Analysis
-
max time kernel
101s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe
Resource
win10v2004-20230220-en
General
-
Target
5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe
-
Size
673KB
-
MD5
67434f9d24f6165eb393225772adea15
-
SHA1
8dc17e50bba2cb9a8d0878ed89c92d056fa8fb03
-
SHA256
5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29
-
SHA512
ae025357dc2bd59670a9e9ee0ab35d4ca63c2e206d8cf194a4eb5cc23049fbc9c69c2faa38fb2a3480f6737597d80c62450979a09d2e78913f673834dd80b342
-
SSDEEP
12288:KMriy90YPLWgHRbHC6+QPyqD5GsB0Ddmc4WOvFoGZUbFomNM+YXgKIpE0mTR:syTSM9PySG/dV4WSFoGipo4aIUR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4305.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4305.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4305.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4305.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4305.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4305.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4305.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/320-189-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-190-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-192-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-194-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-196-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-198-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-200-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-202-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-204-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-206-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-208-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-210-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-212-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-214-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-216-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-218-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-220-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-222-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/320-375-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un527880.exepro4305.exequ0069.exesi641031.exepid process 2364 un527880.exe 1328 pro4305.exe 320 qu0069.exe 3596 si641031.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4305.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4305.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4305.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exeun527880.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un527880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un527880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4420 1328 WerFault.exe pro4305.exe 4140 320 WerFault.exe qu0069.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4305.exequ0069.exesi641031.exepid process 1328 pro4305.exe 1328 pro4305.exe 320 qu0069.exe 320 qu0069.exe 3596 si641031.exe 3596 si641031.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4305.exequ0069.exesi641031.exedescription pid process Token: SeDebugPrivilege 1328 pro4305.exe Token: SeDebugPrivilege 320 qu0069.exe Token: SeDebugPrivilege 3596 si641031.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exeun527880.exedescription pid process target process PID 5036 wrote to memory of 2364 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe un527880.exe PID 5036 wrote to memory of 2364 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe un527880.exe PID 5036 wrote to memory of 2364 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe un527880.exe PID 2364 wrote to memory of 1328 2364 un527880.exe pro4305.exe PID 2364 wrote to memory of 1328 2364 un527880.exe pro4305.exe PID 2364 wrote to memory of 1328 2364 un527880.exe pro4305.exe PID 2364 wrote to memory of 320 2364 un527880.exe qu0069.exe PID 2364 wrote to memory of 320 2364 un527880.exe qu0069.exe PID 2364 wrote to memory of 320 2364 un527880.exe qu0069.exe PID 5036 wrote to memory of 3596 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe si641031.exe PID 5036 wrote to memory of 3596 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe si641031.exe PID 5036 wrote to memory of 3596 5036 5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe si641031.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe"C:\Users\Admin\AppData\Local\Temp\5fc9dc93977acdbed25b5461f74267e6ce1c8cc796923e611afe84159a990b29.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527880.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527880.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4305.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4305.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 10164⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0069.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 14964⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641031.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1328 -ip 13281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 320 -ip 3201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641031.exeFilesize
175KB
MD581e3e3477b67e0778f604dac086cc7b1
SHA1dbe4cb472c9b04e89f53083ed96d414e1a39a563
SHA2567e689bb12084e42615f3d1606990678d53e5cec7c7f0e0198c4e88f5b9f7ede1
SHA512c1a68f503e6076d0fc44d64e1d118ac2241ce09bfbfc2aca839ffa63c9e28710f9ac73791f2490943bf4dfdf19f8ca62ea61dcfc5ca694d0196768a66e6eb1d6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641031.exeFilesize
175KB
MD581e3e3477b67e0778f604dac086cc7b1
SHA1dbe4cb472c9b04e89f53083ed96d414e1a39a563
SHA2567e689bb12084e42615f3d1606990678d53e5cec7c7f0e0198c4e88f5b9f7ede1
SHA512c1a68f503e6076d0fc44d64e1d118ac2241ce09bfbfc2aca839ffa63c9e28710f9ac73791f2490943bf4dfdf19f8ca62ea61dcfc5ca694d0196768a66e6eb1d6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527880.exeFilesize
531KB
MD573b91abb15d6eb108d3920196739574f
SHA19dbea56c600f619f51bb4c86aa4440646c082124
SHA256c93cafa34b1cd4f6bf73e3eaccfaedc03d00b07e352c6b3075be1e746af3d8dd
SHA512f702274eeffb30496c7e297eb4c1c1a3c9f8440dd2a466e66bf6861a7981f6951bf4be441248f777071ce28b6f4b620114c61ec42502a92fe1dd32b538a9de03
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527880.exeFilesize
531KB
MD573b91abb15d6eb108d3920196739574f
SHA19dbea56c600f619f51bb4c86aa4440646c082124
SHA256c93cafa34b1cd4f6bf73e3eaccfaedc03d00b07e352c6b3075be1e746af3d8dd
SHA512f702274eeffb30496c7e297eb4c1c1a3c9f8440dd2a466e66bf6861a7981f6951bf4be441248f777071ce28b6f4b620114c61ec42502a92fe1dd32b538a9de03
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4305.exeFilesize
259KB
MD5ad96a3f17599da9b3b2554ca6050abc4
SHA1a9a2ceb774ecae2356abe72d27279874fa0636f2
SHA2562a1a2c545827c1674e578e9bd7f01fc9abe8ccbfbdcd0cce5b2e408c893c516c
SHA512a5cbf7d2402122b4291a5bd5df7a993b9a9e491f6fbf933306be9fb60ce7547b95e149876e4354462924251cb3338c4badea7640af090c412a617efbe0918fbc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4305.exeFilesize
259KB
MD5ad96a3f17599da9b3b2554ca6050abc4
SHA1a9a2ceb774ecae2356abe72d27279874fa0636f2
SHA2562a1a2c545827c1674e578e9bd7f01fc9abe8ccbfbdcd0cce5b2e408c893c516c
SHA512a5cbf7d2402122b4291a5bd5df7a993b9a9e491f6fbf933306be9fb60ce7547b95e149876e4354462924251cb3338c4badea7640af090c412a617efbe0918fbc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0069.exeFilesize
318KB
MD55ba6e74734c703a9a4c3ccd4f6ae0292
SHA1ec24492749fec3eee3670b9a210ba1adacc8046b
SHA2565360d560481c85f2d83266c736791fcf91cad1feddf382143820404dd4147bce
SHA5126b8fce64afd374d177904e1b4a1f6329e850abb2f03ad0823647c7ba375b77594b7151f556905bd95c49c278cf4546d645e695a8b2272f093d48f8df0ebe5a07
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0069.exeFilesize
318KB
MD55ba6e74734c703a9a4c3ccd4f6ae0292
SHA1ec24492749fec3eee3670b9a210ba1adacc8046b
SHA2565360d560481c85f2d83266c736791fcf91cad1feddf382143820404dd4147bce
SHA5126b8fce64afd374d177904e1b4a1f6329e850abb2f03ad0823647c7ba375b77594b7151f556905bd95c49c278cf4546d645e695a8b2272f093d48f8df0ebe5a07
-
memory/320-1099-0x0000000005250000-0x0000000005868000-memory.dmpFilesize
6.1MB
-
memory/320-1102-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-1114-0x0000000007AB0000-0x0000000007FDC000-memory.dmpFilesize
5.2MB
-
memory/320-1113-0x00000000078E0000-0x0000000007AA2000-memory.dmpFilesize
1.8MB
-
memory/320-1112-0x0000000007860000-0x00000000078B0000-memory.dmpFilesize
320KB
-
memory/320-1111-0x0000000002420000-0x0000000002496000-memory.dmpFilesize
472KB
-
memory/320-1110-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-1109-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-1108-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-1107-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-1105-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/320-1104-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/320-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/320-1101-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/320-1100-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/320-377-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-375-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-373-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/320-371-0x00000000020F0000-0x000000000213B000-memory.dmpFilesize
300KB
-
memory/320-222-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-220-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-189-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-190-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-192-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-194-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-196-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-198-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-200-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-202-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-204-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-206-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-208-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-210-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-212-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-214-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-216-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/320-218-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1328-170-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-184-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1328-168-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-166-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1328-180-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-150-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/1328-178-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-176-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-153-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-174-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-172-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-151-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/1328-152-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/1328-182-0x00000000024C0000-0x00000000024D0000-memory.dmpFilesize
64KB
-
memory/1328-164-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-162-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-160-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-158-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-156-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-154-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1328-149-0x0000000000610000-0x000000000063D000-memory.dmpFilesize
180KB
-
memory/1328-148-0x0000000004B40000-0x00000000050E4000-memory.dmpFilesize
5.6MB
-
memory/3596-1121-0x00000000000B0000-0x00000000000E2000-memory.dmpFilesize
200KB
-
memory/3596-1122-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/3596-1123-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB