Analysis
-
max time kernel
101s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe
Resource
win10v2004-20230221-en
General
-
Target
4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe
-
Size
672KB
-
MD5
c71af969e12e95e8a59dfb0b9181e898
-
SHA1
9f7ed344ae29c06bae075a0bf442737ab5debbc8
-
SHA256
4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85
-
SHA512
1bb3a65eea2827543713d446bf43e8ec3c4f729ec7ec93209f67aedcd5d0a744ca95d52dca1a536ee22042355b9c67d782fc316490d9c958382a5c85a92c7518
-
SSDEEP
12288:EMrLy90iCrqXyrhMkG/nQEgph3i8SbOb2r4mq47aNn:HyDCrL8O3iWbXbzR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4494.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4494.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4494.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4792-192-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-191-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-194-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-196-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-198-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-200-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-202-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-204-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-206-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-208-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-210-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-212-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-217-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-220-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-222-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-224-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-226-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-228-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/4792-1111-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un528901.exepro4494.exequ2330.exesi913239.exepid process 4768 un528901.exe 1340 pro4494.exe 4792 qu2330.exe 5012 si913239.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4494.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4494.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exeun528901.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un528901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un528901.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2524 1340 WerFault.exe pro4494.exe 2728 4792 WerFault.exe qu2330.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4494.exequ2330.exesi913239.exepid process 1340 pro4494.exe 1340 pro4494.exe 4792 qu2330.exe 4792 qu2330.exe 5012 si913239.exe 5012 si913239.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4494.exequ2330.exesi913239.exedescription pid process Token: SeDebugPrivilege 1340 pro4494.exe Token: SeDebugPrivilege 4792 qu2330.exe Token: SeDebugPrivilege 5012 si913239.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exeun528901.exedescription pid process target process PID 4672 wrote to memory of 4768 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe un528901.exe PID 4672 wrote to memory of 4768 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe un528901.exe PID 4672 wrote to memory of 4768 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe un528901.exe PID 4768 wrote to memory of 1340 4768 un528901.exe pro4494.exe PID 4768 wrote to memory of 1340 4768 un528901.exe pro4494.exe PID 4768 wrote to memory of 1340 4768 un528901.exe pro4494.exe PID 4768 wrote to memory of 4792 4768 un528901.exe qu2330.exe PID 4768 wrote to memory of 4792 4768 un528901.exe qu2330.exe PID 4768 wrote to memory of 4792 4768 un528901.exe qu2330.exe PID 4672 wrote to memory of 5012 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe si913239.exe PID 4672 wrote to memory of 5012 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe si913239.exe PID 4672 wrote to memory of 5012 4672 4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe si913239.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe"C:\Users\Admin\AppData\Local\Temp\4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 13404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1340 -ip 13401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4792 -ip 47921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exeFilesize
175KB
MD58bf09cec6f0799a089b4bb4029b35f64
SHA10c6a97a18daf14849d6f6c28e0225e860e1455f8
SHA256d8a279d1a5bfbd09e00933abde819249504df0316fd9f4b3876a5d7344095302
SHA51258289e6082eb92281dfdb01744ad0738df07e41872e238638ebf51304043067a0599f24d6102cefc42a8531e467d6cfcd6342274ad498c903cf039299ef2d5d7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exeFilesize
175KB
MD58bf09cec6f0799a089b4bb4029b35f64
SHA10c6a97a18daf14849d6f6c28e0225e860e1455f8
SHA256d8a279d1a5bfbd09e00933abde819249504df0316fd9f4b3876a5d7344095302
SHA51258289e6082eb92281dfdb01744ad0738df07e41872e238638ebf51304043067a0599f24d6102cefc42a8531e467d6cfcd6342274ad498c903cf039299ef2d5d7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exeFilesize
530KB
MD5e326555ace77887acb1bcd5bb1759d5f
SHA162c7434ce6fd6bc78cb747b319f5451dab791103
SHA256070f87bf3c9029dbd933dc3d531b01c304bb12e88f4732e4f87b73e9d6d330cf
SHA512cb17572ac116692d8b0d14e0ea4bfbf50b5cad90ae83de869d2b051eab41376c706099a0d3e62abe728a4f780bd3f9eefe15505f07cd587fd3c08e2588d7ff3e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exeFilesize
530KB
MD5e326555ace77887acb1bcd5bb1759d5f
SHA162c7434ce6fd6bc78cb747b319f5451dab791103
SHA256070f87bf3c9029dbd933dc3d531b01c304bb12e88f4732e4f87b73e9d6d330cf
