Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe
Resource
win10v2004-20230220-en
General
-
Target
7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe
-
Size
660KB
-
MD5
b3a03f5b6614e14261d470e88f78f175
-
SHA1
e89997470d19af32aaf3909ca4c27ecf13d2f354
-
SHA256
7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31
-
SHA512
8594b19a4e65f02fb175b848e5afbbe71dffaaeba28227d90ebfc4f9efd8a9b5efd56f121f3021557c1e8375f07917163d59177a0e1d2a62b847396fc3cb38df
-
SSDEEP
12288:2MrKy90cxK78LquFG2zuA7ul8P3LUIijyWECxvOft/juEGj:oyS4uuFG2zulkLsBxxGBKj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1174.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1174.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1174.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4024-192-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-191-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-194-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-196-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-198-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-200-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-202-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-204-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-206-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-208-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-210-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-212-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-214-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-216-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-218-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-222-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-220-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4024-224-0x0000000002500000-0x000000000253F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un095851.exepro1174.exequ3455.exesi624596.exepid process 2244 un095851.exe 5112 pro1174.exe 4024 qu3455.exe 2696 si624596.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1174.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1174.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exeun095851.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un095851.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un095851.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4996 5112 WerFault.exe pro1174.exe 2356 4024 WerFault.exe qu3455.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1174.exequ3455.exesi624596.exepid process 5112 pro1174.exe 5112 pro1174.exe 4024 qu3455.exe 4024 qu3455.exe 2696 si624596.exe 2696 si624596.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1174.exequ3455.exesi624596.exedescription pid process Token: SeDebugPrivilege 5112 pro1174.exe Token: SeDebugPrivilege 4024 qu3455.exe Token: SeDebugPrivilege 2696 si624596.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exeun095851.exedescription pid process target process PID 3516 wrote to memory of 2244 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe un095851.exe PID 3516 wrote to memory of 2244 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe un095851.exe PID 3516 wrote to memory of 2244 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe un095851.exe PID 2244 wrote to memory of 5112 2244 un095851.exe pro1174.exe PID 2244 wrote to memory of 5112 2244 un095851.exe pro1174.exe PID 2244 wrote to memory of 5112 2244 un095851.exe pro1174.exe PID 2244 wrote to memory of 4024 2244 un095851.exe qu3455.exe PID 2244 wrote to memory of 4024 2244 un095851.exe qu3455.exe PID 2244 wrote to memory of 4024 2244 un095851.exe qu3455.exe PID 3516 wrote to memory of 2696 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe si624596.exe PID 3516 wrote to memory of 2696 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe si624596.exe PID 3516 wrote to memory of 2696 3516 7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe si624596.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe"C:\Users\Admin\AppData\Local\Temp\7ca69cae95e695611a4d22e5b0d0d67f509bcf8ee3e4c468b683b5a36ba95d31.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095851.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1174.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 11084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3455.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624596.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5112 -ip 51121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4024 -ip 40241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624596.exeFilesize
175KB
MD5467024298e0341b3dfc8f4266c488ee1
SHA13bdb6bbbdba015434c21c299fe2035afedde9db8
SHA2568c813552615ab05a2ece072ea3a2d371691a7c93a0af6f322ef25bc2e0dff41a
SHA512281c4f161bf5d67fc13a0706e3fceaabc499ef27bb73a0f89e89ab5f8a5c5cfa2a069b7d475e5233531300b0ebdc91acddea5832ab67d6f9498570b7ca02c1cf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624596.exeFilesize
175KB
MD5467024298e0341b3dfc8f4266c488ee1
SHA13bdb6bbbdba015434c21c299fe2035afedde9db8
SHA2568c813552615ab05a2ece072ea3a2d371691a7c93a0af6f322ef25bc2e0dff41a
SHA512281c4f161bf5d67fc13a0706e3fceaabc499ef27bb73a0f89e89ab5f8a5c5cfa2a069b7d475e5233531300b0ebdc91acddea5832ab67d6f9498570b7ca02c1cf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095851.exeFilesize
517KB
MD5e617f610b59bb8830f55e4c4aad30899
SHA19d826b43a6fc664423c6e0f6d3dafdba0c99b8c5
SHA256046f3b8932fc6fd395979de62154bda714345330a9644f0583e08c9379270d9e
SHA512fadcd8544a1b4681383d4cbd21d51e5ec3dff5b8627a7ddccd3aa724ac397cf3e01ae7181c3ad6d7d6a576c495dfd47e32570b9b33eb66650372b345dd1f6319
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095851.exeFilesize
517KB
MD5e617f610b59bb8830f55e4c4aad30899
SHA19d826b43a6fc664423c6e0f6d3dafdba0c99b8c5
SHA256046f3b8932fc6fd395979de62154bda714345330a9644f0583e08c9379270d9e
SHA512fadcd8544a1b4681383d4cbd21d51e5ec3dff5b8627a7ddccd3aa724ac397cf3e01ae7181c3ad6d7d6a576c495dfd47e32570b9b33eb66650372b345dd1f6319
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1174.exeFilesize
237KB
MD52abcedd184b95a85d96607f1ddc95e53
SHA12cb944e89aff4e7274c6dfe4ac17abc17198c6b8
SHA256ce04ff8491f2213d6198bd0ba0f13e1e22291e1b0db6c913253cb82f6046783e
SHA51232d13e03dc2ad3f68530cd8ccbb7c99121ba4f4f15f02349aa4e6c8e22f2ac91a13be2128bb1e850328c1ddba77a3d713cbb4f7681a430ff5303e699036334d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1174.exeFilesize
237KB
MD52abcedd184b95a85d96607f1ddc95e53
SHA12cb944e89aff4e7274c6dfe4ac17abc17198c6b8
SHA256ce04ff8491f2213d6198bd0ba0f13e1e22291e1b0db6c913253cb82f6046783e
SHA51232d13e03dc2ad3f68530cd8ccbb7c99121ba4f4f15f02349aa4e6c8e22f2ac91a13be2128bb1e850328c1ddba77a3d713cbb4f7681a430ff5303e699036334d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3455.exeFilesize
295KB
MD556c8f8d796f212dac759b99d2576aa54
SHA1fcf67c5840618007631c54d52e3dcbd421b0e0be
SHA256ef19697c78a2987b984663defc84b108782c30b50dbb1fe2bc8bebf560510e80
SHA5126121f46ebd41f2c552778fba065eb8f05dc23a40afccb9681c36117cc56660ffade98439460bc2c0d2906f9fbe913244f2155aefec5dc55cea8212ccb8daa32d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3455.exeFilesize
295KB
MD556c8f8d796f212dac759b99d2576aa54
SHA1fcf67c5840618007631c54d52e3dcbd421b0e0be
SHA256ef19697c78a2987b984663defc84b108782c30b50dbb1fe2bc8bebf560510e80
SHA5126121f46ebd41f2c552778fba065eb8f05dc23a40afccb9681c36117cc56660ffade98439460bc2c0d2906f9fbe913244f2155aefec5dc55cea8212ccb8daa32d
-
memory/2696-1125-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/2696-1124-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/2696-1123-0x0000000000C70000-0x0000000000CA2000-memory.dmpFilesize
200KB
-
memory/4024-1102-0x00000000058F0000-0x00000000059FA000-memory.dmpFilesize
1.0MB
-
memory/4024-1105-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-1116-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-1115-0x00000000067A0000-0x0000000006CCC000-memory.dmpFilesize
5.2MB
-
memory/4024-1114-0x00000000065A0000-0x0000000006762000-memory.dmpFilesize
1.8MB
-
memory/4024-1113-0x0000000006520000-0x0000000006570000-memory.dmpFilesize
320KB
-
memory/4024-1112-0x0000000006490000-0x0000000006506000-memory.dmpFilesize
472KB
-
memory/4024-1111-0x00000000063A0000-0x0000000006432000-memory.dmpFilesize
584KB
-
memory/4024-1110-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4024-1109-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-1108-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-1107-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4024-1103-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/4024-1101-0x00000000052D0000-0x00000000058E8000-memory.dmpFilesize
6.1MB
-
memory/4024-235-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-231-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-233-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4024-228-0x0000000002110000-0x000000000215B000-memory.dmpFilesize
300KB
-
memory/4024-224-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-192-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-191-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-194-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-196-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-198-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-200-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-202-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-204-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-206-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-208-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-210-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-212-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-214-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-216-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-218-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-222-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/4024-220-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/5112-174-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-183-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-154-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-184-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-172-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-182-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-153-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-170-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-180-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-158-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-178-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-176-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-186-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/5112-156-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/5112-168-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-166-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-164-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-162-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-160-0x00000000024F0000-0x0000000002502000-memory.dmpFilesize
72KB
-
memory/5112-152-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-151-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-150-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/5112-149-0x0000000004D50000-0x00000000052F4000-memory.dmpFilesize
5.6MB
-
memory/5112-148-0x0000000000650000-0x000000000067D000-memory.dmpFilesize
180KB