Analysis
-
max time kernel
72s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe
Resource
win10v2004-20230220-en
General
-
Target
0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe
-
Size
671KB
-
MD5
bacc34583a7533d3446910b535a8f779
-
SHA1
4741a4dc825b434f7502b4e89c771af53cae8475
-
SHA256
0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009
-
SHA512
191af13df842a3f86de0106b5abe77154dbccfce4848da1658f9aa914bdbe0622f572f7ca400d53f39cf05ed68fdef5e2e8e87233ddb20b1e79edd3721dcb784
-
SSDEEP
12288:YMrWy90iYDIwfqkOCa500fgw5BU+O2IET23Lq+NCIs1u:OynYDIb4a500fAsIG23G+oN1u
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2449.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2449.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2449.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3876-191-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-192-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-194-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-196-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-198-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-200-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-202-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-204-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-206-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-209-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-212-0x00000000061C0000-0x00000000061D0000-memory.dmp family_redline behavioral1/memory/3876-213-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-216-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-218-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-220-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-224-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-222-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-226-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline behavioral1/memory/3876-228-0x0000000003C50000-0x0000000003C8F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un462383.exepro2449.exequ8854.exesi057711.exepid process 1308 un462383.exe 4680 pro2449.exe 3876 qu8854.exe 2280 si057711.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2449.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2449.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un462383.exe0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un462383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un462383.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 648 4680 WerFault.exe pro2449.exe 2572 3876 WerFault.exe qu8854.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2449.exequ8854.exesi057711.exepid process 4680 pro2449.exe 4680 pro2449.exe 3876 qu8854.exe 3876 qu8854.exe 2280 si057711.exe 2280 si057711.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2449.exequ8854.exesi057711.exedescription pid process Token: SeDebugPrivilege 4680 pro2449.exe Token: SeDebugPrivilege 3876 qu8854.exe Token: SeDebugPrivilege 2280 si057711.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exeun462383.exedescription pid process target process PID 1716 wrote to memory of 1308 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe un462383.exe PID 1716 wrote to memory of 1308 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe un462383.exe PID 1716 wrote to memory of 1308 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe un462383.exe PID 1308 wrote to memory of 4680 1308 un462383.exe pro2449.exe PID 1308 wrote to memory of 4680 1308 un462383.exe pro2449.exe PID 1308 wrote to memory of 4680 1308 un462383.exe pro2449.exe PID 1308 wrote to memory of 3876 1308 un462383.exe qu8854.exe PID 1308 wrote to memory of 3876 1308 un462383.exe qu8854.exe PID 1308 wrote to memory of 3876 1308 un462383.exe qu8854.exe PID 1716 wrote to memory of 2280 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe si057711.exe PID 1716 wrote to memory of 2280 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe si057711.exe PID 1716 wrote to memory of 2280 1716 0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe si057711.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe"C:\Users\Admin\AppData\Local\Temp\0adda150125006957cacb01497f6d331ead70de1b7c6c33ebdb33e061be34009.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un462383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un462383.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2449.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8854.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 13324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si057711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si057711.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4680 -ip 46801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3876 -ip 38761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si057711.exeFilesize
175KB
MD540213eccb61c69d5e17f4577355e98cd
SHA19ca1fa29d17882c2af121fcc3f2f349b4cca4001
SHA256726c5e51a8a3dc01b9efb920b5f7b89eac83c1cfbbb247b63a27dbbb7fa1f5fd
SHA512273176fe2bc22cd379d726327abd2b402ba23dd88f9ba35fcf02cfb074f881caa263d273df84e01988b6f0ab87fca72d147a27989183fc4589f609b626e1c97c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si057711.exeFilesize
175KB
MD540213eccb61c69d5e17f4577355e98cd
SHA19ca1fa29d17882c2af121fcc3f2f349b4cca4001
SHA256726c5e51a8a3dc01b9efb920b5f7b89eac83c1cfbbb247b63a27dbbb7fa1f5fd
SHA512273176fe2bc22cd379d726327abd2b402ba23dd88f9ba35fcf02cfb074f881caa263d273df84e01988b6f0ab87fca72d147a27989183fc4589f609b626e1c97c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un462383.exeFilesize
529KB
MD5b569ddd4c2e4dfcbf4bcfdbe4192c8a1
SHA100dd74ca68d504f5275d2b7eb53373f6c69a8215
SHA25611469b32b034782809adb07796af838064150b9a35a753f74992031c6704f758
SHA5121a714a508776a1ff0e1165c8cc85fae3e1048011a67a0036f7a775054f1f6dcbdec63f55ae715a860d1b1820406585e568d57fa8e13fb4f0bfbc167d48433630
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un462383.exeFilesize
529KB
MD5b569ddd4c2e4dfcbf4bcfdbe4192c8a1
SHA100dd74ca68d504f5275d2b7eb53373f6c69a8215
SHA25611469b32b034782809adb07796af838064150b9a35a753f74992031c6704f758
SHA5121a714a508776a1ff0e1165c8cc85fae3e1048011a67a0036f7a775054f1f6dcbdec63f55ae715a860d1b1820406585e568d57fa8e13fb4f0bfbc167d48433630
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2449.exeFilesize
301KB
MD5b5b477079366c82d70c0a9f3ea46f98c
SHA1b52527819db29f907d3ce93efbc7e94904400e78
SHA256a17283b4562436e351eabde9f07e087c1cf19ddb1fbddff3db8bec122aa0bfbd
SHA512ecd1d78aceedfa08ed4306f2a2d4a84151ae92f89d8df788bc5e5fb6a0437de16115270ed2d68f34078921317f868a9007d4d19ece2028b68b3d6b47c43391c0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2449.exeFilesize
301KB
MD5b5b477079366c82d70c0a9f3ea46f98c
SHA1b52527819db29f907d3ce93efbc7e94904400e78
SHA256a17283b4562436e351eabde9f07e087c1cf19ddb1fbddff3db8bec122aa0bfbd
SHA512ecd1d78aceedfa08ed4306f2a2d4a84151ae92f89d8df788bc5e5fb6a0437de16115270ed2d68f34078921317f868a9007d4d19ece2028b68b3d6b47c43391c0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8854.exeFilesize
359KB
MD57bfe6050cd761aec41d086a96de3408f
SHA1ac86d10d9f8e5167cba43e0051a0879dab7370f1
SHA25692c478acced9020aaf07e0ffd3b0d2002d4299622d40e838d9689d7209fca9bb
SHA512f704385ae99d9116489e7badc2ccd2b99b80f6763c3a8ed5759a9adb53da9769ff64156fcad00591201a9fb2b7f6e24f8f5b391dad777e69c62aafd349e0d799
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8854.exeFilesize
359KB
MD57bfe6050cd761aec41d086a96de3408f
SHA1ac86d10d9f8e5167cba43e0051a0879dab7370f1
SHA25692c478acced9020aaf07e0ffd3b0d2002d4299622d40e838d9689d7209fca9bb
SHA512f704385ae99d9116489e7badc2ccd2b99b80f6763c3a8ed5759a9adb53da9769ff64156fcad00591201a9fb2b7f6e24f8f5b391dad777e69c62aafd349e0d799
-
memory/2280-1122-0x0000000005160000-0x0000000005170000-memory.dmpFilesize
64KB
-
memory/2280-1121-0x0000000000890000-0x00000000008C2000-memory.dmpFilesize
200KB
-
memory/3876-226-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-1104-0x0000000006F00000-0x0000000006F3C000-memory.dmpFilesize
240KB
-
memory/3876-1115-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-1114-0x00000000084C0000-0x0000000008510000-memory.dmpFilesize
320KB
-
memory/3876-1113-0x0000000008420000-0x0000000008496000-memory.dmpFilesize
472KB
-
memory/3876-1112-0x0000000007DD0000-0x00000000082FC000-memory.dmpFilesize
5.2MB
-
memory/3876-1111-0x0000000007BF0000-0x0000000007DB2000-memory.dmpFilesize
1.8MB
-
memory/3876-1110-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-1109-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-1108-0x0000000007290000-0x00000000072F6000-memory.dmpFilesize
408KB
-
memory/3876-1107-0x00000000071F0000-0x0000000007282000-memory.dmpFilesize
584KB
-
memory/3876-1105-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-1103-0x0000000006EE0000-0x0000000006EF2000-memory.dmpFilesize
72KB
-
memory/3876-1102-0x0000000006DA0000-0x0000000006EAA000-memory.dmpFilesize
1.0MB
-
memory/3876-1101-0x0000000006780000-0x0000000006D98000-memory.dmpFilesize
6.1MB
-
memory/3876-228-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-222-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-224-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-220-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-218-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-208-0x0000000001E90000-0x0000000001EDB000-memory.dmpFilesize
300KB
-
memory/3876-191-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-192-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-194-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-196-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-198-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-200-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-202-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-204-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-206-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-209-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-210-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-212-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-214-0x00000000061C0000-0x00000000061D0000-memory.dmpFilesize
64KB
-
memory/3876-213-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/3876-216-0x0000000003C50000-0x0000000003C8F000-memory.dmpFilesize
252KB
-
memory/4680-174-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-183-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-154-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-184-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-170-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-152-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-182-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-172-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-180-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-178-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-153-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-176-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-186-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/4680-156-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-181-0x0000000000400000-0x0000000001AE3000-memory.dmpFilesize
22.9MB
-
memory/4680-168-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-166-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-164-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-162-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-160-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-158-0x0000000003D00000-0x0000000003D12000-memory.dmpFilesize
72KB
-
memory/4680-151-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-150-0x0000000006260000-0x0000000006270000-memory.dmpFilesize
64KB
-
memory/4680-149-0x0000000003610000-0x000000000363D000-memory.dmpFilesize
180KB
-
memory/4680-148-0x0000000006270000-0x0000000006814000-memory.dmpFilesize
5.6MB