Analysis
-
max time kernel
87s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:30
Static task
static1
Behavioral task
behavioral1
Sample
e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe
Resource
win10v2004-20230221-en
General
-
Target
e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe
-
Size
673KB
-
MD5
bbbc093bf8908b47d2e158cb79eaf15d
-
SHA1
341fd96608d425fa6d1afb911c41285e46609866
-
SHA256
e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7
-
SHA512
c0a3476f382df33af7d50bd8ed589f27dc266810628b00306160ee7df383597fb769fef984279d887f005d7148e4fe48f066b27bf3ede11d80055884774b9430
-
SSDEEP
12288:bMrjy90zykiMIMoTtMOltlZW9RZbJ+ol4X0tn9woObHrpmVYLBzrcy:4y8kxMUtMOTObEky4kbd0eVrZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7866.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7866.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7866.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/5108-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-190-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-223-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/5108-1109-0x0000000004AF0000-0x0000000004B00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un684802.exepro7866.exequ8011.exesi289190.exepid process 640 un684802.exe 1320 pro7866.exe 5108 qu8011.exe 3952 si289190.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7866.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7866.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un684802.exee74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un684802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un684802.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2808 1320 WerFault.exe pro7866.exe 3608 5108 WerFault.exe qu8011.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7866.exequ8011.exesi289190.exepid process 1320 pro7866.exe 1320 pro7866.exe 5108 qu8011.exe 5108 qu8011.exe 3952 si289190.exe 3952 si289190.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7866.exequ8011.exesi289190.exedescription pid process Token: SeDebugPrivilege 1320 pro7866.exe Token: SeDebugPrivilege 5108 qu8011.exe Token: SeDebugPrivilege 3952 si289190.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exeun684802.exedescription pid process target process PID 1012 wrote to memory of 640 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe un684802.exe PID 1012 wrote to memory of 640 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe un684802.exe PID 1012 wrote to memory of 640 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe un684802.exe PID 640 wrote to memory of 1320 640 un684802.exe pro7866.exe PID 640 wrote to memory of 1320 640 un684802.exe pro7866.exe PID 640 wrote to memory of 1320 640 un684802.exe pro7866.exe PID 640 wrote to memory of 5108 640 un684802.exe qu8011.exe PID 640 wrote to memory of 5108 640 un684802.exe qu8011.exe PID 640 wrote to memory of 5108 640 un684802.exe qu8011.exe PID 1012 wrote to memory of 3952 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe si289190.exe PID 1012 wrote to memory of 3952 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe si289190.exe PID 1012 wrote to memory of 3952 1012 e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe si289190.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe"C:\Users\Admin\AppData\Local\Temp\e74325d1105f8e765eeb7684c2f8a10187c5c35a0bb6961a05f16685521620c7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7866.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7866.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 18284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289190.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1320 -ip 13201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5108 -ip 51081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289190.exeFilesize
175KB
MD5c2e768e6f7d2318ada15b54f5ff1deb8
SHA1c5dc8f90a070dc8b2b277dd101c530141e39027f
SHA2568056890ef36b903cb35aab6bc0ac363d8860f72605be10818f8cdc24bcfd7cc8
SHA5122b1072bfdddec81f92e26a0cb2c51835796ba71cc72fdf79555ce9255a86afae46582bfb8589a941db426879711f8a2f3940f9da15bd3a9d1e7f385eb0fab11a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289190.exeFilesize
175KB
MD5c2e768e6f7d2318ada15b54f5ff1deb8
SHA1c5dc8f90a070dc8b2b277dd101c530141e39027f
SHA2568056890ef36b903cb35aab6bc0ac363d8860f72605be10818f8cdc24bcfd7cc8
SHA5122b1072bfdddec81f92e26a0cb2c51835796ba71cc72fdf79555ce9255a86afae46582bfb8589a941db426879711f8a2f3940f9da15bd3a9d1e7f385eb0fab11a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684802.exeFilesize
531KB
MD5baf117dbe16d1be9f0ba5467d51403ee
SHA1bac50657901b7c148d6a4faeb6f5f0c83b8871d5
SHA256757887235007f7cd96b0a45385ce3ee1eb6a616878ef87787017f5c5dc858153
SHA512809d35bd93162b31c96e0d9b768c76b022a473cb8014ec3e5f02a0a079f6e9d60120dddd049a1ac83e24cfdc33ae243e12c4207f9b01c7d07f7126b0ca1d3ad7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684802.exeFilesize
531KB
MD5baf117dbe16d1be9f0ba5467d51403ee
SHA1bac50657901b7c148d6a4faeb6f5f0c83b8871d5
SHA256757887235007f7cd96b0a45385ce3ee1eb6a616878ef87787017f5c5dc858153
SHA512809d35bd93162b31c96e0d9b768c76b022a473cb8014ec3e5f02a0a079f6e9d60120dddd049a1ac83e24cfdc33ae243e12c4207f9b01c7d07f7126b0ca1d3ad7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7866.exeFilesize
260KB
MD521dcce5e6ad3f4f9ec448503e3c78862
SHA111f9a82fc580e345b8201ece76d0ce4ad3b43078
SHA2565c76ef64fe5d2c69642387f7d95dad01abbf29b6c44c27d3f51a58490186ef5e
SHA5125fdc62efa4e274feace4cd7bce38bdf441d5a6aea2e5ebf39b7f69faff0fa1d07554b6d6a7f999f36550a803bfefba0aa42104b575933f47c56df744a0e690f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7866.exeFilesize
260KB
MD521dcce5e6ad3f4f9ec448503e3c78862
SHA111f9a82fc580e345b8201ece76d0ce4ad3b43078
SHA2565c76ef64fe5d2c69642387f7d95dad01abbf29b6c44c27d3f51a58490186ef5e
SHA5125fdc62efa4e274feace4cd7bce38bdf441d5a6aea2e5ebf39b7f69faff0fa1d07554b6d6a7f999f36550a803bfefba0aa42104b575933f47c56df744a0e690f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exeFilesize
318KB
MD59af3cb1ac2091622e2f5335cbc77bf5f
SHA1d15e7c0016e166c31ab27a39b2cdb2798aab38df
SHA256830a3f9476ba007ade0c8e45281de542e9e242c587587a3abead3c132b1c02d7
SHA512e5463b9709e1d85b348820be7339b67d0d4a95f25cf71e3b7f9fd1c301dd6d43d22149567e8bf1e05c74c0e02ad0858af642da909c82236dbbdf4ae63abbfd3c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exeFilesize
318KB
MD59af3cb1ac2091622e2f5335cbc77bf5f
SHA1d15e7c0016e166c31ab27a39b2cdb2798aab38df
SHA256830a3f9476ba007ade0c8e45281de542e9e242c587587a3abead3c132b1c02d7
SHA512e5463b9709e1d85b348820be7339b67d0d4a95f25cf71e3b7f9fd1c301dd6d43d22149567e8bf1e05c74c0e02ad0858af642da909c82236dbbdf4ae63abbfd3c
-
memory/1320-158-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-168-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-151-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/1320-150-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/1320-152-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/1320-153-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-154-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-156-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-148-0x0000000004B50000-0x00000000050F4000-memory.dmpFilesize
5.6MB
-
memory/1320-160-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-162-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-164-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-166-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-149-0x0000000000660000-0x000000000068D000-memory.dmpFilesize
180KB
-
memory/1320-170-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-172-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-174-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-176-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-178-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-180-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1320-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1320-182-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/1320-183-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/1320-185-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3952-1123-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB
-
memory/3952-1122-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB
-
memory/3952-1121-0x0000000000880000-0x00000000008B2000-memory.dmpFilesize
200KB
-
memory/5108-193-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-438-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-199-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-201-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-203-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-205-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-207-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-209-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-211-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-213-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-215-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-217-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-219-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-221-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-223-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-437-0x0000000001FF0000-0x000000000203B000-memory.dmpFilesize
300KB
-
memory/5108-441-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-197-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-1099-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/5108-1100-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/5108-1101-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/5108-1102-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/5108-1103-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-1104-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/5108-1105-0x0000000006270000-0x0000000006302000-memory.dmpFilesize
584KB
-
memory/5108-1106-0x0000000006340000-0x00000000063B6000-memory.dmpFilesize
472KB
-
memory/5108-1107-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/5108-1109-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-1110-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-1111-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-1112-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/5108-195-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-190-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-191-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/5108-1113-0x0000000007800000-0x00000000079C2000-memory.dmpFilesize
1.8MB
-
memory/5108-1114-0x00000000079E0000-0x0000000007F0C000-memory.dmpFilesize
5.2MB