Analysis
-
max time kernel
87s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe
Resource
win10v2004-20230220-en
General
-
Target
12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe
-
Size
660KB
-
MD5
6912dc232b3e511609807ce1599a83ca
-
SHA1
6b44298487c25d94a3bff3485ea027841ab35ab8
-
SHA256
12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf
-
SHA512
55ea7279d06d0650b1fd7944ed1cea0f635b1bd3f2db26cebfa22a1cd6df8de965d92711d0873abfe05770e00b6dedaa4f9503723b236b966dc78d46272f8530
-
SSDEEP
12288:DMr4y90va/uMrNXD0BZnH4pZMsyeNlOkbz5r+OnS0DssrLipibaWPhsBssYRrZ:PyH3QnCZbyAOkxaCSuss6pib5hFt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3925.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3925.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3925.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-222-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-224-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-226-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2204-228-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un005501.exepro3925.exequ5468.exesi971696.exepid process 3724 un005501.exe 684 pro3925.exe 2204 qu5468.exe 4984 si971696.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3925.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3925.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3925.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exeun005501.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un005501.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un005501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4744 684 WerFault.exe pro3925.exe 4600 2204 WerFault.exe qu5468.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3925.exequ5468.exesi971696.exepid process 684 pro3925.exe 684 pro3925.exe 2204 qu5468.exe 2204 qu5468.exe 4984 si971696.exe 4984 si971696.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3925.exequ5468.exesi971696.exedescription pid process Token: SeDebugPrivilege 684 pro3925.exe Token: SeDebugPrivilege 2204 qu5468.exe Token: SeDebugPrivilege 4984 si971696.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exeun005501.exedescription pid process target process PID 1836 wrote to memory of 3724 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe un005501.exe PID 1836 wrote to memory of 3724 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe un005501.exe PID 1836 wrote to memory of 3724 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe un005501.exe PID 3724 wrote to memory of 684 3724 un005501.exe pro3925.exe PID 3724 wrote to memory of 684 3724 un005501.exe pro3925.exe PID 3724 wrote to memory of 684 3724 un005501.exe pro3925.exe PID 3724 wrote to memory of 2204 3724 un005501.exe qu5468.exe PID 3724 wrote to memory of 2204 3724 un005501.exe qu5468.exe PID 3724 wrote to memory of 2204 3724 un005501.exe qu5468.exe PID 1836 wrote to memory of 4984 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe si971696.exe PID 1836 wrote to memory of 4984 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe si971696.exe PID 1836 wrote to memory of 4984 1836 12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe si971696.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe"C:\Users\Admin\AppData\Local\Temp\12676c46ce969b33f462e9e4a0bbb9e972b10ccbb6f7c7270f46063cbc273fbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005501.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3925.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 10804⤵
- Program crash
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5468.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5468.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 13284⤵
- Program crash
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971696.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 684 -ip 6841⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2204 -ip 22041⤵PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971696.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971696.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005501.exeFilesize
518KB
MD54744a08d7508e0c33d163f4b0b5c78a2
SHA16b0e05b54c15723c2809d89ec1f2e10785baf1bd
SHA256eb1ff06bdac1dfd357c9a37f979492c96dd021a3e5ac8f1edb2317ba683c6939
SHA512f3bd9f270a5c7e7b8c3bcc3e56430bd5f9265de4b961067c7feb8bc7660cfbdcdb881989c59cc62c4a4090e97663b893ceb61bea1135efffdbcf8d4ac4576568
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005501.exeFilesize
518KB
MD54744a08d7508e0c33d163f4b0b5c78a2
SHA16b0e05b54c15723c2809d89ec1f2e10785baf1bd
SHA256eb1ff06bdac1dfd357c9a37f979492c96dd021a3e5ac8f1edb2317ba683c6939
SHA512f3bd9f270a5c7e7b8c3bcc3e56430bd5f9265de4b961067c7feb8bc7660cfbdcdb881989c59cc62c4a4090e97663b893ceb61bea1135efffdbcf8d4ac4576568
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3925.exeFilesize
236KB
MD5ce0198e82370ac6c04b4f8cab6afca28
SHA1891295e8a999134171fab26fef6aab79ab00baed
SHA256cb940ab181710dd988234caebc5686f594a0de414d0abaacc6f1e57dd3e0f7ef
SHA51203762989f4936f368a81572acfc52072b985683c95e758a4561a7c6d49f08740d98ce57d4f3b388cf92cf3d2fdb26e6d794b046171a25b55babb30b148647c02
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3925.exeFilesize
236KB
MD5ce0198e82370ac6c04b4f8cab6afca28
SHA1891295e8a999134171fab26fef6aab79ab00baed
SHA256cb940ab181710dd988234caebc5686f594a0de414d0abaacc6f1e57dd3e0f7ef
SHA51203762989f4936f368a81572acfc52072b985683c95e758a4561a7c6d49f08740d98ce57d4f3b388cf92cf3d2fdb26e6d794b046171a25b55babb30b148647c02
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5468.exeFilesize
295KB
MD5f70a5d2532118a13c0038423341470de
SHA14365acacc2c23265448141adfdfd509a1befcd92
SHA256890fdc5d2973be1f6984c131509d8e88d0a27c2f2aa3ba295c8ad66841193d49
SHA512917bb37a9909e7fa1453c981490a023f7ad578327d1deb96108b083f708a9a949a5d653d26fe08b3dce73d652f0134d441850dc14300a6c0c8f683abee67b49b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5468.exeFilesize
295KB
MD5f70a5d2532118a13c0038423341470de
SHA14365acacc2c23265448141adfdfd509a1befcd92
SHA256890fdc5d2973be1f6984c131509d8e88d0a27c2f2aa3ba295c8ad66841193d49
SHA512917bb37a9909e7fa1453c981490a023f7ad578327d1deb96108b083f708a9a949a5d653d26fe08b3dce73d652f0134d441850dc14300a6c0c8f683abee67b49b
-
memory/684-148-0x00000000004F0000-0x000000000051D000-memory.dmpFilesize
180KB
-
memory/684-149-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-150-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-151-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-152-0x00000000049F0000-0x0000000004F94000-memory.dmpFilesize
5.6MB
-
memory/684-153-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-154-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-156-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-158-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-160-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-162-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-164-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-166-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-168-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-170-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-172-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-174-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-176-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-178-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-180-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/684-181-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/684-182-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-183-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-184-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB
-
memory/684-186-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/2204-192-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-191-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-195-0x0000000002100000-0x000000000214B000-memory.dmpFilesize
300KB
-
memory/2204-197-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-194-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-199-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-201-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-204-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-202-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-198-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-206-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-208-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-210-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-212-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-214-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-216-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-218-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-220-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-222-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-224-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-226-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-228-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/2204-1101-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/2204-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/2204-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/2204-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/2204-1105-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-1106-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/2204-1108-0x0000000006280000-0x0000000006312000-memory.dmpFilesize
584KB
-
memory/2204-1109-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/2204-1110-0x0000000006540000-0x0000000006A6C000-memory.dmpFilesize
5.2MB
-
memory/2204-1111-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-1112-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/2204-1113-0x0000000006BC0000-0x0000000006C36000-memory.dmpFilesize
472KB
-
memory/2204-1114-0x0000000006C40000-0x0000000006C90000-memory.dmpFilesize
320KB
-
memory/2204-1115-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4984-1121-0x0000000000CB0000-0x0000000000CE2000-memory.dmpFilesize
200KB
-
memory/4984-1122-0x0000000002FD0000-0x0000000002FE0000-memory.dmpFilesize
64KB
-
memory/4984-1123-0x0000000002FD0000-0x0000000002FE0000-memory.dmpFilesize
64KB