Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe
Resource
win10v2004-20230220-en
General
-
Target
5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe
-
Size
659KB
-
MD5
b61bad57c79e7b27abe1bac71fa87df4
-
SHA1
b14c00a3d0dbf8fb05f6d3bf616495a3f3752556
-
SHA256
5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e
-
SHA512
84f4aeaedc80db0fedb487d4957c7d4f92b6851c71144a63ac188b372ab7ef607d597b69e570e42b0cd6b70374fdfe783ac1f31cdbcd84c435caa56e278b8a32
-
SSDEEP
12288:eMrGy90XTEVncE9Cq1+NThLpPAthOTHHCD0RskrLidiraWPg9CBWeS:kyOTE5LBahLplGDksk6dir5bS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7184.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7184.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4892-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-190-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4892-223-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un611409.exepro7184.exequ6785.exesi724526.exepid process 4028 un611409.exe 3012 pro7184.exe 4892 qu6785.exe 4360 si724526.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7184.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7184.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7184.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exeun611409.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un611409.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un611409.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3092 3012 WerFault.exe pro7184.exe 4204 4892 WerFault.exe qu6785.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7184.exequ6785.exesi724526.exepid process 3012 pro7184.exe 3012 pro7184.exe 4892 qu6785.exe 4892 qu6785.exe 4360 si724526.exe 4360 si724526.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7184.exequ6785.exesi724526.exedescription pid process Token: SeDebugPrivilege 3012 pro7184.exe Token: SeDebugPrivilege 4892 qu6785.exe Token: SeDebugPrivilege 4360 si724526.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exeun611409.exedescription pid process target process PID 2100 wrote to memory of 4028 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe un611409.exe PID 2100 wrote to memory of 4028 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe un611409.exe PID 2100 wrote to memory of 4028 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe un611409.exe PID 4028 wrote to memory of 3012 4028 un611409.exe pro7184.exe PID 4028 wrote to memory of 3012 4028 un611409.exe pro7184.exe PID 4028 wrote to memory of 3012 4028 un611409.exe pro7184.exe PID 4028 wrote to memory of 4892 4028 un611409.exe qu6785.exe PID 4028 wrote to memory of 4892 4028 un611409.exe qu6785.exe PID 4028 wrote to memory of 4892 4028 un611409.exe qu6785.exe PID 2100 wrote to memory of 4360 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe si724526.exe PID 2100 wrote to memory of 4360 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe si724526.exe PID 2100 wrote to memory of 4360 2100 5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe si724526.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe"C:\Users\Admin\AppData\Local\Temp\5860438443ffb4ef8cda62c5f4df15648185446a5817793c08f8c81239fc602e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611409.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611409.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7184.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 10844⤵
- Program crash
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6785.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6785.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 19564⤵
- Program crash
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si724526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si724526.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3012 -ip 30121⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4892 -ip 48921⤵PID:3688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si724526.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si724526.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611409.exeFilesize
518KB
MD53282e699bc6a7a9cda076ecf3da05342
SHA1d6510610d123913a2610ddd957a2a69360ace739
SHA25633e58f91b6bd378ef156e0f37ba8f1df742ef7c887211241211ab1f0c787667f
SHA512f9cb7c0d3ebd4f14d7aeea8f529f11ec343ff32c71dda15d8439a6fc91fa939140091db808941f97f0d19bc80dc725560657f3dec81dae54b8ff5447b1230a83
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611409.exeFilesize
518KB
MD53282e699bc6a7a9cda076ecf3da05342
SHA1d6510610d123913a2610ddd957a2a69360ace739
SHA25633e58f91b6bd378ef156e0f37ba8f1df742ef7c887211241211ab1f0c787667f
SHA512f9cb7c0d3ebd4f14d7aeea8f529f11ec343ff32c71dda15d8439a6fc91fa939140091db808941f97f0d19bc80dc725560657f3dec81dae54b8ff5447b1230a83
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7184.exeFilesize
236KB
MD5a3f92143f88b16879e2e1f3fe02cfed7
SHA1d97a5ead852f20e5fd0a135688894882d94df89a
SHA256d27b7e3547d3c871786c2c4e1d1e3ecbaf5ebfe288bf89106eacddb5e064bd3c
SHA512b62a79428ffd0dd6ec419da76e93c09202e721dbba6de445e761fb59de297bdec71352682cbdf23082eb94f39bf9c76c5f1bb1f676d8f7dcfd8963169dae27e7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7184.exeFilesize
236KB
MD5a3f92143f88b16879e2e1f3fe02cfed7
SHA1d97a5ead852f20e5fd0a135688894882d94df89a
SHA256d27b7e3547d3c871786c2c4e1d1e3ecbaf5ebfe288bf89106eacddb5e064bd3c
SHA512b62a79428ffd0dd6ec419da76e93c09202e721dbba6de445e761fb59de297bdec71352682cbdf23082eb94f39bf9c76c5f1bb1f676d8f7dcfd8963169dae27e7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6785.exeFilesize
295KB
MD57a32b5723d09d76c165fee66f9c76680
SHA1d29522f45192af8f1c0f36fb3a564744ec67b793
SHA256ca641b75c3a3560a290c805197d11abcde730abd2a57e76eaeddb9f0be69ced2
SHA5122a73be2500087d494e94ca7e1190e5d072b55257d9e1a221b8616251a8a79c62aca3d53f7f8441ff00d6219c6fc016bdb156f67b12293fac88a9240481962777
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6785.exeFilesize
295KB
MD57a32b5723d09d76c165fee66f9c76680
SHA1d29522f45192af8f1c0f36fb3a564744ec67b793
SHA256ca641b75c3a3560a290c805197d11abcde730abd2a57e76eaeddb9f0be69ced2
SHA5122a73be2500087d494e94ca7e1190e5d072b55257d9e1a221b8616251a8a79c62aca3d53f7f8441ff00d6219c6fc016bdb156f67b12293fac88a9240481962777
-
memory/3012-148-0x0000000004D10000-0x00000000052B4000-memory.dmpFilesize
5.6MB
-
memory/3012-149-0x0000000000830000-0x000000000085D000-memory.dmpFilesize
180KB
-
memory/3012-150-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3012-151-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3012-153-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-152-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3012-154-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-156-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-158-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-162-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-160-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-164-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-166-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-168-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-170-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-172-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-174-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-176-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-178-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-180-0x0000000002460000-0x0000000002472000-memory.dmpFilesize
72KB
-
memory/3012-181-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/3012-182-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3012-183-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/3012-185-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4360-1121-0x0000000000F80000-0x0000000000FB2000-memory.dmpFilesize
200KB
-
memory/4360-1123-0x0000000005BC0000-0x0000000005BD0000-memory.dmpFilesize
64KB
-
memory/4360-1122-0x0000000005BC0000-0x0000000005BD0000-memory.dmpFilesize
64KB
-
memory/4892-195-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-335-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-197-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-199-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-201-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-203-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-205-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-207-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-209-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-211-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-213-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-215-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-217-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-219-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-221-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-223-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-329-0x0000000002120000-0x000000000216B000-memory.dmpFilesize
300KB
-
memory/4892-331-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-333-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-190-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-1100-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/4892-1101-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4892-1102-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4892-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4892-1104-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4892-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4892-1108-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/4892-1109-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/4892-1110-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-1111-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-1112-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4892-193-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-191-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4892-1113-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/4892-1114-0x0000000006FC0000-0x0000000007010000-memory.dmpFilesize
320KB
-
memory/4892-1115-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB