Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe
Resource
win10v2004-20230220-en
General
-
Target
205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe
-
Size
663KB
-
MD5
3d02776e430b3f6fa19295b8ea427e25
-
SHA1
64a5d6350b2b169ea603adaabf9a473c0207e231
-
SHA256
205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1
-
SHA512
1fc2c8a58e0a543a647d909f963fa3f944a055ee7ec0e6abc142a2f9b6902bbe3e5a967f3f9a033a361d2c17bbdbe9a811790b58c99c5fc2be16b4b076e24396
-
SSDEEP
12288:rMrey90FaYlEJpUA0KxJfe6tldjdECoS0/Lh8iAPbxv44EzWKJKaHEPDQKu:JyalYuKFegHjdKSOVKTxw4tKJKILn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5366.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4400-194-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-196-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-193-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-198-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-200-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-202-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-204-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-206-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-208-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-210-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-212-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-214-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-216-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-218-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-220-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-222-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-224-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4400-226-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un556556.exepro5366.exequ7159.exesi921735.exepid process 2180 un556556.exe 2684 pro5366.exe 4400 qu7159.exe 1208 si921735.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5366.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exeun556556.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un556556.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un556556.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1012 2684 WerFault.exe pro5366.exe 3304 4400 WerFault.exe qu7159.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5366.exequ7159.exesi921735.exepid process 2684 pro5366.exe 2684 pro5366.exe 4400 qu7159.exe 4400 qu7159.exe 1208 si921735.exe 1208 si921735.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5366.exequ7159.exesi921735.exedescription pid process Token: SeDebugPrivilege 2684 pro5366.exe Token: SeDebugPrivilege 4400 qu7159.exe Token: SeDebugPrivilege 1208 si921735.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exeun556556.exedescription pid process target process PID 3592 wrote to memory of 2180 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe un556556.exe PID 3592 wrote to memory of 2180 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe un556556.exe PID 3592 wrote to memory of 2180 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe un556556.exe PID 2180 wrote to memory of 2684 2180 un556556.exe pro5366.exe PID 2180 wrote to memory of 2684 2180 un556556.exe pro5366.exe PID 2180 wrote to memory of 2684 2180 un556556.exe pro5366.exe PID 2180 wrote to memory of 4400 2180 un556556.exe qu7159.exe PID 2180 wrote to memory of 4400 2180 un556556.exe qu7159.exe PID 2180 wrote to memory of 4400 2180 un556556.exe qu7159.exe PID 3592 wrote to memory of 1208 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe si921735.exe PID 3592 wrote to memory of 1208 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe si921735.exe PID 3592 wrote to memory of 1208 3592 205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe si921735.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe"C:\Users\Admin\AppData\Local\Temp\205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 10884⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2684 -ip 26841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4400 -ip 44001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exeFilesize
175KB
MD52f95f1c0d3405f1c16f024f7386cb6d7
SHA1e48355844a91c5d1f9092672b9a77c07d2b94b6d
SHA256a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf
SHA51274800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exeFilesize
175KB
MD52f95f1c0d3405f1c16f024f7386cb6d7
SHA1e48355844a91c5d1f9092672b9a77c07d2b94b6d
SHA256a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf
SHA51274800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exeFilesize
521KB
MD59730e6172b06801667b7d91c100494c9
SHA19d5adee03e0960f9498175bbb3eac5c45e8c0ac3
SHA256eff3e2d4cbaaa2850a4236930720ef5533ae5a5672f894f32952b0185a4375f4
SHA512813634d2fa746ad0df7ff91cadb107f1ab509794fbe7e5f4119fc654874a1f3e4d7af57e19420ee7668191b6687f213e5aaad31f0e9ef83cb8f52f547b08f048
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exeFilesize
521KB
MD59730e6172b06801667b7d91c100494c9
SHA19d5adee03e0960f9498175bbb3eac5c45e8c0ac3
SHA256eff3e2d4cbaaa2850a4236930720ef5533ae5a5672f894f32952b0185a4375f4
SHA512813634d2fa746ad0df7ff91cadb107f1ab509794fbe7e5f4119fc654874a1f3e4d7af57e19420ee7668191b6687f213e5aaad31f0e9ef83cb8f52f547b08f048
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exeFilesize
236KB
MD5f8b52dd13e5fac2b66b27e82656fbe42
SHA19dc7970327ce12d890a4fb1c7e9bcfe2c1c03e4d
SHA25629171e6e7ec3784e269ae12486d45e2d20afea7c6c8540e116277740cd2b1e03
SHA512a24863d3bb231bc97aaa7beb0c2c2541fb9b0e352a7aa41337ae7a2ded57bcc1bcdcbb6ef15d7b2b5ca306a0760c1c553ce792d1481d677d6b2590a4e38bf101
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exeFilesize
236KB
MD5f8b52dd13e5fac2b66b27e82656fbe42
SHA19dc7970327ce12d890a4fb1c7e9bcfe2c1c03e4d
SHA25629171e6e7ec3784e269ae12486d45e2d20afea7c6c8540e116277740cd2b1e03
SHA512a24863d3bb231bc97aaa7beb0c2c2541fb9b0e352a7aa41337ae7a2ded57bcc1bcdcbb6ef15d7b2b5ca306a0760c1c553ce792d1481d677d6b2590a4e38bf101
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exeFilesize
294KB
MD5cdfa29f671dba18b6a4c24a35b2b3381
SHA17f3bc1fae773382e18da84fea65a5fa2a5886a48
SHA25698dd94b8e36439f13e9a62252d6426f5dbbb9d8d245eb1c33e4247aaa4702c2e
SHA512eb03a7907e8d8f0ebd2d9e5e56b824a79c1af8ddc720236b90aeed75741cff629aac77beb52477e65b3f4cd9f7cb289749f32507a944e1a0f64a2bf47caca9c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exeFilesize
294KB
MD5cdfa29f671dba18b6a4c24a35b2b3381
SHA17f3bc1fae773382e18da84fea65a5fa2a5886a48
SHA25698dd94b8e36439f13e9a62252d6426f5dbbb9d8d245eb1c33e4247aaa4702c2e
SHA512eb03a7907e8d8f0ebd2d9e5e56b824a79c1af8ddc720236b90aeed75741cff629aac77beb52477e65b3f4cd9f7cb289749f32507a944e1a0f64a2bf47caca9c7
-
memory/1208-1120-0x0000000000940000-0x0000000000972000-memory.dmpFilesize
200KB
-
memory/1208-1121-0x0000000005250000-0x0000000005260000-memory.dmpFilesize
64KB
-
memory/2684-156-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-166-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-151-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/2684-152-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/2684-153-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-154-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-149-0x0000000002100000-0x000000000212D000-memory.dmpFilesize
180KB
-
memory/2684-158-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-160-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-162-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-164-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-150-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/2684-168-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-170-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-172-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-174-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-176-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-178-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-180-0x0000000004A10000-0x0000000004A22000-memory.dmpFilesize
72KB
-
memory/2684-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2684-182-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/2684-183-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/2684-185-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2684-148-0x0000000004BB0000-0x0000000005154000-memory.dmpFilesize
5.6MB
-
memory/4400-191-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-222-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-194-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-196-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-193-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-198-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-200-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-202-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-204-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-206-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-208-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-210-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-212-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-214-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-216-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-218-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-220-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-192-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-224-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-226-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4400-1099-0x0000000005280000-0x0000000005898000-memory.dmpFilesize
6.1MB
-
memory/4400-1100-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4400-1101-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4400-1102-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4400-1103-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-1104-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4400-1105-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4400-1106-0x0000000006490000-0x0000000006506000-memory.dmpFilesize
472KB
-
memory/4400-1107-0x0000000006520000-0x0000000006570000-memory.dmpFilesize
320KB
-
memory/4400-1108-0x0000000006690000-0x0000000006852000-memory.dmpFilesize
1.8MB
-
memory/4400-1110-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-1112-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-190-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/4400-1111-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4400-1113-0x0000000006870000-0x0000000006D9C000-memory.dmpFilesize
5.2MB
-
memory/4400-1114-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB