFilesize
260KB
MD59c847bdfcedf23deff7887a8ebc37a60
SHA1ffd6244fbfbb385cb9687ef0b3c2c46c3000681f
SHA2569fa800319c99934ac7b625d861415723506bf8d301469621fb0c247b6dde0aab
SHA5127123f011d9c0dca09d41d1742f00526a8e5d1223f20f7fd53ef2d68475f6f1187f41cf6513d8fd6d23f5aec3236570e42f71ef613c74a573311407307908a0c8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exeFilesize
260KB
MD59c847bdfcedf23deff7887a8ebc37a60
SHA1ffd6244fbfbb385cb9687ef0b3c2c46c3000681f
SHA2569fa800319c99934ac7b625d861415723506bf8d301469621fb0c247b6dde0aab
SHA5127123f011d9c0dca09d41d1742f00526a8e5d1223f20f7fd53ef2d68475f6f1187f41cf6513d8fd6d23f5aec3236570e42f71ef613c74a573311407307908a0c8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exeFilesize
318KB
MD54a91ab80821fa2c9801dc6e6aa8dbf36
SHA1fe342a3c861c81ecb953b640229431a32bf8e33c
SHA2568924155a66771ef4f7c57478262d4e0d3f22117319b88e08d0b272671cfba7f6
SHA512349665143d33f1299e984a76fc633861967af840d03d3537b4451e40f1f8320d2b6b396e931773e8edf719e9c7add035531c37b9320e0fa145c206992fe0a091
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exeFilesize
318KB
MD54a91ab80821fa2c9801dc6e6aa8dbf36
SHA1fe342a3c861c81ecb953b640229431a32bf8e33c
SHA2568924155a66771ef4f7c57478262d4e0d3f22117319b88e08d0b272671cfba7f6
SHA512349665143d33f1299e984a76fc633861967af840d03d3537b4451e40f1f8320d2b6b396e931773e8edf719e9c7add035531c37b9320e0fa145c206992fe0a091
-
memory/100-1102-0x00000000058D0000-0x00000000059DA000-memory.dmpFilesize
1.0MB
-
memory/100-226-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-203-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-1115-0x0000000006E00000-0x0000000006E76000-memory.dmpFilesize
472KB
-
memory/100-1114-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-1113-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-1112-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-1111-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-1110-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/100-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-1109-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/100-1108-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/100-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/100-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/100-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/100-1101-0x00000000052B0000-0x00000000058C8000-memory.dmpFilesize
6.1MB
-
memory/100-228-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-198-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/100-199-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-201-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/100-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-1116-0x0000000006E80000-0x0000000006ED0000-memory.dmpFilesize
320KB
-
memory/100-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/100-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4164-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4164-174-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-148-0x0000000004A70000-0x0000000005014000-memory.dmpFilesize
5.6MB
-
memory/4164-152-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-154-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4164-185-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-184-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-183-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-150-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-156-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-180-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-179-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-178-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/4164-177-0x0000000000620000-0x000000000064D000-memory.dmpFilesize
180KB
-
memory/4164-176-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-172-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-170-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-168-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-164-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-166-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-162-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-160-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-149-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4164-158-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/4840-1122-0x0000000000D90000-0x0000000000DC2000-memory.dmpFilesize
200KB
-
memory/4840-1123-0x0000000005670000-0x0000000005680000-memory.dmpFilesize
64KB