Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe
Resource
win10v2004-20230221-en
General
-
Target
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe
-
Size
664KB
-
MD5
91bea32ffcc395a83ccd89604f4a1a28
-
SHA1
4020865b3f373d300346b2448a4d4400060364b0
-
SHA256
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2
-
SHA512
32003e168c9e2a2a80366f8b60730113d710e64c61472ee17e5ee1b98f92741e30f34fd6a7d68d365a3e041b90b2885debb5033a8af837e1bc3773cf3cf912c9
-
SSDEEP
12288:xMrUy90y5Zz4mtJUgqn7XPQLui1mFJ64RdR0hwujdR+44tzWKPs8vGidxiP:dy/kCqnrcIr6W5SR34wKqSiP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5491.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5491.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5491.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3308-190-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-191-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-193-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-195-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-197-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-199-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-201-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-205-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-208-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline behavioral1/memory/3308-209-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-211-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-213-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-215-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-217-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-219-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-221-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-223-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-225-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3308-227-0x0000000002550000-0x000000000258F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un869024.exepro5491.exequ8192.exesi420542.exepid process 1344 un869024.exe 2160 pro5491.exe 3308 qu8192.exe 1984 si420542.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5491.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5491.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exeun869024.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un869024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un869024.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3884 2160 WerFault.exe pro5491.exe 4244 3308 WerFault.exe qu8192.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5491.exequ8192.exesi420542.exepid process 2160 pro5491.exe 2160 pro5491.exe 3308 qu8192.exe 3308 qu8192.exe 1984 si420542.exe 1984 si420542.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5491.exequ8192.exesi420542.exedescription pid process Token: SeDebugPrivilege 2160 pro5491.exe Token: SeDebugPrivilege 3308 qu8192.exe Token: SeDebugPrivilege 1984 si420542.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exeun869024.exedescription pid process target process PID 2516 wrote to memory of 1344 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe un869024.exe PID 2516 wrote to memory of 1344 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe un869024.exe PID 2516 wrote to memory of 1344 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe un869024.exe PID 1344 wrote to memory of 2160 1344 un869024.exe pro5491.exe PID 1344 wrote to memory of 2160 1344 un869024.exe pro5491.exe PID 1344 wrote to memory of 2160 1344 un869024.exe pro5491.exe PID 1344 wrote to memory of 3308 1344 un869024.exe qu8192.exe PID 1344 wrote to memory of 3308 1344 un869024.exe qu8192.exe PID 1344 wrote to memory of 3308 1344 un869024.exe qu8192.exe PID 2516 wrote to memory of 1984 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe si420542.exe PID 2516 wrote to memory of 1984 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe si420542.exe PID 2516 wrote to memory of 1984 2516 67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe si420542.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe"C:\Users\Admin\AppData\Local\Temp\67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869024.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5491.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 10844⤵
- Program crash
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8192.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 13564⤵
- Program crash
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420542.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2160 -ip 21601⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3308 -ip 33081⤵PID:1988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420542.exeFilesize
175KB
MD546537cb18caac9bec5c4c48ad5f69a61
SHA189710907366621ec00a89188ba2516e42723b686
SHA256764291621c4d5df95ea8e4432f9354d3e2a633c1dc35f4f781b7439e494839bd
SHA512df955a4262afab82790574d4dfdd3c72e238941d001e8892c38d666139f60ff7fd3b1b5ed7414392b0135c0fbb0fa467215051110b78d7ccc85e254ebbca9cf3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420542.exeFilesize
175KB
MD546537cb18caac9bec5c4c48ad5f69a61
SHA189710907366621ec00a89188ba2516e42723b686
SHA256764291621c4d5df95ea8e4432f9354d3e2a633c1dc35f4f781b7439e494839bd
SHA512df955a4262afab82790574d4dfdd3c72e238941d001e8892c38d666139f60ff7fd3b1b5ed7414392b0135c0fbb0fa467215051110b78d7ccc85e254ebbca9cf3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869024.exeFilesize
521KB
MD5a2b6760395b675e8e3d9dc9c44cb0239
SHA1d02209edf749f7ac11026975491e63d60050fdfc
SHA256f504ae8f4ef73969c065736e022e6bfc94f150a49ae3743f785ce01efd57c296
SHA512bdb19ed1ff7b4720751a79c3ff33557da204122307e920fb06f190bffe3938788f9aaa6f9e2d22e431ce4e92c6d0d13258d1c13f0f8b60320cc56f2d9ab54094
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869024.exeFilesize
521KB
MD5a2b6760395b675e8e3d9dc9c44cb0239
SHA1d02209edf749f7ac11026975491e63d60050fdfc
SHA256f504ae8f4ef73969c065736e022e6bfc94f150a49ae3743f785ce01efd57c296
SHA512bdb19ed1ff7b4720751a79c3ff33557da204122307e920fb06f190bffe3938788f9aaa6f9e2d22e431ce4e92c6d0d13258d1c13f0f8b60320cc56f2d9ab54094
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5491.exeFilesize
236KB
MD50b900a059ee6aa7b4bf5b8d631a66d10
SHA10d5c0e647e5b455de1213b9d0ec99b164121f0b9
SHA256a052131ac89937a2c42013adf04667e7b6763d6153421958809b0353be64d593
SHA512c884e569257c7b3c468674c58e72526d914903b3497cb7397ab169e8e8c7392eee84911799681fba4a2b22c58f54130c0d73f61d678402499f1cd49613cc40bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5491.exeFilesize
236KB
MD50b900a059ee6aa7b4bf5b8d631a66d10
SHA10d5c0e647e5b455de1213b9d0ec99b164121f0b9
SHA256a052131ac89937a2c42013adf04667e7b6763d6153421958809b0353be64d593
SHA512c884e569257c7b3c468674c58e72526d914903b3497cb7397ab169e8e8c7392eee84911799681fba4a2b22c58f54130c0d73f61d678402499f1cd49613cc40bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8192.exeFilesize
294KB
MD5ee8943d3c027391ae76b1abc5958b4a1
SHA18f5fd7f46685aa5a42d158e8f1743e6f13628f8f
SHA2565d85a1cc5761624ad3d214adcf8a79b6cfcbe34847bb78207f1255a01067dd77
SHA5125ed2d3955f44b0c18e94a2b094e1ee1b2e7acde8b1950472636b19d41fc3ea587e495dbb755838c0230e23d8d31c07f977bc4941586fb56c7474aabcd1fa4618
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8192.exeFilesize
294KB
MD5ee8943d3c027391ae76b1abc5958b4a1
SHA18f5fd7f46685aa5a42d158e8f1743e6f13628f8f
SHA2565d85a1cc5761624ad3d214adcf8a79b6cfcbe34847bb78207f1255a01067dd77
SHA5125ed2d3955f44b0c18e94a2b094e1ee1b2e7acde8b1950472636b19d41fc3ea587e495dbb755838c0230e23d8d31c07f977bc4941586fb56c7474aabcd1fa4618
-
memory/1984-1121-0x00000000004F0000-0x0000000000522000-memory.dmpFilesize
200KB
-
memory/1984-1122-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/2160-157-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-167-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-151-0x0000000002410000-0x0000000002420000-memory.dmpFilesize
64KB
-
memory/2160-152-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-153-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-155-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-149-0x0000000000590000-0x00000000005BD000-memory.dmpFilesize
180KB
-
memory/2160-159-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-161-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-163-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-165-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-150-0x0000000002410000-0x0000000002420000-memory.dmpFilesize
64KB
-
memory/2160-169-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-171-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-173-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-175-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-177-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-179-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/2160-180-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2160-181-0x0000000002410000-0x0000000002420000-memory.dmpFilesize
64KB
-
memory/2160-182-0x0000000002410000-0x0000000002420000-memory.dmpFilesize
64KB
-
memory/2160-183-0x0000000002410000-0x0000000002420000-memory.dmpFilesize
64KB
-
memory/2160-185-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2160-148-0x0000000004A30000-0x0000000004FD4000-memory.dmpFilesize
5.6MB
-
memory/3308-191-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-225-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-195-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-197-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-199-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-201-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-202-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/3308-206-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-204-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-205-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-208-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-209-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-211-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-213-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-215-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-217-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-219-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-221-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-223-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-193-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-227-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-1100-0x00000000052A0000-0x00000000058B8000-memory.dmpFilesize
6.1MB
-
memory/3308-1101-0x00000000058C0000-0x00000000059CA000-memory.dmpFilesize
1.0MB
-
memory/3308-1102-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/3308-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/3308-1104-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/3308-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/3308-1108-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-1109-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-1110-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3308-1111-0x0000000006600000-0x0000000006676000-memory.dmpFilesize
472KB
-
memory/3308-1112-0x0000000006680000-0x00000000066D0000-memory.dmpFilesize
320KB
-
memory/3308-190-0x0000000002550000-0x000000000258F000-memory.dmpFilesize
252KB
-
memory/3308-1113-0x0000000006800000-0x00000000069C2000-memory.dmpFilesize
1.8MB
-
memory/3308-1114-0x00000000069D0000-0x0000000006EFC000-memory.dmpFilesize
5.2MB
-
memory/3308-1115-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB