Analysis
-
max time kernel
54s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:12
Static task
static1
Behavioral task
behavioral1
Sample
43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe
Resource
win10v2004-20230220-en
General
-
Target
43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe
-
Size
674KB
-
MD5
26dac7d27cf7a0b30eb610503ec48432
-
SHA1
547c182b4d83085e1674762ea3f8e630a40ef928
-
SHA256
43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff
-
SHA512
607d760cc95b527371e882670dd2eaf0c05428e3dc826f34550dc498380e8cce36a4a6388a15d4db73c66c575a77d365fb580609f056da77e745a33a17f09943
-
SSDEEP
12288:7MrLy90KWqquRMb7wItMOA6aXJT2x5kYVjaNdP4Ob0r2mJ9FZfWR:IyfxRu8ItMOLsix5KdnbT89FpWR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2211.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4948-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-223-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-225-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4948-227-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un878415.exepro2211.exequ3016.exesi033198.exepid process 4748 un878415.exe 1968 pro2211.exe 4948 qu3016.exe 2416 si033198.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2211.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2211.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exeun878415.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un878415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un878415.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1344 1968 WerFault.exe pro2211.exe 4544 4948 WerFault.exe qu3016.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2211.exequ3016.exesi033198.exepid process 1968 pro2211.exe 1968 pro2211.exe 4948 qu3016.exe 4948 qu3016.exe 2416 si033198.exe 2416 si033198.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2211.exequ3016.exesi033198.exedescription pid process Token: SeDebugPrivilege 1968 pro2211.exe Token: SeDebugPrivilege 4948 qu3016.exe Token: SeDebugPrivilege 2416 si033198.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exeun878415.exedescription pid process target process PID 2860 wrote to memory of 4748 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe un878415.exe PID 2860 wrote to memory of 4748 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe un878415.exe PID 2860 wrote to memory of 4748 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe un878415.exe PID 4748 wrote to memory of 1968 4748 un878415.exe pro2211.exe PID 4748 wrote to memory of 1968 4748 un878415.exe pro2211.exe PID 4748 wrote to memory of 1968 4748 un878415.exe pro2211.exe PID 4748 wrote to memory of 4948 4748 un878415.exe qu3016.exe PID 4748 wrote to memory of 4948 4748 un878415.exe qu3016.exe PID 4748 wrote to memory of 4948 4748 un878415.exe qu3016.exe PID 2860 wrote to memory of 2416 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe si033198.exe PID 2860 wrote to memory of 2416 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe si033198.exe PID 2860 wrote to memory of 2416 2860 43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe si033198.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe"C:\Users\Admin\AppData\Local\Temp\43ed0226db5230be57a02e9f1a3f8e1d80b6895d116f2ab21537b2f9de8983ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878415.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3016.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3016.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 15404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033198.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033198.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4948 -ip 49481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033198.exeFilesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033198.exeFilesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878415.exeFilesize
531KB
MD58354055a31d09c51af4d274019a168f4
SHA160457656c9d7b1ce122c3db182283e222d7e2a68
SHA256416a4368b079ee9767847d41963a6f59145828b2adfb4a41c2b24c861239b970
SHA5128e1d18b56f747598b3896d565f7aa13f5745fcf7dbceffcad5a87c613e1b039911e1be535833168fef15ed8aa577d020ab9fdde1b64d7fb9929ee8446473c351
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878415.exeFilesize
531KB
MD58354055a31d09c51af4d274019a168f4
SHA160457656c9d7b1ce122c3db182283e222d7e2a68
SHA256416a4368b079ee9767847d41963a6f59145828b2adfb4a41c2b24c861239b970
SHA5128e1d18b56f747598b3896d565f7aa13f5745fcf7dbceffcad5a87c613e1b039911e1be535833168fef15ed8aa577d020ab9fdde1b64d7fb9929ee8446473c351
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2211.exeFilesize
260KB
MD5676f9aeb98f16a8fa3c4c90cb24ec31c
SHA1e84e2b7c36628d513866fe65692d88e7ddad7286
SHA2567d7a097a1ff2c2b7ed8917eceade4362fd4387249e6321b0baa22ae6d2e7e33b
SHA5127de8fd991ad1531182742936712b6e726a06e3d37ab4a9906e96a5e956c343e4c25619cb9b0287f68627d55c2453077afab363b2713d6b56b8346ed517bf62f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2211.exeFilesize
260KB
MD5676f9aeb98f16a8fa3c4c90cb24ec31c
SHA1e84e2b7c36628d513866fe65692d88e7ddad7286
SHA2567d7a097a1ff2c2b7ed8917eceade4362fd4387249e6321b0baa22ae6d2e7e33b
SHA5127de8fd991ad1531182742936712b6e726a06e3d37ab4a9906e96a5e956c343e4c25619cb9b0287f68627d55c2453077afab363b2713d6b56b8346ed517bf62f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3016.exeFilesize
318KB
MD5182b8fcfe7fee3e478276ee35d3ebce3
SHA199cf3a829b8f0bcc8e32de115b9e4d57fe090c16
SHA2561ee458776e6722404c5d624494e2c7730c8242f2e8f4b934880b190b15c5bd5f
SHA512af8ba2e2374f20fa6a398fa5b887687189109fc1474596458d07e1ad99380afc30da08878ccbfae47f92c6943a792df09e67416f0c7d068b2efc615aedccbcd9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3016.exeFilesize
318KB
MD5182b8fcfe7fee3e478276ee35d3ebce3
SHA199cf3a829b8f0bcc8e32de115b9e4d57fe090c16
SHA2561ee458776e6722404c5d624494e2c7730c8242f2e8f4b934880b190b15c5bd5f
SHA512af8ba2e2374f20fa6a398fa5b887687189109fc1474596458d07e1ad99380afc30da08878ccbfae47f92c6943a792df09e67416f0c7d068b2efc615aedccbcd9
-
memory/1968-158-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-168-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-150-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-151-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-152-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-153-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-154-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-156-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-148-0x0000000002110000-0x000000000213D000-memory.dmpFilesize
180KB
-
memory/1968-160-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-162-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-164-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-166-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-149-0x0000000004A40000-0x0000000004FE4000-memory.dmpFilesize
5.6MB
-
memory/1968-170-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-172-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-174-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-176-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-178-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-180-0x0000000004FF0000-0x0000000005002000-memory.dmpFilesize
72KB
-
memory/1968-181-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/1968-182-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-183-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-184-0x0000000004A30000-0x0000000004A40000-memory.dmpFilesize
64KB
-
memory/1968-186-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2416-1121-0x0000000000CF0000-0x0000000000D22000-memory.dmpFilesize
200KB
-
memory/2416-1122-0x0000000005600000-0x0000000005610000-memory.dmpFilesize
64KB
-
memory/4948-191-0x00000000008A0000-0x00000000008EB000-memory.dmpFilesize
300KB
-
memory/4948-223-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-195-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-194-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-197-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-199-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-201-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-203-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-205-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-207-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-209-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-211-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-213-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-215-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-217-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-219-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-221-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-193-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-225-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-227-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/4948-1100-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/4948-1101-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4948-1102-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4948-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4948-1104-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4948-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4948-1108-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/4948-1109-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/4948-1110-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-1111-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-1112-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-192-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4948-1113-0x0000000006D00000-0x0000000006D76000-memory.dmpFilesize
472KB
-
memory/4948-1114-0x0000000006D80000-0x0000000006DD0000-memory.dmpFilesize
320KB
-
memory/4948-1115-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB