Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:55
Static task
static1
Behavioral task
behavioral1
Sample
96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe
Resource
win10v2004-20230221-en
General
-
Target
96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe
-
Size
672KB
-
MD5
9123d7403b3ada69ae47973043a907be
-
SHA1
7ae5b7ec55c14a174c7839c9ce549817d293d0ed
-
SHA256
96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740
-
SHA512
13cce457f299b34350b0173b46d5cdbf3d64da820bdee76f23213c2b28e5ad062e1dc6d9e114584559841d8996d3d6962dcdeaf5aa59dc37e279f4bb056eadee
-
SSDEEP
12288:aMr1y90ioIy8VU8EDhqLulU+W4kdZgSdBTOblrlmHzBd:7yJo3PDhfuDL8b/+b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6460.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6460.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6460.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/448-191-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-192-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-194-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-196-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-198-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-200-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-202-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-204-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-206-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-208-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-210-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-212-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-214-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-218-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-216-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-220-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-222-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-224-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/448-380-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un567133.exepro6460.exequ3629.exesi873573.exepid process 620 un567133.exe 852 pro6460.exe 448 qu3629.exe 3584 si873573.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6460.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6460.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exeun567133.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un567133.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un567133.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2572 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1728 852 WerFault.exe pro6460.exe 3524 448 WerFault.exe qu3629.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6460.exequ3629.exesi873573.exepid process 852 pro6460.exe 852 pro6460.exe 448 qu3629.exe 448 qu3629.exe 3584 si873573.exe 3584 si873573.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6460.exequ3629.exesi873573.exedescription pid process Token: SeDebugPrivilege 852 pro6460.exe Token: SeDebugPrivilege 448 qu3629.exe Token: SeDebugPrivilege 3584 si873573.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exeun567133.exedescription pid process target process PID 2932 wrote to memory of 620 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe un567133.exe PID 2932 wrote to memory of 620 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe un567133.exe PID 2932 wrote to memory of 620 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe un567133.exe PID 620 wrote to memory of 852 620 un567133.exe pro6460.exe PID 620 wrote to memory of 852 620 un567133.exe pro6460.exe PID 620 wrote to memory of 852 620 un567133.exe pro6460.exe PID 620 wrote to memory of 448 620 un567133.exe qu3629.exe PID 620 wrote to memory of 448 620 un567133.exe qu3629.exe PID 620 wrote to memory of 448 620 un567133.exe qu3629.exe PID 2932 wrote to memory of 3584 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe si873573.exe PID 2932 wrote to memory of 3584 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe si873573.exe PID 2932 wrote to memory of 3584 2932 96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe si873573.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe"C:\Users\Admin\AppData\Local\Temp\96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 852 -ip 8521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 448 -ip 4481⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exeFilesize
175KB
MD574932296ad43422703cba856a91f8385
SHA1f0e3f219de75596c0d35ee3f7f631f8c6fc50589
SHA256e8bb83f676681048ff90e833c71db3ae6805db04e6412d5d5cfb815940d3ab5f
SHA5124f041bb3c1b5b5583b3a0293a9e1dd0cada0bbac2f01c271bb7518ec3839b77f2a3e1f382426013d8abb1974e38d669dd0d84eb08a201776643c91896827c543
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exeFilesize
175KB
MD574932296ad43422703cba856a91f8385
SHA1f0e3f219de75596c0d35ee3f7f631f8c6fc50589
SHA256e8bb83f676681048ff90e833c71db3ae6805db04e6412d5d5cfb815940d3ab5f
SHA5124f041bb3c1b5b5583b3a0293a9e1dd0cada0bbac2f01c271bb7518ec3839b77f2a3e1f382426013d8abb1974e38d669dd0d84eb08a201776643c91896827c543
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exeFilesize
530KB
MD5f644f78467b6c8008514465955693d3a
SHA15dc2a43044e630def3c70eb383ebe998fe6bcec7
SHA256a16bd256669922431b97325f47fcb5d2d7e5fc70031925e744aae560646bfcdb
SHA51209d62f94389a61f6a799454c6b70e432f37c7358e681a62ebfcea9779fa0502a9333cfebd5bcc0a748daaab63f82f552e57c47d3da928bd331c229cf5a2d3d4e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exeFilesize
530KB
MD5f644f78467b6c8008514465955693d3a
SHA15dc2a43044e630def3c70eb383ebe998fe6bcec7
SHA256a16bd256669922431b97325f47fcb5d2d7e5fc70031925e744aae560646bfcdb
SHA51209d62f94389a61f6a799454c6b70e432f37c7358e681a62ebfcea9779fa0502a9333cfebd5bcc0a748daaab63f82f552e57c47d3da928bd331c229cf5a2d3d4e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exeFilesize
260KB
MD5e682702f68abced36365c9111e1a2ded
SHA133a71475b668788b828f4f66137837fd7492149f
SHA2569a5beb5554af4dd0c7ea438a76e60a4bb35318d2e477f3707360d6f2cdb4a13a
SHA51220035aaaeda1ef83e8625baedaf486358b8b358284e74a10de4c7d7b62f37adc759f58550cfe2b0a9a4f2d60cbc9ca791db9c0b66be185ae819f0bed39be4f2f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exeFilesize
260KB
MD5e682702f68abced36365c9111e1a2ded
SHA133a71475b668788b828f4f66137837fd7492149f
SHA2569a5beb5554af4dd0c7ea438a76e60a4bb35318d2e477f3707360d6f2cdb4a13a
SHA51220035aaaeda1ef83e8625baedaf486358b8b358284e74a10de4c7d7b62f37adc759f58550cfe2b0a9a4f2d60cbc9ca791db9c0b66be185ae819f0bed39be4f2f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exeFilesize
318KB
MD5dc42fba3523fe40ff65592c4d900c203
SHA1ad41c51fd73c29c7402dac8efa424afdba7a3867
SHA256e68366ef643776ca97dbf77d7e1bf53aa52d2b053fef86ac3757a73012c49877
SHA5125ee5d6ec4c9a596f7547ca0c3c40c69accc2200e103431a19d1d9babf87c70383aad3ee4b684b273992f1f95274b885bfea4668d7905979d9058d2c6609aebc3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exeFilesize
318KB
MD5dc42fba3523fe40ff65592c4d900c203
SHA1ad41c51fd73c29c7402dac8efa424afdba7a3867
SHA256e68366ef643776ca97dbf77d7e1bf53aa52d2b053fef86ac3757a73012c49877
SHA5125ee5d6ec4c9a596f7547ca0c3c40c69accc2200e103431a19d1d9babf87c70383aad3ee4b684b273992f1f95274b885bfea4668d7905979d9058d2c6609aebc3
-
memory/448-1102-0x0000000005780000-0x000000000588A000-memory.dmpFilesize
1.0MB
-
memory/448-381-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1116-0x0000000006A80000-0x0000000006FAC000-memory.dmpFilesize
5.2MB
-
memory/448-1115-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1114-0x0000000006690000-0x0000000006852000-memory.dmpFilesize
1.8MB
-
memory/448-208-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-1113-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1112-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1111-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1109-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/448-1108-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/448-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/448-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/448-210-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-1105-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/448-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/448-1101-0x0000000005160000-0x0000000005778000-memory.dmpFilesize
6.1MB
-
memory/448-380-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-216-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-378-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/448-377-0x00000000007B0000-0x00000000007FB000-memory.dmpFilesize
300KB
-
memory/448-224-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-191-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-192-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-212-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-196-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-198-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-200-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-202-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-204-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-206-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-222-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-220-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-194-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-214-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/448-218-0x0000000002530000-0x000000000256F000-memory.dmpFilesize
252KB
-
memory/852-182-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-176-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-162-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-151-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-153-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/852-184-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-183-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-154-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-150-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/852-180-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-178-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-174-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-172-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-170-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-168-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-166-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-164-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-156-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-157-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-158-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/852-160-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/852-149-0x0000000004AA0000-0x0000000005044000-memory.dmpFilesize
5.6MB
-
memory/852-148-0x0000000000630000-0x000000000065D000-memory.dmpFilesize
180KB
-
memory/3584-1122-0x0000000000690000-0x00000000006C2000-memory.dmpFilesize
200KB
-
memory/3584-1123-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB
-
memory/3584-1124-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB