Analysis
-
max time kernel
56s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe
Resource
win10v2004-20230221-en
General
-
Target
d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe
-
Size
672KB
-
MD5
34535c92aa52450feef025eec1757d82
-
SHA1
197e5357b9e33b9553729ecedaa51008a94c6197
-
SHA256
d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb
-
SHA512
4f740f69b41d4b4e96b108082bc9e78e8bcd16328fad79be81d281754023b92bb9b038cce16937c4d067d2436c2858efb9c979c659654eafb2f8815f3ee3bd1b
-
SSDEEP
12288:IOMr8y9014ZmfDhO/tccTM1lEW9R5bJ+oVArY6KUC6ObprZmhJ4aCO7:VyI1DhO/t7M8OnE0ArepbbQe67
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6130.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6130.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4468-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-198-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-200-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-202-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-204-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-206-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-208-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-210-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-212-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-214-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-216-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-218-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-220-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-222-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-224-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-226-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4468-228-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un340640.exepro6130.exequ2233.exesi285908.exepid process 4800 un340640.exe 4804 pro6130.exe 4468 qu2233.exe 3516 si285908.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6130.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6130.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exeun340640.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un340640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un340640.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3300 4804 WerFault.exe pro6130.exe 1648 4468 WerFault.exe qu2233.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6130.exequ2233.exesi285908.exepid process 4804 pro6130.exe 4804 pro6130.exe 4468 qu2233.exe 4468 qu2233.exe 3516 si285908.exe 3516 si285908.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6130.exequ2233.exesi285908.exedescription pid process Token: SeDebugPrivilege 4804 pro6130.exe Token: SeDebugPrivilege 4468 qu2233.exe Token: SeDebugPrivilege 3516 si285908.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exeun340640.exedescription pid process target process PID 5076 wrote to memory of 4800 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe un340640.exe PID 5076 wrote to memory of 4800 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe un340640.exe PID 5076 wrote to memory of 4800 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe un340640.exe PID 4800 wrote to memory of 4804 4800 un340640.exe pro6130.exe PID 4800 wrote to memory of 4804 4800 un340640.exe pro6130.exe PID 4800 wrote to memory of 4804 4800 un340640.exe pro6130.exe PID 4800 wrote to memory of 4468 4800 un340640.exe qu2233.exe PID 4800 wrote to memory of 4468 4800 un340640.exe qu2233.exe PID 4800 wrote to memory of 4468 4800 un340640.exe qu2233.exe PID 5076 wrote to memory of 3516 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe si285908.exe PID 5076 wrote to memory of 3516 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe si285908.exe PID 5076 wrote to memory of 3516 5076 d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe si285908.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe"C:\Users\Admin\AppData\Local\Temp\d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4804 -ip 48041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4468 -ip 44681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exeFilesize
175KB
MD534e5a7191102fabb414fb596c7a3acdd
SHA1c0a22106e4b26adca927e51334e58a1c6b0bf9fd
SHA256e6a3cc04f5c2fb39acfa874a7190053ac154df7f7207206aac4885464467e5c9
SHA5125b6df410bd89e5f770b4d4fbadb5fbd8e81dd31347a249996b5481e234a5ed519cea1111f70422381dd3152f1eb9be4abe21887efadbed5624d3f4c519bcd68e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exeFilesize
175KB
MD534e5a7191102fabb414fb596c7a3acdd
SHA1c0a22106e4b26adca927e51334e58a1c6b0bf9fd
SHA256e6a3cc04f5c2fb39acfa874a7190053ac154df7f7207206aac4885464467e5c9
SHA5125b6df410bd89e5f770b4d4fbadb5fbd8e81dd31347a249996b5481e234a5ed519cea1111f70422381dd3152f1eb9be4abe21887efadbed5624d3f4c519bcd68e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exeFilesize
530KB
MD5a886de9501d80c41b8f457f7ac20b750
SHA1ba6bf16d7f0af88229b2852ce18085fb78fa0fed
SHA256118a302bf04404fc719770f8f2b56348a04c138a4d0060aa1719976888dac7da
SHA5123d43884b592aaa0722bd220dddcccf9f3b0339c798d18c1473c7db2e8ee563b51dfbe62cacc18196ce9693e5cdf895549531c0b1dd25d8f7f0051c40999404f0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exeFilesize
530KB
MD5a886de9501d80c41b8f457f7ac20b750
SHA1ba6bf16d7f0af88229b2852ce18085fb78fa0fed
SHA256118a302bf04404fc719770f8f2b56348a04c138a4d0060aa1719976888dac7da
SHA5123d43884b592aaa0722bd220dddcccf9f3b0339c798d18c1473c7db2e8ee563b51dfbe62cacc18196ce9693e5cdf895549531c0b1dd25d8f7f0051c40999404f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exeFilesize
260KB
MD58dbf48596bf39088e8ef8d9102d16216
SHA1817a3770c58a9590c81dab5a421012f88be94f3f
SHA256f3139e19d273cfee1b66bcd847fd58546e475e48e08efd302351439eec6df5d9
SHA512c98f22624d19025e79a862c62a42ba67d994630f0a0253953c05ea39e064109912b9d983b97153e278328d3e1f3cf66936a219f3f8e1782b0742446308e0fcca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exeFilesize
260KB
MD58dbf48596bf39088e8ef8d9102d16216
SHA1817a3770c58a9590c81dab5a421012f88be94f3f
SHA256f3139e19d273cfee1b66bcd847fd58546e475e48e08efd302351439eec6df5d9
SHA512c98f22624d19025e79a862c62a42ba67d994630f0a0253953c05ea39e064109912b9d983b97153e278328d3e1f3cf66936a219f3f8e1782b0742446308e0fcca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exeFilesize
318KB
MD516dfa81b5098e3e0e2065cefca3f8dc0
SHA1fe45f556503f2896bc0b2d7a0e46195b77ad8896
SHA25659149f544bae4dab0704d5dfa8c82a06ce35c22ea02bdf79519e5b370fd26d31
SHA51242d6ce0c8ad968c375ee6a3b2a06b65ea1d5edda2887dd5f2208aac780c290fdcb89c2b6f03ba59d6d839b5ad5abaad861e6ec5bd41884c76fa0bd90ca941c78
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exeFilesize
318KB
MD516dfa81b5098e3e0e2065cefca3f8dc0
SHA1fe45f556503f2896bc0b2d7a0e46195b77ad8896
SHA25659149f544bae4dab0704d5dfa8c82a06ce35c22ea02bdf79519e5b370fd26d31
SHA51242d6ce0c8ad968c375ee6a3b2a06b65ea1d5edda2887dd5f2208aac780c290fdcb89c2b6f03ba59d6d839b5ad5abaad861e6ec5bd41884c76fa0bd90ca941c78
-
memory/3516-1123-0x00000000053E0000-0x00000000053F0000-memory.dmpFilesize
64KB
-
memory/3516-1122-0x0000000000AE0000-0x0000000000B12000-memory.dmpFilesize
200KB
-
memory/4468-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/4468-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/4468-1116-0x0000000006AA0000-0x0000000006FCC000-memory.dmpFilesize
5.2MB
-
memory/4468-1115-0x00000000068D0000-0x0000000006A92000-memory.dmpFilesize
1.8MB
-
memory/4468-1114-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-1113-0x00000000064F0000-0x0000000006540000-memory.dmpFilesize
320KB
-
memory/4468-1112-0x0000000006450000-0x00000000064C6000-memory.dmpFilesize
472KB
-
memory/4468-1111-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-1110-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-1109-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4468-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4468-1105-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/4468-1101-0x00000000050E0000-0x00000000056F8000-memory.dmpFilesize
6.1MB
-
memory/4468-228-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-226-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-224-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-222-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-220-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-218-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-191-0x00000000020D0000-0x000000000211B000-memory.dmpFilesize
300KB
-
memory/4468-195-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-196-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-194-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-193-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-192-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4468-198-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-200-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-202-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-204-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-206-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-208-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-210-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-212-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-214-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4468-216-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4804-174-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-183-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-153-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-184-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-172-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-182-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4804-170-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-180-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-156-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-178-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-176-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/4804-154-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-152-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-168-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-166-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-164-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-162-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-160-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-158-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4804-151-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-150-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4804-149-0x0000000002120000-0x000000000214D000-memory.dmpFilesize
180KB
-
memory/4804-148-0x0000000004AC0000-0x0000000005064000-memory.dmpFilesize
5.6MB