Analysis
-
max time kernel
128s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:34
Static task
static1
Behavioral task
behavioral1
Sample
453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe
Resource
win10v2004-20230221-en
General
-
Target
453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe
-
Size
674KB
-
MD5
31dc4b6273d424bed94ce1bad01e24bb
-
SHA1
96c5026e71d53f1357edcedf732320c19e82480b
-
SHA256
453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f
-
SHA512
51c85fd83b6b6cec5cc82a801f056807d3516080b2fd8b70588085fc07beccd05501d867c3cb56418c1ed42f7bb5992b0588c1f5e4c2e332c85b22649daf421d
-
SSDEEP
12288:yMr4y90Tz9wfurRGe/vqcw480wopnr13FcXIObHrrmJogjD:Oycz8urg1ynRtFcfbXUog3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3581.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3581.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4508-191-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-192-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-194-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-196-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-198-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-200-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-202-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-204-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-206-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-209-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-216-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-213-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-218-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-220-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-222-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-224-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-226-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4508-228-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un065250.exepro3581.exequ6421.exesi901908.exepid process 1996 un065250.exe 1760 pro3581.exe 4508 qu6421.exe 3892 si901908.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3581.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3581.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exeun065250.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un065250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un065250.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4120 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4756 1760 WerFault.exe pro3581.exe 3472 4508 WerFault.exe qu6421.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3581.exequ6421.exesi901908.exepid process 1760 pro3581.exe 1760 pro3581.exe 4508 qu6421.exe 4508 qu6421.exe 3892 si901908.exe 3892 si901908.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3581.exequ6421.exesi901908.exedescription pid process Token: SeDebugPrivilege 1760 pro3581.exe Token: SeDebugPrivilege 4508 qu6421.exe Token: SeDebugPrivilege 3892 si901908.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exeun065250.exedescription pid process target process PID 4352 wrote to memory of 1996 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe un065250.exe PID 4352 wrote to memory of 1996 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe un065250.exe PID 4352 wrote to memory of 1996 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe un065250.exe PID 1996 wrote to memory of 1760 1996 un065250.exe pro3581.exe PID 1996 wrote to memory of 1760 1996 un065250.exe pro3581.exe PID 1996 wrote to memory of 1760 1996 un065250.exe pro3581.exe PID 1996 wrote to memory of 4508 1996 un065250.exe qu6421.exe PID 1996 wrote to memory of 4508 1996 un065250.exe qu6421.exe PID 1996 wrote to memory of 4508 1996 un065250.exe qu6421.exe PID 4352 wrote to memory of 3892 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe si901908.exe PID 4352 wrote to memory of 3892 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe si901908.exe PID 4352 wrote to memory of 3892 4352 453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe si901908.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe"C:\Users\Admin\AppData\Local\Temp\453cdf144b035b743ea3a07241292c64fe0c86fed0cabb5d3dedd60ed878c46f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065250.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065250.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3581.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3581.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6421.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 15404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si901908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si901908.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1760 -ip 17601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4508 -ip 45081⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si901908.exeFilesize
175KB
MD582b39cf82197f48472369bbd53b49e1b
SHA16dea5b217765ab1486a2e53511be324adee1b19c
SHA256efafa48b8f3ed96089cff5c4e42b5d82bd9c1012cccbebdc175ed4ec4908b171
SHA512985269eda83f987e5dca8b280a5a639d59cf12e9ac1cf02fe1fee88bbf227d827bc82cb2e2193f2f84f745f2597423c6cf00fc922e25d0908f74e457ec13911f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si901908.exeFilesize
175KB
MD582b39cf82197f48472369bbd53b49e1b
SHA16dea5b217765ab1486a2e53511be324adee1b19c
SHA256efafa48b8f3ed96089cff5c4e42b5d82bd9c1012cccbebdc175ed4ec4908b171
SHA512985269eda83f987e5dca8b280a5a639d59cf12e9ac1cf02fe1fee88bbf227d827bc82cb2e2193f2f84f745f2597423c6cf00fc922e25d0908f74e457ec13911f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065250.exeFilesize
531KB
MD56cb45ae1cbe09c347d6525110e2d5c5a
SHA14c6e91b1adf05d53ea975c0d1db4760c13c5be7d
SHA2560a1ae8f0291b612b6e92cdf2c732ab2f8f0dc03b6ae6743b7575a962c9f03e1f
SHA512f913f0910eed7699b403f034a72edf5a7c857dcb5cd2f0ea0b31f89e369bc734e4048942d04c85428a62f1fa6516c548cb965d3f7c29462a8ef0b84872baf58f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065250.exeFilesize
531KB
MD56cb45ae1cbe09c347d6525110e2d5c5a
SHA14c6e91b1adf05d53ea975c0d1db4760c13c5be7d
SHA2560a1ae8f0291b612b6e92cdf2c732ab2f8f0dc03b6ae6743b7575a962c9f03e1f
SHA512f913f0910eed7699b403f034a72edf5a7c857dcb5cd2f0ea0b31f89e369bc734e4048942d04c85428a62f1fa6516c548cb965d3f7c29462a8ef0b84872baf58f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3581.exeFilesize
260KB
MD5d4d56c87143e4b9ce7854b8c6d5774bc
SHA1cbbd3d3bf550e43b15ea604b5f00a870c02081c3
SHA2562cdd8392879b43f60ce2754e538416f596753c0beceb2788c508e251329ad3cf
SHA512e72013a4a6248a5b1aa3b098bac4f619203c01534803f5680360e1b906cdee84c753275a19a74b9fe93e155dc30f1baee8c68bdd1942b36815308ea16e141626
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3581.exeFilesize
260KB
MD5d4d56c87143e4b9ce7854b8c6d5774bc
SHA1cbbd3d3bf550e43b15ea604b5f00a870c02081c3
SHA2562cdd8392879b43f60ce2754e538416f596753c0beceb2788c508e251329ad3cf
SHA512e72013a4a6248a5b1aa3b098bac4f619203c01534803f5680360e1b906cdee84c753275a19a74b9fe93e155dc30f1baee8c68bdd1942b36815308ea16e141626
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6421.exeFilesize
318KB
MD5d3a761dcb30ec99facb10027dcb37abc
SHA1af597e14957d82e1a7d8340e9424e778da9f414b
SHA256ab35c4732cd9baa86e5d9e241284a36d1aff669eaaf10da8e18832e328af2801
SHA512d3aee3d64795fb2ae10e9dc7b0645a54d066a2e91c6db7341ec8c871b25838b478b8ed26f9ed24d3f25116233e1ac55349071fcf23cb7450ee7612e0f4f46837
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6421.exeFilesize
318KB
MD5d3a761dcb30ec99facb10027dcb37abc
SHA1af597e14957d82e1a7d8340e9424e778da9f414b
SHA256ab35c4732cd9baa86e5d9e241284a36d1aff669eaaf10da8e18832e328af2801
SHA512d3aee3d64795fb2ae10e9dc7b0645a54d066a2e91c6db7341ec8c871b25838b478b8ed26f9ed24d3f25116233e1ac55349071fcf23cb7450ee7612e0f4f46837
-
memory/1760-148-0x0000000000630000-0x000000000065D000-memory.dmpFilesize
180KB
-
memory/1760-149-0x0000000004F50000-0x00000000054F4000-memory.dmpFilesize
5.6MB
-
memory/1760-150-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-151-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-153-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-155-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-157-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-159-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-161-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-163-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-165-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-167-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-169-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-171-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-173-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-175-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-177-0x00000000023F0000-0x0000000002402000-memory.dmpFilesize
72KB
-
memory/1760-178-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-179-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-180-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1760-182-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-183-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-184-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/1760-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3892-1122-0x0000000000D10000-0x0000000000D42000-memory.dmpFilesize
200KB
-
memory/3892-1123-0x0000000005650000-0x0000000005660000-memory.dmpFilesize
64KB
-
memory/4508-194-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-226-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-196-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-198-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-200-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-202-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-204-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-206-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-208-0x0000000002110000-0x000000000215B000-memory.dmpFilesize
300KB
-
memory/4508-210-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-209-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-212-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-214-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-216-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-213-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-218-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-220-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-222-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-224-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-192-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-228-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-1101-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/4508-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/4508-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/4508-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/4508-1105-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4508-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4508-1108-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/4508-1110-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/4508-1111-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-1112-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-1113-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/4508-191-0x0000000005060000-0x000000000509F000-memory.dmpFilesize
252KB
-
memory/4508-1114-0x0000000006F20000-0x0000000006F96000-memory.dmpFilesize
472KB
-
memory/4508-1115-0x0000000006FB0000-0x0000000007000000-memory.dmpFilesize
320KB
-
memory/4508-1117-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB