Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe
Resource
win10v2004-20230220-en
General
-
Target
ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe
-
Size
673KB
-
MD5
09cb90f88872f170f7a02ba9c0994041
-
SHA1
a3a8a15b2c8cdad86372d6c8ed01583e7e056235
-
SHA256
ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592
-
SHA512
bd260d4c3e45513090ed38e3f99c11aff83bcb9afbcb73ae817a8b9f0ec5208fe3021e4da3288895b5bff280632ae650f21375e59ef67fb6425be22b48ef22b5
-
SSDEEP
12288:VMr7y909yG//uppHW89aO1zXLXMWeM1oaNbuObmrJmj5iEWWG:eyv+/uDHV4m3coDNBbSK4RH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2737.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2737.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2737.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2104-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-192-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-194-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-196-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-198-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-200-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-202-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-204-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-206-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-210-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-208-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-212-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-214-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-222-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-224-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-226-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-228-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2104-1114-0x0000000002720000-0x0000000002730000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un034566.exepro2737.exequ7916.exesi392410.exepid process 3212 un034566.exe 1156 pro2737.exe 2104 qu7916.exe 3808 si392410.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2737.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2737.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un034566.exeffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un034566.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un034566.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3928 1156 WerFault.exe pro2737.exe 4928 2104 WerFault.exe qu7916.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2737.exequ7916.exesi392410.exepid process 1156 pro2737.exe 1156 pro2737.exe 2104 qu7916.exe 2104 qu7916.exe 3808 si392410.exe 3808 si392410.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2737.exequ7916.exesi392410.exedescription pid process Token: SeDebugPrivilege 1156 pro2737.exe Token: SeDebugPrivilege 2104 qu7916.exe Token: SeDebugPrivilege 3808 si392410.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exeun034566.exedescription pid process target process PID 5072 wrote to memory of 3212 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe un034566.exe PID 5072 wrote to memory of 3212 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe un034566.exe PID 5072 wrote to memory of 3212 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe un034566.exe PID 3212 wrote to memory of 1156 3212 un034566.exe pro2737.exe PID 3212 wrote to memory of 1156 3212 un034566.exe pro2737.exe PID 3212 wrote to memory of 1156 3212 un034566.exe pro2737.exe PID 3212 wrote to memory of 2104 3212 un034566.exe qu7916.exe PID 3212 wrote to memory of 2104 3212 un034566.exe qu7916.exe PID 3212 wrote to memory of 2104 3212 un034566.exe qu7916.exe PID 5072 wrote to memory of 3808 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe si392410.exe PID 5072 wrote to memory of 3808 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe si392410.exe PID 5072 wrote to memory of 3808 5072 ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe si392410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe"C:\Users\Admin\AppData\Local\Temp\ffa065a8e32dc1413a81d11fc1cb17fd85b03f32a7b9f13527687e9578417592.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un034566.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un034566.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2737.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7916.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7916.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 17084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392410.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1156 -ip 11561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2104 -ip 21041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392410.exeFilesize
175KB
MD538dab7e90a6c00c3526bd093aa5d5356
SHA10b8fe96f75b1a462d69023e268da6ba1553b8001
SHA256f5c3c05e96f248c65daea812701eefbde862c3c81e6287422e0ba0ba3628d47d
SHA5121c868e7a49bd7248d7033a7c0755e9ad5b2152543e2d804fcf16f8fcea52591c8d7f8b319e3de041c03f7ea741eab7f203f89c66644124b7b16d60e8ceb471c0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392410.exeFilesize
175KB
MD538dab7e90a6c00c3526bd093aa5d5356
SHA10b8fe96f75b1a462d69023e268da6ba1553b8001
SHA256f5c3c05e96f248c65daea812701eefbde862c3c81e6287422e0ba0ba3628d47d
SHA5121c868e7a49bd7248d7033a7c0755e9ad5b2152543e2d804fcf16f8fcea52591c8d7f8b319e3de041c03f7ea741eab7f203f89c66644124b7b16d60e8ceb471c0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un034566.exeFilesize
531KB
MD577c72d843d691ef18ce980fb89fcbb89
SHA136a03a4d7f5687014d81909cedbb98fceab2d786
SHA256b2b1382d80303ac51f995ba62706a557f31d089caa749cc419f737c79caa13a0
SHA5129059009fa9892ed49986b0a29fc5be2e2099995d51459f2027bb2947056cdee4a5c2b6fc0b558af261c9641c3442138a9a2a434c56fca4683f25b2529d23883b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un034566.exeFilesize
531KB
MD577c72d843d691ef18ce980fb89fcbb89
SHA136a03a4d7f5687014d81909cedbb98fceab2d786
SHA256b2b1382d80303ac51f995ba62706a557f31d089caa749cc419f737c79caa13a0
SHA5129059009fa9892ed49986b0a29fc5be2e2099995d51459f2027bb2947056cdee4a5c2b6fc0b558af261c9641c3442138a9a2a434c56fca4683f25b2529d23883b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2737.exeFilesize
260KB
MD5e9ef5c43870ffb953ee6b6993d3033c4
SHA1d51a8ea030f16f24314407b0bb2269891bc97157
SHA256e17ca92ff694ad15eb2f4d6b1ed9e72d5b52b9e2a7c47179d1f3853540a7c7f2
SHA51260704b766fa988d51d6178805e040c0ecbbb05a1ba546eea16d76943e89a2b9049c806dc3b05b1c0e9af7055a9f4be8dd05c351809fb904c32b8a28c49961d1c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2737.exeFilesize
260KB
MD5e9ef5c43870ffb953ee6b6993d3033c4
SHA1d51a8ea030f16f24314407b0bb2269891bc97157
SHA256e17ca92ff694ad15eb2f4d6b1ed9e72d5b52b9e2a7c47179d1f3853540a7c7f2
SHA51260704b766fa988d51d6178805e040c0ecbbb05a1ba546eea16d76943e89a2b9049c806dc3b05b1c0e9af7055a9f4be8dd05c351809fb904c32b8a28c49961d1c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7916.exeFilesize
318KB
MD5f7eae29cd8b66ed2b9ccf99a23d47da7
SHA19ab09b3957e2d91ee61fc8675dd3f86d47c34d5d
SHA256546da37ad67d3d535895c8212473f8ff43d3be8b20e74dc5f85df8eba0f1e0f9
SHA512c8f8e3acc15f114794b2bf4219fbe383ad208974202398be75779b0711f072aafa239ea7908c238e001422bae8a681880aca8b743fc10cad6f1862af5e818acd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7916.exeFilesize
318KB
MD5f7eae29cd8b66ed2b9ccf99a23d47da7
SHA19ab09b3957e2d91ee61fc8675dd3f86d47c34d5d
SHA256546da37ad67d3d535895c8212473f8ff43d3be8b20e74dc5f85df8eba0f1e0f9
SHA512c8f8e3acc15f114794b2bf4219fbe383ad208974202398be75779b0711f072aafa239ea7908c238e001422bae8a681880aca8b743fc10cad6f1862af5e818acd
-
memory/1156-148-0x0000000002140000-0x000000000216D000-memory.dmpFilesize
180KB
-
memory/1156-149-0x0000000004B30000-0x00000000050D4000-memory.dmpFilesize
5.6MB
-
memory/1156-150-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-151-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-153-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-155-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-157-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-159-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-161-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-163-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-165-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-167-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-169-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-171-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-173-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-175-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-177-0x00000000023E0000-0x00000000023F2000-memory.dmpFilesize
72KB
-
memory/1156-178-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-179-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-180-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1156-184-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-183-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-185-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/1156-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2104-191-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-192-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-194-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-196-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-198-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-200-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-202-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-204-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-206-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-210-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-208-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-212-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-214-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-217-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-220-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-219-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-222-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-218-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-215-0x0000000002030000-0x000000000207B000-memory.dmpFilesize
300KB
-
memory/2104-224-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-226-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-228-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2104-1101-0x0000000005260000-0x0000000005878000-memory.dmpFilesize
6.1MB
-
memory/2104-1102-0x00000000058C0000-0x00000000059CA000-memory.dmpFilesize
1.0MB
-
memory/2104-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2104-1105-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2104-1104-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2104-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2104-1109-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/2104-1110-0x0000000006620000-0x0000000006670000-memory.dmpFilesize
320KB
-
memory/2104-1111-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/2104-1112-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-1113-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-1114-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/2104-1115-0x0000000006870000-0x0000000006D9C000-memory.dmpFilesize
5.2MB
-
memory/2104-1116-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3808-1122-0x00000000007A0000-0x00000000007D2000-memory.dmpFilesize
200KB
-
memory/3808-1123-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/3808-1124-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB