Analysis
-
max time kernel
87s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe
Resource
win10v2004-20230221-en
General
-
Target
d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe
-
Size
673KB
-
MD5
021ae389deb1e5c27145b7eee3d4796e
-
SHA1
7b020f90bae88b273d29d02046381b0c5b89d3f7
-
SHA256
d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61
-
SHA512
495ddd4c841bcae20bb2d9358dc3d805d73a9b3eaf2bda247759d0002e7de9b270dff230eea3de78e40ebd82c1e809e21c1bbe750887a04d3e9dd21721fdab56
-
SSDEEP
12288:sMrPy90eO3GjXtlaSNMGyUmMR+Y41VMPrD9/Ov9+8S+Xj33nB7wz:zylhj33MGyUzR+YwKPi9+h2o
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro8735.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8735.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8735.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2808-195-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-196-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-198-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-200-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-202-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-204-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-206-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-208-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-210-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-214-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-212-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-216-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-218-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-220-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-222-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-224-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-226-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2808-228-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un798043.exepro8735.exequ3237.exesi781994.exepid process 668 un798043.exe 1904 pro8735.exe 2808 qu3237.exe 232 si781994.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8735.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8735.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exeun798043.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un798043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un798043.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4260 1904 WerFault.exe pro8735.exe 1496 2808 WerFault.exe qu3237.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8735.exequ3237.exesi781994.exepid process 1904 pro8735.exe 1904 pro8735.exe 2808 qu3237.exe 2808 qu3237.exe 232 si781994.exe 232 si781994.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8735.exequ3237.exesi781994.exedescription pid process Token: SeDebugPrivilege 1904 pro8735.exe Token: SeDebugPrivilege 2808 qu3237.exe Token: SeDebugPrivilege 232 si781994.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exeun798043.exedescription pid process target process PID 992 wrote to memory of 668 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe un798043.exe PID 992 wrote to memory of 668 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe un798043.exe PID 992 wrote to memory of 668 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe un798043.exe PID 668 wrote to memory of 1904 668 un798043.exe pro8735.exe PID 668 wrote to memory of 1904 668 un798043.exe pro8735.exe PID 668 wrote to memory of 1904 668 un798043.exe pro8735.exe PID 668 wrote to memory of 2808 668 un798043.exe qu3237.exe PID 668 wrote to memory of 2808 668 un798043.exe qu3237.exe PID 668 wrote to memory of 2808 668 un798043.exe qu3237.exe PID 992 wrote to memory of 232 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe si781994.exe PID 992 wrote to memory of 232 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe si781994.exe PID 992 wrote to memory of 232 992 d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe si781994.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe"C:\Users\Admin\AppData\Local\Temp\d770c264805b357e6614de88b68147e840892ebd5f78efb0db3d795991f6da61.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798043.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8735.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3237.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781994.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1904 -ip 19041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2808 -ip 28081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781994.exeFilesize
175KB
MD56d27d8e60046fd31858d746404fe061e
SHA18a3217bd4d373a0092d2e8e27f163041a52664a1
SHA256c71b3d7231c1580c95f701eb631528d925b427a8f8bf108aff33d7d2366778a8
SHA5124f5a811a16bea04e621d5336376af96d2120d3b38c7884279ea9f9936518a384446cb0ada7af4ffc019f6b3f2965f0b84181b13d0378706a31156804e251602a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781994.exeFilesize
175KB
MD56d27d8e60046fd31858d746404fe061e
SHA18a3217bd4d373a0092d2e8e27f163041a52664a1
SHA256c71b3d7231c1580c95f701eb631528d925b427a8f8bf108aff33d7d2366778a8
SHA5124f5a811a16bea04e621d5336376af96d2120d3b38c7884279ea9f9936518a384446cb0ada7af4ffc019f6b3f2965f0b84181b13d0378706a31156804e251602a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798043.exeFilesize
530KB
MD5c07aef4f04bcad3871fcf137eab4a92c
SHA1ed577b60fa57b67cf339ebd0f82ba5a3f59200c0
SHA25601ec0b459168526ff88e5c89163d2a1feba3e4f219d99576182c3c863d76f250
SHA5127d1e99880ed6261cfc01ea1b92f344afccf56a3b69d4401a4cf00b1b20351f04da5929d9ce8172b2d5c39049f65a7c0e7b71b5f5525a4bad6510a78f941bac22
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798043.exeFilesize
530KB
MD5c07aef4f04bcad3871fcf137eab4a92c
SHA1ed577b60fa57b67cf339ebd0f82ba5a3f59200c0
