Analysis
-
max time kernel
49s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:44
Static task
static1
Behavioral task
behavioral1
Sample
2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe
Resource
win10v2004-20230220-en
General
-
Target
2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe
-
Size
658KB
-
MD5
fc1a0a89c9c0c043a269e2cd2ac1db8f
-
SHA1
4092b305a6ca52c669b5c85c201eb241e68c8a72
-
SHA256
2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140
-
SHA512
b5306343444a7c88404cee84426b6269b89f2318443e2a4e0015adcf600d838545a7be8e9b2151b057053a88ef595891992e944ef78af4dd0b4b644ab951d7a5
-
SSDEEP
12288:oMrIy9020prO8PC9PIujlQsGagtZe/GBP44UzWKdE8vBOm:wy9uvs7WsVgKeBQ49K5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro8059.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8059.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2660-194-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-195-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-197-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-199-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-201-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-203-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-205-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-207-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-209-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-211-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-213-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-215-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-217-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-219-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-221-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-223-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-225-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-227-0x0000000002540000-0x000000000257F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un416341.exepro8059.exequ6386.exesi284033.exepid process 2196 un416341.exe 64 pro8059.exe 2660 qu6386.exe 1564 si284033.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8059.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8059.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exeun416341.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un416341.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un416341.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2920 64 WerFault.exe pro8059.exe 2092 2660 WerFault.exe qu6386.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8059.exequ6386.exesi284033.exepid process 64 pro8059.exe 64 pro8059.exe 2660 qu6386.exe 2660 qu6386.exe 1564 si284033.exe 1564 si284033.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8059.exequ6386.exesi284033.exedescription pid process Token: SeDebugPrivilege 64 pro8059.exe Token: SeDebugPrivilege 2660 qu6386.exe Token: SeDebugPrivilege 1564 si284033.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exeun416341.exedescription pid process target process PID 2156 wrote to memory of 2196 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe un416341.exe PID 2156 wrote to memory of 2196 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe un416341.exe PID 2156 wrote to memory of 2196 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe un416341.exe PID 2196 wrote to memory of 64 2196 un416341.exe pro8059.exe PID 2196 wrote to memory of 64 2196 un416341.exe pro8059.exe PID 2196 wrote to memory of 64 2196 un416341.exe pro8059.exe PID 2196 wrote to memory of 2660 2196 un416341.exe qu6386.exe PID 2196 wrote to memory of 2660 2196 un416341.exe qu6386.exe PID 2196 wrote to memory of 2660 2196 un416341.exe qu6386.exe PID 2156 wrote to memory of 1564 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe si284033.exe PID 2156 wrote to memory of 1564 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe si284033.exe PID 2156 wrote to memory of 1564 2156 2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe si284033.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe"C:\Users\Admin\AppData\Local\Temp\2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 10884⤵
- Program crash
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 13284⤵
- Program crash
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 64 -ip 641⤵PID:180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2660 -ip 26601⤵PID:3136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exeFilesize
175KB
MD58539f630cbca59e36d390798328eed3b
SHA1237e6b3328a0648218cae4ab0d6ae018987ee55b
SHA25667c72dbcd5df3bbaa5eca78f30250fe58682626021b99bfa6c9a217472233478
SHA5126ca7255f920e591b6c2e266e5842a07ae99cc04523ab993d536c7130c8ac5784d3ff8946964582930153d714f62582622f7822b3686ab154013ccb7711ae713c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exeFilesize
175KB
MD58539f630cbca59e36d390798328eed3b
SHA1237e6b3328a0648218cae4ab0d6ae018987ee55b
SHA25667c72dbcd5df3bbaa5eca78f30250fe58682626021b99bfa6c9a217472233478
SHA5126ca7255f920e591b6c2e266e5842a07ae99cc04523ab993d536c7130c8ac5784d3ff8946964582930153d714f62582622f7822b3686ab154013ccb7711ae713c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exeFilesize
516KB
MD58eb7e2729841dac23138cead358899f9
SHA1e01f1d82351f3a02e56e962d97a0cda8bce77be3
SHA256fbddc737d082e3accb6e6724855f95fa8548643e1a64f562d2610b3b774fe38e
SHA5125a71f16a7e00bfbf20d18a8877ef01b173b9b2ad115c55cf6eadd7812a777bfebf338b1c1c5b330e67e47c0cd6dcacd0bb6de32ee24cfba4ea6aab68d6769079
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exeFilesize
516KB
MD58eb7e2729841dac23138cead358899f9
SHA1e01f1d82351f3a02e56e962d97a0cda8bce77be3
SHA256fbddc737d082e3accb6e6724855f95fa8548643e1a64f562d2610b3b774fe38e
SHA5125a71f16a7e00bfbf20d18a8877ef01b173b9b2ad115c55cf6eadd7812a777bfebf338b1c1c5b330e67e47c0cd6dcacd0bb6de32ee24cfba4ea6aab68d6769079
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exeFilesize
235KB
MD5232fc9291ac4f84c9c73be009710bb53
SHA12ff6427f19aab0988e072715a88451b6538edb28
SHA2567e1d82e9591ddb21d4aa459dd127bd3e5ab4764789b6a131a06a7a6e25d5bd7a
SHA512536f99ac0d5f52d833d0280b636faf15290266a7d28c379251d6330ae805516174e8c71b33bab7d280c7bc4ebbe643f0435071527b5dae5af31669dd10f5076c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exeFilesize
235KB
MD5232fc9291ac4f84c9c73be009710bb53
SHA12ff6427f19aab0988e072715a88451b6538edb28
SHA2567e1d82e9591ddb21d4aa459dd127bd3e5ab4764789b6a131a06a7a6e25d5bd7a
SHA512536f99ac0d5f52d833d0280b636faf15290266a7d28c379251d6330ae805516174e8c71b33bab7d280c7bc4ebbe643f0435071527b5dae5af31669dd10f5076c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exeFilesize
294KB
MD5a7219de101bb9996f0d4273d87ec83cc
SHA1a68a90d5cf6ce1fe9b017f522b2af6fac5861026
SHA256df77a2596a212a2351d28289965df9343e567693367a8d3035f2b041e0977585
SHA5129200deb64fc4b6b17db94a54cff39dbde327544ed6d714b5e21c7fc44d3cd8c68e9948cdfbde424d308450643fc38c3f419ea43990e11afd896f41982c899216
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exeFilesize
294KB
MD5a7219de101bb9996f0d4273d87ec83cc
SHA1a68a90d5cf6ce1fe9b017f522b2af6fac5861026
SHA256df77a2596a212a2351d28289965df9343e567693367a8d3035f2b041e0977585
SHA5129200deb64fc4b6b17db94a54cff39dbde327544ed6d714b5e21c7fc44d3cd8c68e9948cdfbde424d308450643fc38c3f419ea43990e11afd896f41982c899216
-
memory/64-148-0x0000000004C30000-0x00000000051D4000-memory.dmpFilesize
5.6MB
-
memory/64-149-0x0000000000610000-0x000000000063D000-memory.dmpFilesize
180KB
-
memory/64-150-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-151-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-152-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-153-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-154-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-156-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-158-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-160-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-164-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-162-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-172-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-174-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-178-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-176-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-180-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-170-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-168-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-166-0x0000000002520000-0x0000000002532000-memory.dmpFilesize
72KB
-
memory/64-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/64-182-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-183-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-184-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/64-186-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/1564-1123-0x0000000000A40000-0x0000000000A72000-memory.dmpFilesize
200KB
-
memory/1564-1124-0x00000000056D0000-0x00000000056E0000-memory.dmpFilesize
64KB
-
memory/2660-193-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-227-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-194-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-195-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-197-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-199-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-201-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-203-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-205-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-207-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-209-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-211-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-213-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-215-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-217-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-219-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-221-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-223-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-225-0x0000000002540000-0x000000000257F000-memory.dmpFilesize
252KB
-
memory/2660-192-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-416-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-1101-0x0000000005230000-0x0000000005848000-memory.dmpFilesize
6.1MB
-
memory/2660-1102-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2660-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2660-1104-0x0000000005A40000-0x0000000005A7C000-memory.dmpFilesize
240KB
-
memory/2660-1105-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-1107-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-1108-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-1109-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-1110-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/2660-1111-0x00000000063C0000-0x0000000006452000-memory.dmpFilesize
584KB
-
memory/2660-1112-0x00000000065B0000-0x0000000006772000-memory.dmpFilesize
1.8MB
-
memory/2660-1113-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/2660-191-0x0000000000560000-0x00000000005AB000-memory.dmpFilesize
300KB
-
memory/2660-1114-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/2660-1115-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/2660-1116-0x0000000006FD0000-0x0000000007020000-memory.dmpFilesize
320KB