SHA512cb17572ac116692d8b0d14e0ea4bfbf50b5cad90ae83de869d2b051eab41376c706099a0d3e62abe728a4f780bd3f9eefe15505f07cd587fd3c08e2588d7ff3e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exeFilesize
260KB
MD56becaadf7a1a18982270ce3d1390e37a
SHA1acbe774bfc13f8ebfa71fd3f473a618195e028cd
SHA2561a1bac7d029c2177dfd78688686875144b791d4a1f0f719e6a3c54b1583099a8
SHA512835a29be8b374076879c1fc41c244a56988893d133c41aaa3e0cb9dd1b50ee9be31e78e8cd0328b5e3f3b3919ba732672e419f6f3c664391fea089be490237de
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exeFilesize
260KB
MD56becaadf7a1a18982270ce3d1390e37a
SHA1acbe774bfc13f8ebfa71fd3f473a618195e028cd
SHA2561a1bac7d029c2177dfd78688686875144b791d4a1f0f719e6a3c54b1583099a8
SHA512835a29be8b374076879c1fc41c244a56988893d133c41aaa3e0cb9dd1b50ee9be31e78e8cd0328b5e3f3b3919ba732672e419f6f3c664391fea089be490237de
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exeFilesize
318KB
MD577e3e55caff7210ed79061a6af9a836d
SHA1300784b44012eb00e609e0b62cb081c510e2755c
SHA256735277e227fb21401e4502bca5915f92354e5d18d0603745a5e43b15f3b90328
SHA512d597c8b118d49a2d7c56701bff8fc2ab94b2a2f659bda740b2cc9af88126d9e8e9741d91a348ca93d2f0b8857620beb8270d384afbf4ee24a1ee6d47a5ea0c14
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exeFilesize
318KB
MD577e3e55caff7210ed79061a6af9a836d
SHA1300784b44012eb00e609e0b62cb081c510e2755c
SHA256735277e227fb21401e4502bca5915f92354e5d18d0603745a5e43b15f3b90328
SHA512d597c8b118d49a2d7c56701bff8fc2ab94b2a2f659bda740b2cc9af88126d9e8e9741d91a348ca93d2f0b8857620beb8270d384afbf4ee24a1ee6d47a5ea0c14
-
memory/1340-148-0x0000000004D50000-0x00000000052F4000-memory.dmpFilesize
5.6MB
-
memory/1340-149-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-150-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-152-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-154-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-156-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-158-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-160-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-163-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-162-0x0000000000660000-0x000000000068D000-memory.dmpFilesize
180KB
-
memory/1340-164-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-167-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-166-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-170-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-168-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-172-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-174-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-176-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-178-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-180-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/1340-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1340-183-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-184-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-185-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/1340-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4792-192-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-191-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-194-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-196-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-198-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-200-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-202-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-204-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-206-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-208-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-210-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-213-0x0000000000620000-0x000000000066B000-memory.dmpFilesize
300KB
-
memory/4792-212-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-214-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-217-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-216-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-219-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-220-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-222-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-224-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-226-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-228-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/4792-1101-0x0000000005350000-0x0000000005968000-memory.dmpFilesize
6.1MB
-
memory/4792-1102-0x0000000004BF0000-0x0000000004CFA000-memory.dmpFilesize
1.0MB
-
memory/4792-1103-0x0000000002860000-0x0000000002872000-memory.dmpFilesize
72KB
-
memory/4792-1104-0x0000000004D00000-0x0000000004D3C000-memory.dmpFilesize
240KB
-
memory/4792-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4792-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4792-1109-0x0000000006470000-0x0000000006632000-memory.dmpFilesize
1.8MB
-
memory/4792-1110-0x0000000006650000-0x0000000006B7C000-memory.dmpFilesize
5.2MB
-
memory/4792-1111-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-1113-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-1114-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4792-1115-0x0000000006E00000-0x0000000006E76000-memory.dmpFilesize
472KB
-
memory/4792-1116-0x0000000006E80000-0x0000000006ED0000-memory.dmpFilesize
320KB
-
memory/5012-1122-0x0000000000D00000-0x0000000000D32000-memory.dmpFilesize
200KB
-
memory/5012-1123-0x0000000005610000-0x0000000005620000-memory.dmpFilesize
64KB