Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe
Resource
win10v2004-20230220-en
General
-
Target
0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe
-
Size
672KB
-
MD5
b36c55e14d0b876bb3f2118e7dc95db3
-
SHA1
771ad6434848fbb25a380b8a0f109166e8c47a67
-
SHA256
0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963
-
SHA512
fea5b0cfb2de6fe4047f9f6df56a056a4dc6203730ec972a36c89278a678bb6633dea20c74aca963fd94df7aa94ab79327595c07fc00b57a53f5407242d78715
-
SSDEEP
12288:bMrUy90seA3uS+XH7YTJ0UDJoaF1bV9E3tbaObtr/mDHJz1O3:3ysFSOYyEpFVVI7bZulu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9481.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9481.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9481.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-196-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-195-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-198-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-200-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-202-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-204-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-206-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-208-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-210-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-212-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-214-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-216-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-218-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-220-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-222-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-224-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-226-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4824-228-0x0000000002640000-0x000000000267F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un905810.exepro9481.exequ2788.exesi014578.exepid process 4632 un905810.exe 3228 pro9481.exe 4824 qu2788.exe 2612 si014578.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9481.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9481.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un905810.exe0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un905810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un905810.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3680 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4024 3228 WerFault.exe pro9481.exe 5084 4824 WerFault.exe qu2788.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9481.exequ2788.exesi014578.exepid process 3228 pro9481.exe 3228 pro9481.exe 4824 qu2788.exe 4824 qu2788.exe 2612 si014578.exe 2612 si014578.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9481.exequ2788.exesi014578.exedescription pid process Token: SeDebugPrivilege 3228 pro9481.exe Token: SeDebugPrivilege 4824 qu2788.exe Token: SeDebugPrivilege 2612 si014578.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exeun905810.exedescription pid process target process PID 4268 wrote to memory of 4632 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe un905810.exe PID 4268 wrote to memory of 4632 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe un905810.exe PID 4268 wrote to memory of 4632 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe un905810.exe PID 4632 wrote to memory of 3228 4632 un905810.exe pro9481.exe PID 4632 wrote to memory of 3228 4632 un905810.exe pro9481.exe PID 4632 wrote to memory of 3228 4632 un905810.exe pro9481.exe PID 4632 wrote to memory of 4824 4632 un905810.exe qu2788.exe PID 4632 wrote to memory of 4824 4632 un905810.exe qu2788.exe PID 4632 wrote to memory of 4824 4632 un905810.exe qu2788.exe PID 4268 wrote to memory of 2612 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe si014578.exe PID 4268 wrote to memory of 2612 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe si014578.exe PID 4268 wrote to memory of 2612 4268 0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe si014578.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe"C:\Users\Admin\AppData\Local\Temp\0558dbf325938995afea2628c897997989c228673044620208b8a715ce829963.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905810.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9481.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2788.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014578.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3228 -ip 32281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4824 -ip 48241⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014578.exeFilesize
175KB
MD51866b761ff34e90c506f724641b1ee6e
SHA15038d1103f200f199700fa852853435b775e25dc
SHA2568db001a1bf5cf2fbeceab7703cf84f4ba178bb286baeba03ab7215644776160c
SHA51297ce84116df54587c84ffcefad8760d1a1339abd0e22ef05c8529caf1fb94a0c9137a169e3291d2822453fca3eead0eef1b9be769f1d8c509415d4a90e65ae3f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014578.exeFilesize
175KB
MD51866b761ff34e90c506f724641b1ee6e
SHA15038d1103f200f199700fa852853435b775e25dc
SHA2568db001a1bf5cf2fbeceab7703cf84f4ba178bb286baeba03ab7215644776160c
SHA51297ce84116df54587c84ffcefad8760d1a1339abd0e22ef05c8529caf1fb94a0c9137a169e3291d2822453fca3eead0eef1b9be769f1d8c509415d4a90e65ae3f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905810.exeFilesize
531KB
MD5db59b4f2553ce5681caee4e32bdf5eb4
SHA1fc894087c87833b9f7f4a001bf0ade14926430ba
SHA2563c964933af4ece536125a7d59cb93ab7e9fb4e05ac0a7cb70c857af4cf666e9d
SHA5127ba0450550949571e162d66df1a7c56766b8cfeb7239b636866ad17fb38200d2a58e2e20f6ab900a8085b04134708a53bfa4685dd174e6ae7ec86829a811f9ce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905810.exeFilesize
531KB
MD5db59b4f2553ce5681caee4e32bdf5eb4
SHA1fc894087c87833b9f7f4a001bf0ade14926430ba
SHA2563c964933af4ece536125a7d59cb93ab7e9fb4e05ac0a7cb70c857af4cf666e9d
SHA5127ba0450550949571e162d66df1a7c56766b8cfeb7239b636866ad17fb38200d2a58e2e20f6ab900a8085b04134708a53bfa4685dd174e6ae7ec86829a811f9ce
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9481.exeFilesize
260KB
MD5c3a75adf358a7d74740b5c0aba53117c
SHA14cf33115d7cd4431e98b56c3641324bfd6d5fa7e
SHA25619de00bd010c3952847826c76e29c9b68c8d1051d2027a5f18a81eff8cf41fd5
SHA5121def4871c1fc1cb863792e4e5caeaa19371a65c3ea8703a099f4513e96238ddb70ed0e02930f8186f7ea18610902f131e003f0f7714afaa7a86345db480014fb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9481.exeFilesize
260KB
MD5c3a75adf358a7d74740b5c0aba53117c
SHA14cf33115d7cd4431e98b56c3641324bfd6d5fa7e
SHA25619de00bd010c3952847826c76e29c9b68c8d1051d2027a5f18a81eff8cf41fd5
SHA5121def4871c1fc1cb863792e4e5caeaa19371a65c3ea8703a099f4513e96238ddb70ed0e02930f8186f7ea18610902f131e003f0f7714afaa7a86345db480014fb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2788.exeFilesize
318KB
MD5e9638cac3c423f4498acbcbd448c786e
SHA178e013a1f3ae7b3872e7e085fed1c737f96c9820
SHA256bbf7ed7a8974d57b29177cc83ebfc3dbf5344dced073c12398daaff9a20255e6
SHA512a522dfe1a62078d546f3337a68ff933f1c0cb7eefc7568946c953b6f92e49e52673d6e71e3ee337ab3b4a7f22dff2bddd0dc37b8fdfc955e55c9152ef7f250ca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2788.exeFilesize
318KB
MD5e9638cac3c423f4498acbcbd448c786e
SHA178e013a1f3ae7b3872e7e085fed1c737f96c9820
SHA256bbf7ed7a8974d57b29177cc83ebfc3dbf5344dced073c12398daaff9a20255e6
SHA512a522dfe1a62078d546f3337a68ff933f1c0cb7eefc7568946c953b6f92e49e52673d6e71e3ee337ab3b4a7f22dff2bddd0dc37b8fdfc955e55c9152ef7f250ca
-
memory/2612-1122-0x0000000000350000-0x0000000000382000-memory.dmpFilesize
200KB
-
memory/2612-1123-0x0000000004EF0000-0x0000000004F00000-memory.dmpFilesize
64KB
-
memory/2612-1124-0x0000000004EF0000-0x0000000004F00000-memory.dmpFilesize
64KB
-
memory/3228-160-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-172-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-154-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-152-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-156-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-155-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-158-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-151-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-162-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-164-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-166-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-168-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-170-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-150-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-174-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-176-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-178-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-180-0x00000000024B0000-0x00000000024C2000-memory.dmpFilesize
72KB
-
memory/3228-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3228-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-183-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-184-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/3228-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/3228-149-0x0000000004CE0000-0x0000000005284000-memory.dmpFilesize
5.6MB
-
memory/3228-148-0x0000000000590000-0x00000000005BD000-memory.dmpFilesize
180KB
-
memory/4824-192-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-194-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-196-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-195-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-198-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-200-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-202-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-204-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-206-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-208-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-210-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-212-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-214-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-216-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-218-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-220-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-222-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-224-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-226-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-228-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/4824-1101-0x00000000052B0000-0x00000000058C8000-memory.dmpFilesize
6.1MB
-
memory/4824-1102-0x00000000058D0000-0x00000000059DA000-memory.dmpFilesize
1.0MB
-
memory/4824-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4824-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4824-1105-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4824-1107-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/4824-1108-0x00000000065F0000-0x00000000067B2000-memory.dmpFilesize
1.8MB
-
memory/4824-1111-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-1110-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-1112-0x00000000067C0000-0x0000000006CEC000-memory.dmpFilesize
5.2MB
-
memory/4824-193-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-191-0x0000000002100000-0x000000000214B000-memory.dmpFilesize
300KB
-
memory/4824-1113-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4824-1115-0x0000000008210000-0x0000000008286000-memory.dmpFilesize
472KB
-
memory/4824-1116-0x00000000082A0000-0x00000000082F0000-memory.dmpFilesize
320KB