Analysis
-
max time kernel
64s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:52
Static task
static1
Behavioral task
behavioral1
Sample
fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe
Resource
win10v2004-20230220-en
General
-
Target
fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe
-
Size
671KB
-
MD5
6bf949aea015e7c9a1f65a3da81cfff7
-
SHA1
05fd56c2822e2e2b68e76fefcf4925b302902ecd
-
SHA256
fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4
-
SHA512
63d403dfb3121074535a4bfe4cf0b371dffb3644719b5f8673f01d44bb7e8752139f9dacbfb7251b1b0d2233598a1c2ccbac3851113a3fb3ef82bd157891b816
-
SSDEEP
12288:8Mroy9059765M8jphx9qta6C0hi/fzYwC3LqqcM0ham:MyG765MEhx9Oa63hi/fDC3Gqf0Qm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9908.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9908.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9908.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-193-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-195-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-197-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-199-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-201-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-203-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-205-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-207-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-209-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-211-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-213-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-215-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-217-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-219-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-225-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-223-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-227-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/2112-221-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un924558.exepro9908.exequ8891.exesi058683.exepid process 704 un924558.exe 4124 pro9908.exe 2112 qu8891.exe 2652 si058683.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9908.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9908.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exeun924558.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un924558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un924558.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5108 4124 WerFault.exe pro9908.exe 2960 2112 WerFault.exe qu8891.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9908.exequ8891.exesi058683.exepid process 4124 pro9908.exe 4124 pro9908.exe 2112 qu8891.exe 2112 qu8891.exe 2652 si058683.exe 2652 si058683.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9908.exequ8891.exesi058683.exedescription pid process Token: SeDebugPrivilege 4124 pro9908.exe Token: SeDebugPrivilege 2112 qu8891.exe Token: SeDebugPrivilege 2652 si058683.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exeun924558.exedescription pid process target process PID 2088 wrote to memory of 704 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe un924558.exe PID 2088 wrote to memory of 704 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe un924558.exe PID 2088 wrote to memory of 704 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe un924558.exe PID 704 wrote to memory of 4124 704 un924558.exe pro9908.exe PID 704 wrote to memory of 4124 704 un924558.exe pro9908.exe PID 704 wrote to memory of 4124 704 un924558.exe pro9908.exe PID 704 wrote to memory of 2112 704 un924558.exe qu8891.exe PID 704 wrote to memory of 2112 704 un924558.exe qu8891.exe PID 704 wrote to memory of 2112 704 un924558.exe qu8891.exe PID 2088 wrote to memory of 2652 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe si058683.exe PID 2088 wrote to memory of 2652 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe si058683.exe PID 2088 wrote to memory of 2652 2088 fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe si058683.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe"C:\Users\Admin\AppData\Local\Temp\fee13bc6d167a20e3187066e782736c5f551a4210e10239ade376736cbf7d3e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9908.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9908.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 11084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 16284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058683.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058683.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2112 -ip 21121⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058683.exeFilesize
175KB
MD5d7f811f4f890ad58498a5f81815aa57a
SHA16bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4
SHA25658b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d
SHA5120dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058683.exeFilesize
175KB
MD5d7f811f4f890ad58498a5f81815aa57a
SHA16bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4
SHA25658b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d
SHA5120dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924558.exeFilesize
530KB
MD5589a7560892f24281e228d90c5eb90ae
SHA1313690ec82efab7809c17b3fd57124dd9c062aae
SHA256bf758372c99a79b45400d784a717e00bae57762337078d840408ae9c7b72c557
SHA512d8fdcbfe85b46fd376fd740e451aa996a6ce943283d7e6f1c2a60c67b38d3345807c5a73a1fefd469566e24e65c453168c57d06b759f595a7b419f7c560a197c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924558.exeFilesize
530KB
MD5589a7560892f24281e228d90c5eb90ae
SHA1313690ec82efab7809c17b3fd57124dd9c062aae
SHA256bf758372c99a79b45400d784a717e00bae57762337078d840408ae9c7b72c557
SHA512d8fdcbfe85b46fd376fd740e451aa996a6ce943283d7e6f1c2a60c67b38d3345807c5a73a1fefd469566e24e65c453168c57d06b759f595a7b419f7c560a197c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9908.exeFilesize
301KB
MD5bf6939562797669cc09e925b6e78485b
SHA19fd56cebc2d6c93a8f5b1e4f13383d834ae61b9b
SHA2563a48fcbc915243f7413b1bac45aed2873a7130e3c93d8e8901e4904cbb083f3f
SHA51255a3dc00aa2d7be3b4b358b789c2aed5f6d9fca8e88cc3f7c26a9daa0b0e1468465fcb794578f5116a376e0b294208ea34903ec63e4d9af88a813ec3fc68462d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9908.exeFilesize
301KB
MD5bf6939562797669cc09e925b6e78485b
SHA19fd56cebc2d6c93a8f5b1e4f13383d834ae61b9b
SHA2563a48fcbc915243f7413b1bac45aed2873a7130e3c93d8e8901e4904cbb083f3f
SHA51255a3dc00aa2d7be3b4b358b789c2aed5f6d9fca8e88cc3f7c26a9daa0b0e1468465fcb794578f5116a376e0b294208ea34903ec63e4d9af88a813ec3fc68462d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exeFilesize
359KB
MD5de3308bced02fa5ad7c0a187cb0cad1b
SHA126853dc332b369ceb98a85019d3c3eb34b0b7336
SHA2565e51eac56344739b194d281676638bbd9ba3511d14640866820ea6342ee0a021
SHA51232931d109c7e2436b6732b0f6fb143d031089034f57c4934b5d49f3b74419632ca331c1c2f458eeed1bab6250698097692449bc226ed862dac913db4e0e31bbb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exeFilesize
359KB
MD5de3308bced02fa5ad7c0a187cb0cad1b
SHA126853dc332b369ceb98a85019d3c3eb34b0b7336
SHA2565e51eac56344739b194d281676638bbd9ba3511d14640866820ea6342ee0a021
SHA51232931d109c7e2436b6732b0f6fb143d031089034f57c4934b5d49f3b74419632ca331c1c2f458eeed1bab6250698097692449bc226ed862dac913db4e0e31bbb
-
memory/2112-1102-0x0000000006230000-0x0000000006242000-memory.dmpFilesize
72KB
-
memory/2112-1101-0x0000000006F30000-0x000000000703A000-memory.dmpFilesize
1.0MB
-
memory/2112-219-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-217-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-201-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-203-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-1115-0x0000000008160000-0x000000000868C000-memory.dmpFilesize
5.2MB
-
memory/2112-1114-0x0000000007F90000-0x0000000008152000-memory.dmpFilesize
1.8MB
-
memory/2112-1113-0x0000000007E00000-0x0000000007E50000-memory.dmpFilesize
320KB
-
memory/2112-1112-0x0000000007D70000-0x0000000007DE6000-memory.dmpFilesize
472KB
-
memory/2112-205-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-1111-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-1110-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-1109-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-1108-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-1107-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/2112-1106-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/2112-1104-0x0000000007040000-0x000000000707C000-memory.dmpFilesize
240KB
-
memory/2112-1103-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-225-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-1100-0x0000000006910000-0x0000000006F28000-memory.dmpFilesize
6.1MB
-
memory/2112-221-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-190-0x0000000001C50000-0x0000000001C9B000-memory.dmpFilesize
300KB
-
memory/2112-192-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-191-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-193-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-195-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-194-0x0000000006250000-0x0000000006260000-memory.dmpFilesize
64KB
-
memory/2112-197-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-199-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-215-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-227-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-223-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-207-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-209-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-211-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2112-213-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/2652-1121-0x00000000002B0000-0x00000000002E2000-memory.dmpFilesize
200KB
-
memory/2652-1122-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2652-1123-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4124-181-0x0000000003C00000-0x0000000003C10000-memory.dmpFilesize
64KB
-
memory/4124-171-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-150-0x0000000003C00000-0x0000000003C10000-memory.dmpFilesize
64KB
-
memory/4124-151-0x0000000003C00000-0x0000000003C10000-memory.dmpFilesize
64KB
-
memory/4124-152-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-185-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/4124-149-0x0000000003740000-0x000000000376D000-memory.dmpFilesize
180KB
-
memory/4124-183-0x0000000003C00000-0x0000000003C10000-memory.dmpFilesize
64KB
-
memory/4124-182-0x0000000003C00000-0x0000000003C10000-memory.dmpFilesize
64KB
-
memory/4124-153-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-180-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/4124-179-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-177-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-175-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-173-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-169-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-167-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-165-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-163-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-161-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-148-0x00000000061B0000-0x0000000006754000-memory.dmpFilesize
5.6MB
-
memory/4124-159-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-157-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB
-
memory/4124-155-0x0000000006760000-0x0000000006772000-memory.dmpFilesize
72KB