Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:04
Static task
static1
Behavioral task
behavioral1
Sample
cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe
Resource
win10v2004-20230220-en
General
-
Target
cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe
-
Size
672KB
-
MD5
99217ad71d80ff24d6aec8fd9afd4649
-
SHA1
c45112566f0ad91daf683505020625b3238f5486
-
SHA256
cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69
-
SHA512
2c147072dd430dc9a1c4003c91a7df73125c504854e1a55b76cbd59ebffba53e0db208efbae2dad336c2789433c3e77329d570bcec3ac0cc59825ee4a795b820
-
SSDEEP
12288:HMrry90l/DtmWs9xzNJNVMQyYMMsVOOQ8/9D//OOr+8SoKQzLgIN1zSX:kyitmDj7MQyYBsE6r+hKf+X
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3689.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3689.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1436-193-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-194-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-196-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-198-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-202-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-200-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-204-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-206-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-208-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-210-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-212-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-214-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-218-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-216-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-220-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-222-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-224-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1436-226-0x0000000002630000-0x000000000266F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un610097.exepro3689.exequ9203.exesi272909.exepid process 4040 un610097.exe 4236 pro3689.exe 1436 qu9203.exe 1596 si272909.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3689.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3689.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3689.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exeun610097.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un610097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un610097.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1792 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2272 4236 WerFault.exe pro3689.exe 3004 1436 WerFault.exe qu9203.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3689.exequ9203.exesi272909.exepid process 4236 pro3689.exe 4236 pro3689.exe 1436 qu9203.exe 1436 qu9203.exe 1596 si272909.exe 1596 si272909.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3689.exequ9203.exesi272909.exedescription pid process Token: SeDebugPrivilege 4236 pro3689.exe Token: SeDebugPrivilege 1436 qu9203.exe Token: SeDebugPrivilege 1596 si272909.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exeun610097.exedescription pid process target process PID 4932 wrote to memory of 4040 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe un610097.exe PID 4932 wrote to memory of 4040 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe un610097.exe PID 4932 wrote to memory of 4040 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe un610097.exe PID 4040 wrote to memory of 4236 4040 un610097.exe pro3689.exe PID 4040 wrote to memory of 4236 4040 un610097.exe pro3689.exe PID 4040 wrote to memory of 4236 4040 un610097.exe pro3689.exe PID 4040 wrote to memory of 1436 4040 un610097.exe qu9203.exe PID 4040 wrote to memory of 1436 4040 un610097.exe qu9203.exe PID 4040 wrote to memory of 1436 4040 un610097.exe qu9203.exe PID 4932 wrote to memory of 1596 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe si272909.exe PID 4932 wrote to memory of 1596 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe si272909.exe PID 4932 wrote to memory of 1596 4932 cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe si272909.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe"C:\Users\Admin\AppData\Local\Temp\cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 16724⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4236 -ip 42361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1436 -ip 14361⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exeFilesize
175KB
MD5e23b9002ff8625fa07b932a6ab389de5
SHA16261734867ddcd13af6f1ec185f934561da217c4
SHA25625a204149837998411941c0ae9ee8dd2cef3fd2db6f3e147a797ffb03f2568ef
SHA512a581acfbd9e6591c7af363c4342e00842b9302481fcd88db30d10eeeb926c0fe09add3d4a7b8b604a86ff709c1c968a8d0827531758c3eaeff546f171d0ce4fc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exeFilesize
175KB
MD5e23b9002ff8625fa07b932a6ab389de5
SHA16261734867ddcd13af6f1ec185f934561da217c4
SHA25625a204149837998411941c0ae9ee8dd2cef3fd2db6f3e147a797ffb03f2568ef
SHA512a581acfbd9e6591c7af363c4342e00842b9302481fcd88db30d10eeeb926c0fe09add3d4a7b8b604a86ff709c1c968a8d0827531758c3eaeff546f171d0ce4fc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exeFilesize
530KB
MD5f29d9dad767a8c7a6aeee65789856119
SHA1f57bcf9d97b7c7a0e167512075a16015285c8d38
SHA256185cf7b630f776f65320c526319c79dc2e955dea615529a50188fc11a9a069c3
SHA512a4190f28d2c644b52758250e7bc01280aa2a16aee9f7b6e4ca283d140e3dfc507a1eabe2038292e18526a40ba6ab902b64368dced626d114bfb1d010a5c9438e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exeFilesize
530KB
MD5f29d9dad767a8c7a6aeee65789856119
SHA1f57bcf9d97b7c7a0e167512075a16015285c8d38
SHA256185cf7b630f776f65320c526319c79dc2e955dea615529a50188fc11a9a069c3
SHA512a4190f28d2c644b52758250e7bc01280aa2a16aee9f7b6e4ca283d140e3dfc507a1eabe2038292e18526a40ba6ab902b64368dced626d114bfb1d010a5c9438e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exeFilesize
259KB
MD5a2f1b451902a0d5d84367a632351f86f
SHA1a00cec58770c716b89aa334f513bf16658b6b37f
SHA25609572a8736bf6402ad9397ebe9cad0ada8c39b886b570d49b5457f9a2c304e1c
SHA512f4e3133c43560f39a08d0f4f354ae08c6933cadd359a30894a88ddbcbc3ec6916921413536883903070d46aa9573dbeba11f065c4679dcd7a7a6825c42934213
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exeFilesize
259KB
MD5a2f1b451902a0d5d84367a632351f86f
SHA1a00cec58770c716b89aa334f513bf16658b6b37f
SHA25609572a8736bf6402ad9397ebe9cad0ada8c39b886b570d49b5457f9a2c304e1c
SHA512f4e3133c43560f39a08d0f4f354ae08c6933cadd359a30894a88ddbcbc3ec6916921413536883903070d46aa9573dbeba11f065c4679dcd7a7a6825c42934213
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exeFilesize
318KB
MD56b94497c7ea29aef5967f1b1c615e0d0
SHA1eb3ea45540baddd3bb768f7ae43e8a8efb1fdc91
SHA2565f49d3163d287cadfe49462e31e39c6b921de40808bd3a9d6a57e6537775b6a5
SHA51283d560d8dce5cc5f396643e31fe5ac6a3ad633b23d134cfdf602580c1cf01f1a5016bf62e1daee6fc4d561ddf02ec68602032aa7ec6d9e389b398774659ef5d6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exeFilesize
318KB
MD56b94497c7ea29aef5967f1b1c615e0d0
SHA1eb3ea45540baddd3bb768f7ae43e8a8efb1fdc91
SHA2565f49d3163d287cadfe49462e31e39c6b921de40808bd3a9d6a57e6537775b6a5
SHA51283d560d8dce5cc5f396643e31fe5ac6a3ad633b23d134cfdf602580c1cf01f1a5016bf62e1daee6fc4d561ddf02ec68602032aa7ec6d9e389b398774659ef5d6
-
memory/1436-1099-0x00000000052F0000-0x0000000005908000-memory.dmpFilesize
6.1MB
-
memory/1436-1102-0x0000000005A20000-0x0000000005A5C000-memory.dmpFilesize
240KB
-
memory/1436-1114-0x0000000006BE0000-0x000000000710C000-memory.dmpFilesize
5.2MB
-
memory/1436-1113-0x0000000006810000-0x00000000069D2000-memory.dmpFilesize
1.8MB
-
memory/1436-1112-0x0000000006790000-0x00000000067E0000-memory.dmpFilesize
320KB
-
memory/1436-1111-0x00000000066F0000-0x0000000006766000-memory.dmpFilesize
472KB
-
memory/1436-1110-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-1109-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-1108-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-1107-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-1105-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/1436-1104-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/1436-1103-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-1101-0x00000000028A0000-0x00000000028B2000-memory.dmpFilesize
72KB
-
memory/1436-1100-0x0000000005910000-0x0000000005A1A000-memory.dmpFilesize
1.0MB
-
memory/1436-226-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-224-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-222-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-220-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-216-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-218-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-189-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/1436-191-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-190-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-192-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1436-193-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-194-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-196-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-198-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-202-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-200-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-204-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-206-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-208-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-210-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-212-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1436-214-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/1596-1120-0x00000000004A0000-0x00000000004D2000-memory.dmpFilesize
200KB
-
memory/1596-1121-0x0000000005060000-0x0000000005070000-memory.dmpFilesize
64KB
-
memory/4236-170-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-149-0x0000000000500000-0x000000000052D000-memory.dmpFilesize
180KB
-
memory/4236-151-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4236-180-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-152-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-178-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-176-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-155-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4236-174-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-166-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4236-182-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4236-172-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-164-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-162-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-160-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-158-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-156-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-153-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4236-150-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/4236-148-0x0000000004B80000-0x0000000005124000-memory.dmpFilesize
5.6MB
-
memory/4236-184-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4236-168-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB