Analysis
-
max time kernel
74s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:17
Static task
static1
Behavioral task
behavioral1
Sample
9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe
Resource
win10v2004-20230220-en
General
-
Target
9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe
-
Size
673KB
-
MD5
5f926814274ae2764d557c4d265bd351
-
SHA1
e9e3080ee885a709c8f8f35f26a3c0039f6a6411
-
SHA256
9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996
-
SHA512
e14fb0c625b503dfbc46c97a61fadf1f0338d1591441c825b0dbe32ab56ded6f94961cdb56176f43bfbc1a8a745e5b3f7792a1748b8992b86f232161a618100c
-
SSDEEP
12288:gMrjy90zI+3hx7M90H7WztTyam0wouIjD6hio01m7LqTra/ffA93w:TyWhx73Mt9nzmc/1m7GTrefo93w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9438.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9438.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4948-191-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-192-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-194-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-196-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-198-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-200-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-202-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-204-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-206-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-208-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-210-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-212-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-214-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-224-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-226-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-222-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-218-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-228-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/4948-1113-0x0000000003920000-0x0000000003930000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un778233.exepro9438.exequ3898.exesi751645.exepid process 4428 un778233.exe 1452 pro9438.exe 4948 qu3898.exe 1976 si751645.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9438.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9438.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exeun778233.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un778233.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un778233.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1360 1452 WerFault.exe pro9438.exe 1640 4948 WerFault.exe qu3898.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9438.exequ3898.exesi751645.exepid process 1452 pro9438.exe 1452 pro9438.exe 4948 qu3898.exe 4948 qu3898.exe 1976 si751645.exe 1976 si751645.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9438.exequ3898.exesi751645.exedescription pid process Token: SeDebugPrivilege 1452 pro9438.exe Token: SeDebugPrivilege 4948 qu3898.exe Token: SeDebugPrivilege 1976 si751645.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exeun778233.exedescription pid process target process PID 5068 wrote to memory of 4428 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe un778233.exe PID 5068 wrote to memory of 4428 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe un778233.exe PID 5068 wrote to memory of 4428 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe un778233.exe PID 4428 wrote to memory of 1452 4428 un778233.exe pro9438.exe PID 4428 wrote to memory of 1452 4428 un778233.exe pro9438.exe PID 4428 wrote to memory of 1452 4428 un778233.exe pro9438.exe PID 4428 wrote to memory of 4948 4428 un778233.exe qu3898.exe PID 4428 wrote to memory of 4948 4428 un778233.exe qu3898.exe PID 4428 wrote to memory of 4948 4428 un778233.exe qu3898.exe PID 5068 wrote to memory of 1976 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe si751645.exe PID 5068 wrote to memory of 1976 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe si751645.exe PID 5068 wrote to memory of 1976 5068 9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe si751645.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe"C:\Users\Admin\AppData\Local\Temp\9a87d2f4bb481c58b67a6cf88aba0ff99bfb21052e84e919d1243cba86c65996.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778233.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778233.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9438.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3898.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 16604⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751645.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1452 -ip 14521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4948 -ip 49481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751645.exeFilesize
175KB
MD575b2018850d2212d91ccc7ed5529493d
SHA125622cc4ca8a318e3f43c55731878b674f75d6cd
SHA2566f90a1bf26816acb4cbf7fc7074eabecb6880e670f83a8db0616ad1cd3d4f301
SHA51293795ea69069dece2752a5b563855347af5637f62de7f1b9e139aba44d0e072a29df7a52481fc7b7730466c2bd7183e9d4965b84164767920b6fa663be97dc6a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751645.exeFilesize
175KB
MD575b2018850d2212d91ccc7ed5529493d
SHA125622cc4ca8a318e3f43c55731878b674f75d6cd
SHA2566f90a1bf26816acb4cbf7fc7074eabecb6880e670f83a8db0616ad1cd3d4f301
SHA51293795ea69069dece2752a5b563855347af5637f62de7f1b9e139aba44d0e072a29df7a52481fc7b7730466c2bd7183e9d4965b84164767920b6fa663be97dc6a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778233.exeFilesize
531KB
MD57f5849a2f799719337a0b01aeba550a2
SHA1a5091e0dd849e9dfc8b7ac6177d835eaf59ac0a7
SHA256df8f0d61735c07abe0c5807e98009d935166aba57015d5943d2c32400d8ba633
SHA5123bc38adbcf840a97379934244c19038823a388f751616e8ce05cb5de34063536d80cf2d8bc339d309df4143894293bf628ee2be39b4357ec02d0044e58e05d57
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778233.exeFilesize
531KB
MD57f5849a2f799719337a0b01aeba550a2
SHA1a5091e0dd849e9dfc8b7ac6177d835eaf59ac0a7
SHA256df8f0d61735c07abe0c5807e98009d935166aba57015d5943d2c32400d8ba633
SHA5123bc38adbcf840a97379934244c19038823a388f751616e8ce05cb5de34063536d80cf2d8bc339d309df4143894293bf628ee2be39b4357ec02d0044e58e05d57
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9438.exeFilesize
260KB
MD54fef3e9d6a8189d5a13ff24bbb82fa69
SHA15a1726b8c689c22c623ad64f2b164da4c5575144
SHA25697f8b89397bafce6b8364f41af43788b2a465b9fc24925b5340503733719b054
SHA512ff95e02e7b4f38e7f2104ebb369c24568205101ebdecd92ff04743ee238d653f4ea4c84c97223dbff37be62523530c281a819741eeaedfb83bf3325e2f672615
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9438.exeFilesize
260KB
MD54fef3e9d6a8189d5a13ff24bbb82fa69
SHA15a1726b8c689c22c623ad64f2b164da4c5575144
SHA25697f8b89397bafce6b8364f41af43788b2a465b9fc24925b5340503733719b054
SHA512ff95e02e7b4f38e7f2104ebb369c24568205101ebdecd92ff04743ee238d653f4ea4c84c97223dbff37be62523530c281a819741eeaedfb83bf3325e2f672615
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3898.exeFilesize
359KB
MD59618e23cf1a34b517e8cf6114216f3b2
SHA1c4ab5d48839ce0e8444f91ac9460bddc44b72fa9
SHA25639a80ccb300d8da37d8f630bd2368ce2008015b40099b1cfb910582dc0ce8c26
SHA51269088812566c080755b96adb9dfddd5d36558bcaad5ba9a5a85c24bdaa751ce54430e413a884792482c79bc54293a0150300062968343baf333f77f6c3b6b075
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3898.exeFilesize
359KB
MD59618e23cf1a34b517e8cf6114216f3b2
SHA1c4ab5d48839ce0e8444f91ac9460bddc44b72fa9
SHA25639a80ccb300d8da37d8f630bd2368ce2008015b40099b1cfb910582dc0ce8c26
SHA51269088812566c080755b96adb9dfddd5d36558bcaad5ba9a5a85c24bdaa751ce54430e413a884792482c79bc54293a0150300062968343baf333f77f6c3b6b075
-
memory/1452-148-0x0000000004A90000-0x0000000005034000-memory.dmpFilesize
5.6MB
-
memory/1452-156-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-154-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-152-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-150-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-149-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-158-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-160-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-162-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-164-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-166-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-168-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-170-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-172-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-174-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-176-0x00000000026E0000-0x00000000026F2000-memory.dmpFilesize
72KB
-
memory/1452-177-0x0000000002140000-0x000000000216D000-memory.dmpFilesize
180KB
-
memory/1452-178-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-179-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-180-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1452-182-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-183-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-184-0x0000000002210000-0x0000000002220000-memory.dmpFilesize
64KB
-
memory/1452-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1976-1122-0x0000000000F00000-0x0000000000F32000-memory.dmpFilesize
200KB
-
memory/1976-1123-0x0000000005770000-0x0000000005780000-memory.dmpFilesize
64KB
-
memory/4948-194-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-218-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-196-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-198-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-200-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-202-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-204-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-206-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-208-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-210-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-212-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-214-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-217-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-215-0x0000000001C60000-0x0000000001CAB000-memory.dmpFilesize
300KB
-
memory/4948-219-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-224-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-226-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-222-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-221-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-192-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-228-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-1101-0x00000000068C0000-0x0000000006ED8000-memory.dmpFilesize
6.1MB
-
memory/4948-1102-0x0000000006EE0000-0x0000000006FEA000-memory.dmpFilesize
1.0MB
-
memory/4948-1103-0x0000000007020000-0x0000000007032000-memory.dmpFilesize
72KB
-
memory/4948-1104-0x0000000007040000-0x000000000707C000-memory.dmpFilesize
240KB
-
memory/4948-1105-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-1106-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/4948-1108-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/4948-1109-0x0000000007BD0000-0x0000000007C46000-memory.dmpFilesize
472KB
-
memory/4948-1110-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-1112-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-1111-0x0000000007C60000-0x0000000007CB0000-memory.dmpFilesize
320KB
-
memory/4948-1113-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB
-
memory/4948-191-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4948-1114-0x0000000007CE0000-0x0000000007EA2000-memory.dmpFilesize
1.8MB
-
memory/4948-1115-0x0000000007EB0000-0x00000000083DC000-memory.dmpFilesize
5.2MB
-
memory/4948-1116-0x0000000003920000-0x0000000003930000-memory.dmpFilesize
64KB