Analysis
-
max time kernel
89s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:12
Static task
static1
Behavioral task
behavioral1
Sample
ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe
Resource
win10v2004-20230220-en
General
-
Target
ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe
-
Size
660KB
-
MD5
3ff2a06d73f6a9253baa59e3195e7f93
-
SHA1
8ea51d6e736412eae7487561c47506aa325f8a30
-
SHA256
ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683
-
SHA512
5665fd3527178c6254502ac9d180ee8a122668c8b92162beeeb3de097ad1c1b5403ba5ae3ba81410964f0452f69e18217e54af858f0b09293103288516d63f40
-
SSDEEP
12288:hMrOy90fC4xhaU30+078p8POR+4MLPtLel9CJfqft/juKJum:zy3+w+dR+TLPtOEJyBDum
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0226.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0226.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2628-193-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-194-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-196-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-198-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-202-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-200-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-204-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-206-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-208-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-210-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-212-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-214-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-216-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-218-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-220-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-222-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-224-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/2628-445-0x00000000022E0000-0x00000000022F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un464449.exepro0226.exequ4791.exesi706977.exepid process 4284 un464449.exe 2164 pro0226.exe 2628 qu4791.exe 4756 si706977.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0226.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0226.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exeun464449.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un464449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un464449.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1468 2164 WerFault.exe pro0226.exe 3768 2628 WerFault.exe qu4791.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0226.exequ4791.exesi706977.exepid process 2164 pro0226.exe 2164 pro0226.exe 2628 qu4791.exe 2628 qu4791.exe 4756 si706977.exe 4756 si706977.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0226.exequ4791.exesi706977.exedescription pid process Token: SeDebugPrivilege 2164 pro0226.exe Token: SeDebugPrivilege 2628 qu4791.exe Token: SeDebugPrivilege 4756 si706977.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exeun464449.exedescription pid process target process PID 852 wrote to memory of 4284 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe un464449.exe PID 852 wrote to memory of 4284 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe un464449.exe PID 852 wrote to memory of 4284 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe un464449.exe PID 4284 wrote to memory of 2164 4284 un464449.exe pro0226.exe PID 4284 wrote to memory of 2164 4284 un464449.exe pro0226.exe PID 4284 wrote to memory of 2164 4284 un464449.exe pro0226.exe PID 4284 wrote to memory of 2628 4284 un464449.exe qu4791.exe PID 4284 wrote to memory of 2628 4284 un464449.exe qu4791.exe PID 4284 wrote to memory of 2628 4284 un464449.exe qu4791.exe PID 852 wrote to memory of 4756 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe si706977.exe PID 852 wrote to memory of 4756 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe si706977.exe PID 852 wrote to memory of 4756 852 ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe si706977.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe"C:\Users\Admin\AppData\Local\Temp\ca560ddd53cf6d764044aaccdd707f971e076dc864927f191e5b92e2f04b9683.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464449.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464449.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0226.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 10884⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4791.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 16084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706977.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2164 -ip 21641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2628 -ip 26281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706977.exeFilesize
175KB
MD5e03c39323ca06905aa9d8b23e254a6a4
SHA10d81b138f0bc2e5803990ab82688cae48c140599
SHA25633f0374b07d8909607c6c561352cd785bef7d011774a238d5677de60e761e7dd
SHA512b83f179ba298e632c9cea70dc84dae767ecbe44b52d4f6fe7a33f386a372f80804a098709d104a9293c52aa21556340ec11e1b2010d44832b94004bd4a1cecb8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706977.exeFilesize
175KB
MD5e03c39323ca06905aa9d8b23e254a6a4
SHA10d81b138f0bc2e5803990ab82688cae48c140599
SHA25633f0374b07d8909607c6c561352cd785bef7d011774a238d5677de60e761e7dd
SHA512b83f179ba298e632c9cea70dc84dae767ecbe44b52d4f6fe7a33f386a372f80804a098709d104a9293c52aa21556340ec11e1b2010d44832b94004bd4a1cecb8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464449.exeFilesize
517KB
MD54ea4370b29d26c05fd50f322e3d0cf81
SHA147b6d200cbb1b0b48823b88ac5ad6d3e21028574
SHA256aee3d00cf59b0255f55cad3d73261718e3deaaa30e4d3663ac7bed068035518c
SHA512e5f9d053147c2798540db95236e0cc48fa4f094fe0ec15ba825678dd55b6000ae8e4d5940c7390bc7792d61f0e9e51301b13a288a47d329b47c7f4ed49cddcc1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464449.exeFilesize
517KB
MD54ea4370b29d26c05fd50f322e3d0cf81
SHA147b6d200cbb1b0b48823b88ac5ad6d3e21028574
SHA256aee3d00cf59b0255f55cad3d73261718e3deaaa30e4d3663ac7bed068035518c
SHA512e5f9d053147c2798540db95236e0cc48fa4f094fe0ec15ba825678dd55b6000ae8e4d5940c7390bc7792d61f0e9e51301b13a288a47d329b47c7f4ed49cddcc1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0226.exeFilesize
237KB
MD571f4d453eb47f6a4cea3d26e292ddbe0
SHA122912062bee00f604f546292bac17747f79732f6
SHA2563928f40a893f03e94ebe1557902937f66bf9f3ee2958de0f34050f516c23b5c4
SHA512e7fa568c0e130d80cb355f123df460a97c195d4543547bd793a9e8188632824aeb459d1a12f4783af0559e4240900b60eccb0e85a3bc9d86e82e2ffadf3530a9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0226.exeFilesize
237KB
MD571f4d453eb47f6a4cea3d26e292ddbe0
SHA122912062bee00f604f546292bac17747f79732f6
SHA2563928f40a893f03e94ebe1557902937f66bf9f3ee2958de0f34050f516c23b5c4
SHA512e7fa568c0e130d80cb355f123df460a97c195d4543547bd793a9e8188632824aeb459d1a12f4783af0559e4240900b60eccb0e85a3bc9d86e82e2ffadf3530a9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4791.exeFilesize
295KB
MD54a04d897d060ffe81ad1ea3cda6cbf54
SHA1c02144bc3aa9cfaaf119400fe68687a374defc3e
SHA256b3a6663782971fdf790698dc0f2bdf95139baac382116545dde686687857733d
SHA5124be5e2f77a7a98294fea04848b49537e892cb68bfd15b952a9e4fae74e3e84f971177a304092714ff07895b5fdea11abd88b2c111ed0dbbf404ffbf0847dd7b6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4791.exeFilesize
295KB
MD54a04d897d060ffe81ad1ea3cda6cbf54
SHA1c02144bc3aa9cfaaf119400fe68687a374defc3e
SHA256b3a6663782971fdf790698dc0f2bdf95139baac382116545dde686687857733d
SHA5124be5e2f77a7a98294fea04848b49537e892cb68bfd15b952a9e4fae74e3e84f971177a304092714ff07895b5fdea11abd88b2c111ed0dbbf404ffbf0847dd7b6
-
memory/2164-148-0x0000000000620000-0x000000000064D000-memory.dmpFilesize
180KB
-
memory/2164-149-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2164-150-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2164-151-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2164-152-0x0000000004BD0000-0x0000000005174000-memory.dmpFilesize
5.6MB
-
memory/2164-153-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2164-155-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-156-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-158-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-160-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-162-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-166-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-164-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-168-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-170-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-172-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-174-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-176-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-178-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-182-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-180-0x0000000002420000-0x0000000002432000-memory.dmpFilesize
72KB
-
memory/2164-183-0x0000000000620000-0x000000000064D000-memory.dmpFilesize
180KB
-
memory/2164-184-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2164-185-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2164-188-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2628-193-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-194-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-196-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-198-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-202-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-200-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-204-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-206-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-208-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-210-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-212-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-214-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-216-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-218-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-220-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-222-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-224-0x0000000005180000-0x00000000051BF000-memory.dmpFilesize
252KB
-
memory/2628-444-0x0000000000620000-0x000000000066B000-memory.dmpFilesize
300KB
-
memory/2628-445-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-448-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-1102-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/2628-1103-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2628-1104-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2628-1105-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2628-1106-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-1108-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2628-1109-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2628-1110-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-1111-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-1112-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/2628-1113-0x0000000006690000-0x0000000006BBC000-memory.dmpFilesize
5.2MB
-
memory/2628-1114-0x00000000022E0000-0x00000000022F0000-memory.dmpFilesize
64KB
-
memory/2628-1115-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/2628-1116-0x0000000006FD0000-0x0000000007020000-memory.dmpFilesize
320KB
-
memory/4756-1122-0x00000000003A0000-0x00000000003D2000-memory.dmpFilesize
200KB
-
memory/4756-1123-0x0000000004FF0000-0x0000000005000000-memory.dmpFilesize
64KB