Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 21:04
Static task
static1
Behavioral task
behavioral1
Sample
8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe
Resource
win10v2004-20230220-en
General
-
Target
8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe
-
Size
671KB
-
MD5
5a501c16bb83b2ca1da4f208553b0f3e
-
SHA1
2cc131d46c000ca28a23f04451e60111a928505e
-
SHA256
8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96
-
SHA512
ddc1f4d91c259285734af93bba882c1c556e9e222c09fd725b032133182ed39421373c6c4a4fe8912d75dcd7e3fe05a67ef2cb66a191a625a17db232ff065ee1
-
SSDEEP
12288:UMrMy90QFG+tO0fgPNp4pJ+Hr29whQ3LqN8QYRAes:AybFG+tO0fBIHa9AQ3GNbAs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4451.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4451.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4451.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-192-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-194-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-191-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-196-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-202-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-201-0x00000000062B0000-0x00000000062C0000-memory.dmp family_redline behavioral1/memory/3048-198-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-206-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-208-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-210-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-212-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-214-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-216-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-218-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-220-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-222-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-224-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-226-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/3048-228-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un035802.exepro4451.exequ7113.exesi076329.exepid process 548 un035802.exe 3396 pro4451.exe 3048 qu7113.exe 3848 si076329.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4451.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4451.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exeun035802.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un035802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un035802.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4976 3396 WerFault.exe pro4451.exe 228 3048 WerFault.exe qu7113.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4451.exequ7113.exesi076329.exepid process 3396 pro4451.exe 3396 pro4451.exe 3048 qu7113.exe 3048 qu7113.exe 3848 si076329.exe 3848 si076329.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4451.exequ7113.exesi076329.exedescription pid process Token: SeDebugPrivilege 3396 pro4451.exe Token: SeDebugPrivilege 3048 qu7113.exe Token: SeDebugPrivilege 3848 si076329.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exeun035802.exedescription pid process target process PID 800 wrote to memory of 548 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe un035802.exe PID 800 wrote to memory of 548 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe un035802.exe PID 800 wrote to memory of 548 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe un035802.exe PID 548 wrote to memory of 3396 548 un035802.exe pro4451.exe PID 548 wrote to memory of 3396 548 un035802.exe pro4451.exe PID 548 wrote to memory of 3396 548 un035802.exe pro4451.exe PID 548 wrote to memory of 3048 548 un035802.exe qu7113.exe PID 548 wrote to memory of 3048 548 un035802.exe qu7113.exe PID 548 wrote to memory of 3048 548 un035802.exe qu7113.exe PID 800 wrote to memory of 3848 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe si076329.exe PID 800 wrote to memory of 3848 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe si076329.exe PID 800 wrote to memory of 3848 800 8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe si076329.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe"C:\Users\Admin\AppData\Local\Temp\8f85b980bd600262ce28a0236e9536b7b2159cca23f485885de54c50ce677a96.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4451.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 15124⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076329.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076329.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3396 -ip 33961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3048 -ip 30481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076329.exeFilesize
175KB
MD5a849f7dbdde17b9871a353549fadcf86
SHA1aedfdd768762a736db16d2a0b09b88058917a52a
SHA2569e1028bccedd31469b9370585e3bc4b35c31e42467ae36872b3c147a7a634e88
SHA512f8341cbebd8bbf41cc8f0c8b3802595da08f5771a15a559674405d0b462d8f3fd6be4ab8ced53d908e8c5ab5280f27cd91cab6d540649d9eeb79c8e2396e11ad
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076329.exeFilesize
175KB
MD5a849f7dbdde17b9871a353549fadcf86
SHA1aedfdd768762a736db16d2a0b09b88058917a52a
SHA2569e1028bccedd31469b9370585e3bc4b35c31e42467ae36872b3c147a7a634e88
SHA512f8341cbebd8bbf41cc8f0c8b3802595da08f5771a15a559674405d0b462d8f3fd6be4ab8ced53d908e8c5ab5280f27cd91cab6d540649d9eeb79c8e2396e11ad
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035802.exeFilesize
529KB
MD596885f76350ae58544eb3b1b3f1f2ece
SHA19fec4383c6799cfc3165f483250693719b56760f
SHA2560c7bf5a0ac0c0967bc8c9f321f82929b2065d9860ca00be6da7f0f8dad5844ee
SHA512ce90c5c42e069ba3857b381f126f784ba64e6486333b02552246275c68e9a5e8b60bb5c1de812532d394e8cc45ff9d92d1fbb1392d15bd44f44efdbe301b6b25
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035802.exeFilesize
529KB
MD596885f76350ae58544eb3b1b3f1f2ece
SHA19fec4383c6799cfc3165f483250693719b56760f
SHA2560c7bf5a0ac0c0967bc8c9f321f82929b2065d9860ca00be6da7f0f8dad5844ee
SHA512ce90c5c42e069ba3857b381f126f784ba64e6486333b02552246275c68e9a5e8b60bb5c1de812532d394e8cc45ff9d92d1fbb1392d15bd44f44efdbe301b6b25
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4451.exeFilesize
301KB
MD5983b7a315cfaa118ebce063cee6bd94d
SHA11a8df768a7877decf09e80a24f0ca6daefe652e9
SHA256f682b289a71ce118a7d4f74885d04eb6aaa47cc980b6d2b555146bf2d9e67732
SHA512082217de4c7fc2501c7ec4838218bb74059a1897b67b979dbd20c12d1574bd4ca3506c480fa8ce344f36d0a6f51b8c0b02c195a1dfd71b5884552ef7f56125a3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4451.exeFilesize
301KB
MD5983b7a315cfaa118ebce063cee6bd94d
SHA11a8df768a7877decf09e80a24f0ca6daefe652e9
SHA256f682b289a71ce118a7d4f74885d04eb6aaa47cc980b6d2b555146bf2d9e67732
SHA512082217de4c7fc2501c7ec4838218bb74059a1897b67b979dbd20c12d1574bd4ca3506c480fa8ce344f36d0a6f51b8c0b02c195a1dfd71b5884552ef7f56125a3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exeFilesize
359KB
MD5e638010a101741e4651cf435274f2a2d
SHA17d0d4c22359a6c56019f0117e546e570ef177e03
SHA256974afc0f483d230d21cd44b377997c1fcfe22845fbdd79f558336f4b01a8bb69
SHA51291fb3e8ae57d303ca98791ed4c1aa4451848ffa9194369ae5e0874197250522738c033046d5f7621b3b7803b22e6d2cb409d2e0230490cec3809039eabaab3b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exeFilesize
359KB
MD5e638010a101741e4651cf435274f2a2d
SHA17d0d4c22359a6c56019f0117e546e570ef177e03
SHA256974afc0f483d230d21cd44b377997c1fcfe22845fbdd79f558336f4b01a8bb69
SHA51291fb3e8ae57d303ca98791ed4c1aa4451848ffa9194369ae5e0874197250522738c033046d5f7621b3b7803b22e6d2cb409d2e0230490cec3809039eabaab3b1
-
memory/3048-1102-0x0000000006EE0000-0x0000000006FEA000-memory.dmpFilesize
1.0MB
-
memory/3048-226-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-201-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-198-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-1115-0x0000000007DB0000-0x00000000082DC000-memory.dmpFilesize
5.2MB
-
memory/3048-1114-0x0000000007BE0000-0x0000000007DA2000-memory.dmpFilesize
1.8MB
-
memory/3048-1113-0x0000000007B60000-0x0000000007BB0000-memory.dmpFilesize
320KB
-
memory/3048-1112-0x0000000007AD0000-0x0000000007B46000-memory.dmpFilesize
472KB
-
memory/3048-1111-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-1110-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-206-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-1109-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-1108-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/3048-1107-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/3048-1105-0x0000000007040000-0x000000000707C000-memory.dmpFilesize
240KB
-
memory/3048-1104-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-1103-0x0000000007020000-0x0000000007032000-memory.dmpFilesize
72KB
-
memory/3048-1101-0x0000000006870000-0x0000000006E88000-memory.dmpFilesize
6.1MB
-
memory/3048-228-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-214-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-224-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-222-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-220-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-192-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-194-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-191-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-196-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-199-0x0000000001B90000-0x0000000001BDB000-memory.dmpFilesize
300KB
-
memory/3048-202-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-203-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-218-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-1116-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-216-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-208-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-205-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/3048-210-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3048-212-0x0000000003AB0000-0x0000000003AEF000-memory.dmpFilesize
252KB
-
memory/3396-181-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/3396-173-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-148-0x0000000001C50000-0x0000000001C7D000-memory.dmpFilesize
180KB
-
memory/3396-151-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-153-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-186-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/3396-185-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-184-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-183-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-150-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-155-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-180-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-178-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-179-0x0000000006240000-0x0000000006250000-memory.dmpFilesize
64KB
-
memory/3396-177-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-175-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-169-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-171-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-167-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-165-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-163-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-161-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-159-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3396-149-0x0000000006250000-0x00000000067F4000-memory.dmpFilesize
5.6MB
-
memory/3396-157-0x0000000003950000-0x0000000003962000-memory.dmpFilesize
72KB
-
memory/3848-1122-0x0000000000E20000-0x0000000000E52000-memory.dmpFilesize
200KB
-
memory/3848-1123-0x00000000059F0000-0x0000000005A00000-memory.dmpFilesize
64KB