Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:25
Static task
static1
Behavioral task
behavioral1
Sample
df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe
Resource
win10v2004-20230220-en
General
-
Target
df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe
-
Size
659KB
-
MD5
13139c3a241221faac96e37011667093
-
SHA1
8053a52096d74894f566e2442c968214e68548d6
-
SHA256
df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0
-
SHA512
1f7846858a1a9fc41efa98d4f07736bdb94c0bcc314fbbfe03c95629699dee17d8723587d413eeda852e0f9775693e9b84638b0b1e9c8fc96b7c9c79fbc46df1
-
SSDEEP
12288:aMrAy90b0NDdp8MoPWB3vXlvSxEqFnGim7hoZE58UtBY6IEu2R:+y+Gdp8P8/lKx5Zm7hZ58aPIA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6328.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6328.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6328.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/764-191-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-190-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-193-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-195-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-197-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-199-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-202-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-205-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-209-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-211-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-213-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-215-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-217-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-219-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-221-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-223-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-225-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-227-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/764-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un386465.exepro6328.exequ7178.exesi535957.exepid process 4692 un386465.exe 5084 pro6328.exe 764 qu7178.exe 1352 si535957.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6328.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6328.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exeun386465.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un386465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un386465.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3772 5084 WerFault.exe pro6328.exe 2668 764 WerFault.exe qu7178.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6328.exequ7178.exesi535957.exepid process 5084 pro6328.exe 5084 pro6328.exe 764 qu7178.exe 764 qu7178.exe 1352 si535957.exe 1352 si535957.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6328.exequ7178.exesi535957.exedescription pid process Token: SeDebugPrivilege 5084 pro6328.exe Token: SeDebugPrivilege 764 qu7178.exe Token: SeDebugPrivilege 1352 si535957.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exeun386465.exedescription pid process target process PID 3848 wrote to memory of 4692 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe un386465.exe PID 3848 wrote to memory of 4692 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe un386465.exe PID 3848 wrote to memory of 4692 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe un386465.exe PID 4692 wrote to memory of 5084 4692 un386465.exe pro6328.exe PID 4692 wrote to memory of 5084 4692 un386465.exe pro6328.exe PID 4692 wrote to memory of 5084 4692 un386465.exe pro6328.exe PID 4692 wrote to memory of 764 4692 un386465.exe qu7178.exe PID 4692 wrote to memory of 764 4692 un386465.exe qu7178.exe PID 4692 wrote to memory of 764 4692 un386465.exe qu7178.exe PID 3848 wrote to memory of 1352 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe si535957.exe PID 3848 wrote to memory of 1352 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe si535957.exe PID 3848 wrote to memory of 1352 3848 df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe si535957.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe"C:\Users\Admin\AppData\Local\Temp\df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5084 -ip 50841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 764 -ip 7641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exeFilesize
175KB
MD5bcc1126013297b241868a23046220f1b
SHA16c11ae03ef25a1ed38c17c90b84fbd9544a001d8
SHA25650dcf3de852d023971685e6c07401141ae026d3386ac2a635da1887040e96671
SHA512e7ba77b98830b20d00c454d8ab2f9c4fe87399f40f332087a4c20754d1203c41df1d4f146a74ec538515b39a959252b03fb0c4845f6cb7dd835df3fd1bc1a35f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exeFilesize
175KB
MD5bcc1126013297b241868a23046220f1b
SHA16c11ae03ef25a1ed38c17c90b84fbd9544a001d8
SHA25650dcf3de852d023971685e6c07401141ae026d3386ac2a635da1887040e96671
SHA512e7ba77b98830b20d00c454d8ab2f9c4fe87399f40f332087a4c20754d1203c41df1d4f146a74ec538515b39a959252b03fb0c4845f6cb7dd835df3fd1bc1a35f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exeFilesize
517KB
MD5749d1ea7f40510a46b25b71025b22103
SHA1dc753e7efcb17d1e6529f4a953ae4a2c09c89a15
SHA2564fd738063a2b3e1f70afc7d6a516172473ddb12b78c440750d37c9863e04b657
SHA5125e4bc7b051bbcc003355c83c31c6997a0cdc23dafa3c735b24d75b951f7ae0f93557840a15717629519757704b614661461c9baa58db5a8c065fc05a76618bc5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exeFilesize
517KB
MD5749d1ea7f40510a46b25b71025b22103
SHA1dc753e7efcb17d1e6529f4a953ae4a2c09c89a15
SHA2564fd738063a2b3e1f70afc7d6a516172473ddb12b78c440750d37c9863e04b657
SHA5125e4bc7b051bbcc003355c83c31c6997a0cdc23dafa3c735b24d75b951f7ae0f93557840a15717629519757704b614661461c9baa58db5a8c065fc05a76618bc5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exeFilesize
236KB
MD5e0bb57a7c5de44ae1cda8f3d5f9f7a5e
SHA1646518fdc59f580db394c6b8184f7aec8bc5cbcc
SHA256a430e6f8416fe4c7384c4e2ceba8389aa6bc72c9096ad926ccd7c00243652ba4
SHA51241878c7c827c74379c033a9c3effc950753c9c90719d8c28ab9fec4167640d9dd3eda985b5069b9a740a66e41540856dde5c961612fcc21073f254922e5842db
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exeFilesize
236KB
MD5e0bb57a7c5de44ae1cda8f3d5f9f7a5e
SHA1646518fdc59f580db394c6b8184f7aec8bc5cbcc
SHA256a430e6f8416fe4c7384c4e2ceba8389aa6bc72c9096ad926ccd7c00243652ba4
SHA51241878c7c827c74379c033a9c3effc950753c9c90719d8c28ab9fec4167640d9dd3eda985b5069b9a740a66e41540856dde5c961612fcc21073f254922e5842db
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exeFilesize
294KB
MD50b1294e24c1ae97f17af6bee8400fe5d
SHA189a7616b002ecf4ca0c891062694809260395db5
SHA256bb7619ffc10b53c81db1c17e11f43b09ea0953d1f7f127076670883f4abd5d11
SHA512af58a58b83f22bc631b9a0fe3d3af87122c78aea85ad216687cf75aade012bfbf764912e4e474334100d99889ab025251d3bd61fcbef51efaf138fb191842ff3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exeFilesize
294KB
MD50b1294e24c1ae97f17af6bee8400fe5d
SHA189a7616b002ecf4ca0c891062694809260395db5
SHA256bb7619ffc10b53c81db1c17e11f43b09ea0953d1f7f127076670883f4abd5d11
SHA512af58a58b83f22bc631b9a0fe3d3af87122c78aea85ad216687cf75aade012bfbf764912e4e474334100d99889ab025251d3bd61fcbef51efaf138fb191842ff3
-
memory/764-227-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-1102-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/764-1115-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-1114-0x0000000006FC0000-0x0000000007010000-memory.dmpFilesize
320KB
-
memory/764-1113-0x0000000006F20000-0x0000000006F96000-memory.dmpFilesize
472KB
-
memory/764-1112-0x00000000068D0000-0x0000000006DFC000-memory.dmpFilesize
5.2MB
-
memory/764-1111-0x00000000066F0000-0x00000000068B2000-memory.dmpFilesize
1.8MB
-
memory/764-1110-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-1109-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-1108-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/764-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/764-1104-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/764-1101-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/764-1100-0x0000000005230000-0x0000000005848000-memory.dmpFilesize
6.1MB
-
memory/764-225-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-223-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-221-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-219-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-217-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-215-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-191-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-190-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-193-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-195-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-197-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-199-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-201-0x0000000000900000-0x000000000094B000-memory.dmpFilesize
300KB
-
memory/764-202-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-205-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-209-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-208-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-206-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-204-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/764-211-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/764-213-0x0000000002500000-0x000000000253F000-memory.dmpFilesize
252KB
-
memory/1352-1121-0x0000000000EA0000-0x0000000000ED2000-memory.dmpFilesize
200KB
-
memory/1352-1122-0x00000000057E0000-0x00000000057F0000-memory.dmpFilesize
64KB
-
memory/5084-175-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-148-0x0000000000720000-0x000000000074D000-memory.dmpFilesize
180KB
-
memory/5084-183-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/5084-182-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/5084-150-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-180-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/5084-179-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/5084-155-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-178-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/5084-177-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-153-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-184-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/5084-167-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-169-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-171-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-165-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-163-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-161-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-159-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-157-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-149-0x0000000004D70000-0x0000000005314000-memory.dmpFilesize
5.6MB
-
memory/5084-173-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/5084-185-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/5084-151-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB