Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:43
Static task
static1
Behavioral task
behavioral1
Sample
181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe
Resource
win10v2004-20230220-en
General
-
Target
181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe
-
Size
672KB
-
MD5
dbaeb44c439bdd7d134863310ecc2e85
-
SHA1
31e97634bebc342b9dba6b618e053968ece82706
-
SHA256
181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23
-
SHA512
b55306bf5fac93bd9b2b573b05a447d48c0bc5d06262cfeeff4cd7f658ef9817fc6c4916b45ebcafb3e5ceffde5f028d17047085aa47746b6895eb683bbc327c
-
SSDEEP
12288:gMray90REzKkHToBEjq0mhWU4YAs8tenObOrbmKJIp9Y/v:qyPzoBE2SMBoTbybs+H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3907.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3907.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3907.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-191-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-192-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-194-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-196-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-198-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-200-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-202-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-204-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-208-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-206-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-210-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-212-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-214-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-216-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-220-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-223-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-225-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1724-227-0x0000000002740000-0x000000000277F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un142896.exepro3907.exequ8764.exesi654613.exepid process 324 un142896.exe 5012 pro3907.exe 1724 qu8764.exe 1424 si654613.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3907.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3907.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un142896.exe181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un142896.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un142896.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1140 5012 WerFault.exe pro3907.exe 3964 1724 WerFault.exe qu8764.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3907.exequ8764.exesi654613.exepid process 5012 pro3907.exe 5012 pro3907.exe 1724 qu8764.exe 1724 qu8764.exe 1424 si654613.exe 1424 si654613.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3907.exequ8764.exesi654613.exedescription pid process Token: SeDebugPrivilege 5012 pro3907.exe Token: SeDebugPrivilege 1724 qu8764.exe Token: SeDebugPrivilege 1424 si654613.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exeun142896.exedescription pid process target process PID 4628 wrote to memory of 324 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe un142896.exe PID 4628 wrote to memory of 324 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe un142896.exe PID 4628 wrote to memory of 324 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe un142896.exe PID 324 wrote to memory of 5012 324 un142896.exe pro3907.exe PID 324 wrote to memory of 5012 324 un142896.exe pro3907.exe PID 324 wrote to memory of 5012 324 un142896.exe pro3907.exe PID 324 wrote to memory of 1724 324 un142896.exe qu8764.exe PID 324 wrote to memory of 1724 324 un142896.exe qu8764.exe PID 324 wrote to memory of 1724 324 un142896.exe qu8764.exe PID 4628 wrote to memory of 1424 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe si654613.exe PID 4628 wrote to memory of 1424 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe si654613.exe PID 4628 wrote to memory of 1424 4628 181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe si654613.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe"C:\Users\Admin\AppData\Local\Temp\181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 13524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5012 -ip 50121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1724 -ip 17241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exeFilesize
175KB
MD581e9743f4bf1c221183e3c28fd2467cb
SHA1672be533590a6acae30532264f0de11b6dd6f678
SHA256693289f00555280065bd08df3c166b090499f803cf5df8f3b275edbc1b896c21
SHA5124b1054fc620cf627efb3193af1bff5fa55e56ba3ebebc40160b764fb30ad68b1fa487b9a77e9ab3983d4902570e2c40e53238b7598f12e5f63712e47b9ba379e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exeFilesize
175KB
MD581e9743f4bf1c221183e3c28fd2467cb
SHA1672be533590a6acae30532264f0de11b6dd6f678
SHA256693289f00555280065bd08df3c166b090499f803cf5df8f3b275edbc1b896c21
SHA5124b1054fc620cf627efb3193af1bff5fa55e56ba3ebebc40160b764fb30ad68b1fa487b9a77e9ab3983d4902570e2c40e53238b7598f12e5f63712e47b9ba379e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exeFilesize
530KB
MD5c886ddf9fc1549de80326d8c57a7378b
SHA164131c11806bf666dc81d859b995c53cfcc22d4c
SHA256bd029790550a9a75e7e7fbdc0bbbb2d44c84afbd1c652c0b7757356d35958ab0
SHA51222bdb1cd562a8bb1719656ccac811fc0f0ad3fddc6bb2c97e47a26cd220afcd4a091a60db75fb866b906e95cbb21deaf1f03f4d43b8480b09459e7441db96166
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exeFilesize
530KB
MD5c886ddf9fc1549de80326d8c57a7378b
SHA164131c11806bf666dc81d859b995c53cfcc22d4c
SHA256bd029790550a9a75e7e7fbdc0bbbb2d44c84afbd1c652c0b7757356d35958ab0
SHA51222bdb1cd562a8bb1719656ccac811fc0f0ad3fddc6bb2c97e47a26cd220afcd4a091a60db75fb866b906e95cbb21deaf1f03f4d43b8480b09459e7441db96166
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exeFilesize
260KB
MD55f9acbd75e4e20de41c6de3d1224774f
SHA1a82cafddece6e09214dd39118cf2bfe48806cf0c
SHA2567d3f6558b05ff5c69bcc851d51bcbd4e598123777c82987da4b52d1d146ed29d
SHA5124953e93060668eda59235d411d12e04dce1fd9163b918a5c206e2e5c859f692283ffb99a8d996c254ce8e145c0b95997b3710d553a5a3031d3267b801808dc71
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exeFilesize
260KB
MD55f9acbd75e4e20de41c6de3d1224774f
SHA1a82cafddece6e09214dd39118cf2bfe48806cf0c
SHA2567d3f6558b05ff5c69bcc851d51bcbd4e598123777c82987da4b52d1d146ed29d
SHA5124953e93060668eda59235d411d12e04dce1fd9163b918a5c206e2e5c859f692283ffb99a8d996c254ce8e145c0b95997b3710d553a5a3031d3267b801808dc71
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exeFilesize
318KB
MD5a351bfd4cb42dde576bc0a6e2675d492
SHA19f9afca882ddaa05cc63a36bef6bad1cbe30f058
SHA25602c5f4d63664e3448ab72cd5fa15409afbbeed1caa9c4e1768f827aace869dd9
SHA512c985924cabee8c77cf930439ffb1aead2a1518ba94fe9d88089389a1040355f40c865e3115ea6ac13d1e5717ec7be4e1e246f675711265d719d8a77d0dc044ae
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exeFilesize
318KB
MD5a351bfd4cb42dde576bc0a6e2675d492
SHA19f9afca882ddaa05cc63a36bef6bad1cbe30f058
SHA25602c5f4d63664e3448ab72cd5fa15409afbbeed1caa9c4e1768f827aace869dd9
SHA512c985924cabee8c77cf930439ffb1aead2a1518ba94fe9d88089389a1040355f40c865e3115ea6ac13d1e5717ec7be4e1e246f675711265d719d8a77d0dc044ae
-
memory/1424-1122-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/1424-1121-0x0000000000E50000-0x0000000000E82000-memory.dmpFilesize
200KB
-
memory/1724-227-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-1104-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-1115-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-1114-0x0000000008010000-0x0000000008060000-memory.dmpFilesize
320KB
-
memory/1724-1113-0x0000000007F80000-0x0000000007FF6000-memory.dmpFilesize
472KB
-
memory/1724-1112-0x0000000006650000-0x0000000006B7C000-memory.dmpFilesize
5.2MB
-
memory/1724-1111-0x0000000006470000-0x0000000006632000-memory.dmpFilesize
1.8MB
-
memory/1724-1110-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-1109-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-1108-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/1724-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/1724-1103-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/1724-1102-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/1724-1101-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/1724-1100-0x0000000005100000-0x0000000005718000-memory.dmpFilesize
6.1MB
-
memory/1724-225-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-219-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-223-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-221-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1724-220-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-191-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-192-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-194-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-196-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-198-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-200-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-202-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-204-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-208-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-206-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-210-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-212-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-214-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/1724-217-0x0000000000650000-0x000000000069B000-memory.dmpFilesize
300KB
-
memory/1724-216-0x0000000002740000-0x000000000277F000-memory.dmpFilesize
252KB
-
memory/5012-153-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-184-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-159-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-185-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-155-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-161-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-183-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-165-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-178-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-180-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-157-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-179-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/5012-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/5012-163-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/5012-171-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-175-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-177-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-173-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-169-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-167-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-151-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-150-0x0000000002540000-0x0000000002552000-memory.dmpFilesize
72KB
-
memory/5012-149-0x0000000004BD0000-0x0000000005174000-memory.dmpFilesize
5.6MB
-
memory/5012-148-0x0000000000610000-0x000000000063D000-memory.dmpFilesize
180KB