SHA25601ec0b459168526ff88e5c89163d2a1feba3e4f219d99576182c3c863d76f250
SHA5127d1e99880ed6261cfc01ea1b92f344afccf56a3b69d4401a4cf00b1b20351f04da5929d9ce8172b2d5c39049f65a7c0e7b71b5f5525a4bad6510a78f941bac22
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8735.exeFilesize
259KB
MD50da067d33d24408c2fe9ea63a67293d6
SHA12adb5b6c7e32f5d8af1c5d36889412a7e5da1dfb
SHA256a26970b82c1c5abab0caf5a4a7b59807bdeb0de31eac2102782d3fb960535502
SHA5126b3e90ec15bcfce95792dc2385e1a5b6c2f48549e68d556d7fa65183a15077a3a6b1a9ce89186be81d6d3a2bba90db28859538e4f5572d538747a68570fa31fe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8735.exeFilesize
259KB
MD50da067d33d24408c2fe9ea63a67293d6
SHA12adb5b6c7e32f5d8af1c5d36889412a7e5da1dfb
SHA256a26970b82c1c5abab0caf5a4a7b59807bdeb0de31eac2102782d3fb960535502
SHA5126b3e90ec15bcfce95792dc2385e1a5b6c2f48549e68d556d7fa65183a15077a3a6b1a9ce89186be81d6d3a2bba90db28859538e4f5572d538747a68570fa31fe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3237.exeFilesize
318KB
MD5992088a1995a3032f714a31664324681
SHA1465dc8ab1837a3312c0d0c367446fd515a6ae334
SHA25629c3430e5a856eae21988031c1125554d1b37b7b0b3c5e79b6961432bb04defb
SHA512013fdbe1043a46bc56521f7a4acc75d8c31d65c9134e8564a7166363cf7f52c58666f2cb9b7732374e5a5c7549e291ca0da8564c77cddf68b0da0d3027019628
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3237.exeFilesize
318KB
MD5992088a1995a3032f714a31664324681
SHA1465dc8ab1837a3312c0d0c367446fd515a6ae334
SHA25629c3430e5a856eae21988031c1125554d1b37b7b0b3c5e79b6961432bb04defb
SHA512013fdbe1043a46bc56521f7a4acc75d8c31d65c9134e8564a7166363cf7f52c58666f2cb9b7732374e5a5c7549e291ca0da8564c77cddf68b0da0d3027019628
-
memory/232-1122-0x00000000004D0000-0x0000000000502000-memory.dmpFilesize
200KB
-
memory/232-1123-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1904-156-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-170-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-151-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-152-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-153-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-154-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-149-0x00000000004C0000-0x00000000004ED000-memory.dmpFilesize
180KB
-
memory/1904-158-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-160-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-162-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-164-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-166-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-168-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-150-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-172-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-174-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-176-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-178-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-180-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/1904-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1904-182-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-183-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-184-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/1904-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1904-148-0x0000000004B90000-0x0000000005134000-memory.dmpFilesize
5.6MB
-
memory/2808-193-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-226-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-194-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-195-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-196-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-198-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-200-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-202-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-204-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-206-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-208-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-210-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-214-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-212-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-216-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-218-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-220-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-222-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-224-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-192-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-228-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2808-1101-0x00000000051C0000-0x00000000057D8000-memory.dmpFilesize
6.1MB
-
memory/2808-1102-0x00000000057E0000-0x00000000058EA000-memory.dmpFilesize
1.0MB
-
memory/2808-1103-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/2808-1104-0x00000000058F0000-0x000000000592C000-memory.dmpFilesize
240KB
-
memory/2808-1105-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-1106-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/2808-1107-0x0000000006260000-0x00000000062F2000-memory.dmpFilesize
584KB
-
memory/2808-1109-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-1110-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-1111-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2808-1112-0x0000000006470000-0x0000000006632000-memory.dmpFilesize
1.8MB
-
memory/2808-1113-0x0000000006650000-0x0000000006B7C000-memory.dmpFilesize
5.2MB
-
memory/2808-191-0x0000000002130000-0x000000000217B000-memory.dmpFilesize
300KB
-
memory/2808-1114-0x0000000006E00000-0x0000000006E76000-memory.dmpFilesize
472KB
-
memory/2808-1115-0x0000000006E90000-0x0000000006EE0000-memory.dmpFilesize
320KB
-
memory/2808-1116-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB