Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe
Resource
win10v2004-20230220-en
General
-
Target
8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe
-
Size
672KB
-
MD5
f81427d510f2077ff5d2ad4ce3ad79e7
-
SHA1
642148b9e67539027bec0d97a4095e5b07a4ff3f
-
SHA256
8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4
-
SHA512
2301454e7cedfaa03afa37971850539c16359b64b83b97df99c5815bbcfd592e9c21b78ce258cd660c7092e1fb42df5f653a03d83dce4b3d84865faf46f63d2f
-
SSDEEP
12288:JMrzy90RkWWhjngnMDM9yDFM+39r+p6dcD//O/A+8SVWet:+ykhWluMDM9yDShgA+hBt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5616.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5616.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5616.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3848-192-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-193-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-195-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-197-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-199-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-202-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-203-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline behavioral1/memory/3848-206-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-209-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-211-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-213-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-215-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-217-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-219-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-221-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-223-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-225-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/3848-227-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un569904.exepro5616.exequ5914.exesi065778.exepid process 688 un569904.exe 1268 pro5616.exe 3848 qu5914.exe 1348 si065778.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5616.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5616.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exeun569904.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un569904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un569904.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 796 1268 WerFault.exe pro5616.exe 3180 3848 WerFault.exe qu5914.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5616.exequ5914.exesi065778.exepid process 1268 pro5616.exe 1268 pro5616.exe 3848 qu5914.exe 3848 qu5914.exe 1348 si065778.exe 1348 si065778.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5616.exequ5914.exesi065778.exedescription pid process Token: SeDebugPrivilege 1268 pro5616.exe Token: SeDebugPrivilege 3848 qu5914.exe Token: SeDebugPrivilege 1348 si065778.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exeun569904.exedescription pid process target process PID 2152 wrote to memory of 688 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe un569904.exe PID 2152 wrote to memory of 688 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe un569904.exe PID 2152 wrote to memory of 688 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe un569904.exe PID 688 wrote to memory of 1268 688 un569904.exe pro5616.exe PID 688 wrote to memory of 1268 688 un569904.exe pro5616.exe PID 688 wrote to memory of 1268 688 un569904.exe pro5616.exe PID 688 wrote to memory of 3848 688 un569904.exe qu5914.exe PID 688 wrote to memory of 3848 688 un569904.exe qu5914.exe PID 688 wrote to memory of 3848 688 un569904.exe qu5914.exe PID 2152 wrote to memory of 1348 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe si065778.exe PID 2152 wrote to memory of 1348 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe si065778.exe PID 2152 wrote to memory of 1348 2152 8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe si065778.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe"C:\Users\Admin\AppData\Local\Temp\8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 11404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1268 -ip 12681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3848 -ip 38481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exeFilesize
175KB
MD553b29bf6cd15a89725f155024d266ad5
SHA14c47fdf61f41d2067062f1c5b95534684c4213d7
SHA256264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe
SHA512d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exeFilesize
175KB
MD553b29bf6cd15a89725f155024d266ad5
SHA14c47fdf61f41d2067062f1c5b95534684c4213d7
SHA256264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe
SHA512d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exeFilesize
530KB
MD5566a26e3da7da44d83e2831d3d896389
SHA12d2d3f827e4007c5849a8a051b9d390cf8e5023c
SHA2560ec48ac844b16565af8cf04ae691b2bdd209dc4c716f8b2b6fc72163bdfb29f0
SHA5123a3f88fd7f25992c9e79036d8daedc77119bfd909da9da0c8d70401dd0804c2ae05dda53456e6f99395c1aba6ca9a123483101415ca32da794a56eed177c721a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exeFilesize
530KB
MD5566a26e3da7da44d83e2831d3d896389
SHA12d2d3f827e4007c5849a8a051b9d390cf8e5023c
SHA2560ec48ac844b16565af8cf04ae691b2bdd209dc4c716f8b2b6fc72163bdfb29f0
SHA5123a3f88fd7f25992c9e79036d8daedc77119bfd909da9da0c8d70401dd0804c2ae05dda53456e6f99395c1aba6ca9a123483101415ca32da794a56eed177c721a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exeFilesize
259KB
MD53e205245b5adb03d4a7d97575d24fc8d
SHA1e240dc6586a203afcc14fe558d0a1cc77a61d80d
SHA2564b1b69a09f592b9523791712b7c3cbd573d815ea0ecf9f28851c5eefe8a4c834
SHA512aa6d443fef5ed5e950f96f5805a05700e9b7103e52e8b56356c8baa94855b4e09aa27396241a84ac56ff3b9e0a4fb83882de941774f3e5652fc6b9e83fd7422e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exeFilesize
259KB
MD53e205245b5adb03d4a7d97575d24fc8d
SHA1e240dc6586a203afcc14fe558d0a1cc77a61d80d
SHA2564b1b69a09f592b9523791712b7c3cbd573d815ea0ecf9f28851c5eefe8a4c834
SHA512aa6d443fef5ed5e950f96f5805a05700e9b7103e52e8b56356c8baa94855b4e09aa27396241a84ac56ff3b9e0a4fb83882de941774f3e5652fc6b9e83fd7422e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exeFilesize
318KB
MD50b516ccd87529f009d82148b0458eb5e
SHA183c1b79efa636f91ea9d8bb3527cda9271a959c3
SHA2563837a3fa640c79c3eb46965b66fb2d312a4f7902745bc55891bcf2155f0cb4d2
SHA512a797c1ae321b0e56f96c1113141227ac7f2f5c68d29815d531135bb413985bbb61bdda1dadf226659359f9ade0df56e96bda6744571d4a9f299e0bb7034f7186
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exeFilesize
318KB
MD50b516ccd87529f009d82148b0458eb5e
SHA183c1b79efa636f91ea9d8bb3527cda9271a959c3
SHA2563837a3fa640c79c3eb46965b66fb2d312a4f7902745bc55891bcf2155f0cb4d2
SHA512a797c1ae321b0e56f96c1113141227ac7f2f5c68d29815d531135bb413985bbb61bdda1dadf226659359f9ade0df56e96bda6744571d4a9f299e0bb7034f7186
-
memory/1268-163-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-165-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/1268-150-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-151-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-155-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-153-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-157-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-159-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-161-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-164-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/1268-148-0x0000000000630000-0x000000000065D000-memory.dmpFilesize
180KB
-
memory/1268-168-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/1268-167-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-149-0x0000000004CC0000-0x0000000005264000-memory.dmpFilesize
5.6MB
-
memory/1268-170-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-172-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-174-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-176-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-178-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-180-0x00000000024D0000-0x00000000024E2000-memory.dmpFilesize
72KB
-
memory/1268-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1268-182-0x0000000000630000-0x000000000065D000-memory.dmpFilesize
180KB
-
memory/1268-183-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/1268-184-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/1268-187-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1348-1127-0x00000000051A0000-0x00000000051B0000-memory.dmpFilesize
64KB
-
memory/1348-1126-0x00000000051A0000-0x00000000051B0000-memory.dmpFilesize
64KB
-
memory/1348-1125-0x0000000000900000-0x0000000000932000-memory.dmpFilesize
200KB
-
memory/3848-197-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-199-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-201-0x0000000002140000-0x000000000218B000-memory.dmpFilesize
300KB
-
memory/3848-202-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-203-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-206-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-205-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-209-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-207-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-211-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-213-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-215-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-217-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-219-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-221-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-223-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-225-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-227-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-1102-0x00000000052C0000-0x00000000058D8000-memory.dmpFilesize
6.1MB
-
memory/3848-1103-0x0000000004B90000-0x0000000004C9A000-memory.dmpFilesize
1.0MB
-
memory/3848-1104-0x0000000004CC0000-0x0000000004CD2000-memory.dmpFilesize
72KB
-
memory/3848-1105-0x00000000058E0000-0x000000000591C000-memory.dmpFilesize
240KB
-
memory/3848-1106-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-1108-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-1109-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-1110-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-1111-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/3848-1112-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/3848-1113-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/3848-1114-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/3848-1115-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3848-195-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-193-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-192-0x0000000002780000-0x00000000027BF000-memory.dmpFilesize
252KB
-
memory/3848-1117-0x0000000002220000-0x0000000002296000-memory.dmpFilesize
472KB
-
memory/3848-1118-0x00000000080B0000-0x0000000008100000-memory.dmpFilesize
320KB