Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:09
Static task
static1
Behavioral task
behavioral1
Sample
1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe
Resource
win10v2004-20230220-en
General
-
Target
1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe
-
Size
657KB
-
MD5
45ba95f80c97902890ac54316602b71a
-
SHA1
a710453824b41bd5cbd5fd355cc138b1faaffe3e
-
SHA256
1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c
-
SHA512
0fb48889cc5ed007a1a291aa691bebb3c35365c321ef7bfc82e2b1d3459cb3492b80d86f25e775abefbddd149eeda3f86d9d4031b27c77d3f3de375b962db75e
-
SSDEEP
12288:OMr0y902wjbJkROA0XgFlQVRntupKKQogiLt8d//FZy441zWKPh8vbmhD:eyBw/KROA0X1ntUKZihGdZj4oKvJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0579.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0579.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0579.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5056-192-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-191-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-194-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-197-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-200-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-204-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-206-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-208-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-210-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-212-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-214-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-216-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-218-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-220-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-222-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-224-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-228-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/5056-226-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un919221.exepro0579.exequ5012.exesi317771.exepid process 2204 un919221.exe 2972 pro0579.exe 5056 qu5012.exe 2936 si317771.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0579.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0579.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exeun919221.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un919221.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un919221.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3236 2972 WerFault.exe pro0579.exe 444 5056 WerFault.exe qu5012.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0579.exequ5012.exesi317771.exepid process 2972 pro0579.exe 2972 pro0579.exe 5056 qu5012.exe 5056 qu5012.exe 2936 si317771.exe 2936 si317771.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0579.exequ5012.exesi317771.exedescription pid process Token: SeDebugPrivilege 2972 pro0579.exe Token: SeDebugPrivilege 5056 qu5012.exe Token: SeDebugPrivilege 2936 si317771.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exeun919221.exedescription pid process target process PID 4032 wrote to memory of 2204 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe un919221.exe PID 4032 wrote to memory of 2204 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe un919221.exe PID 4032 wrote to memory of 2204 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe un919221.exe PID 2204 wrote to memory of 2972 2204 un919221.exe pro0579.exe PID 2204 wrote to memory of 2972 2204 un919221.exe pro0579.exe PID 2204 wrote to memory of 2972 2204 un919221.exe pro0579.exe PID 2204 wrote to memory of 5056 2204 un919221.exe qu5012.exe PID 2204 wrote to memory of 5056 2204 un919221.exe qu5012.exe PID 2204 wrote to memory of 5056 2204 un919221.exe qu5012.exe PID 4032 wrote to memory of 2936 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe si317771.exe PID 4032 wrote to memory of 2936 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe si317771.exe PID 4032 wrote to memory of 2936 4032 1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe si317771.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe"C:\Users\Admin\AppData\Local\Temp\1c06f67a8b08c9f1bc0b7676e3881cc43b62fc6d8215b9fb62f9edb947a7a42c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919221.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0579.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 10804⤵
- Program crash
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5012.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 17404⤵
- Program crash
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si317771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si317771.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2972 -ip 29721⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5056 -ip 50561⤵PID:1564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si317771.exeFilesize
175KB
MD555d3c8d73eb0b22fafde5ddba108e56c
SHA187e45459aa6cad9824b4cd0c07ba2743d22ff6a0
SHA2567c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7
SHA512e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si317771.exeFilesize
175KB
MD555d3c8d73eb0b22fafde5ddba108e56c
SHA187e45459aa6cad9824b4cd0c07ba2743d22ff6a0
SHA2567c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7
SHA512e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919221.exeFilesize
515KB
MD5e2b81e39529d0974ed11b1023f5ec9fe
SHA1a87ed4aac1d972aaa41d3231593fb21bd2b8868e
SHA256c3d55920a17625474bb83d5e5108b99210a53ce112241989bbfce34b3719af89
SHA5126d85dad4d68608d720a291067574640b58344cb3958d52e992c306629b2132bc66fc328da8933b6a0f0590400fa8c447d81ae85b0addab9346386d55b60e5301
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919221.exeFilesize
515KB
MD5e2b81e39529d0974ed11b1023f5ec9fe
SHA1a87ed4aac1d972aaa41d3231593fb21bd2b8868e
SHA256c3d55920a17625474bb83d5e5108b99210a53ce112241989bbfce34b3719af89
SHA5126d85dad4d68608d720a291067574640b58344cb3958d52e992c306629b2132bc66fc328da8933b6a0f0590400fa8c447d81ae85b0addab9346386d55b60e5301
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0579.exeFilesize
235KB
MD5a5b98dde94f70ced7d3d597c09eec7dd
SHA164b99f834ebc7010f71904e5af6e8f34dfa8ad33
SHA2569877f8e3cd24d27ff43b116413b47405b9a79fd0d39a476e9541f7701ed7e2ec
SHA512881685b4891c5dd69a6f37b8ff9bc0c5a9e4ce795766f94efe444b114492d7307f01716d3f1e08a07e8b5785cc4a0a0f15c48ca37890bbff2445177130db418e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0579.exeFilesize
235KB
MD5a5b98dde94f70ced7d3d597c09eec7dd
SHA164b99f834ebc7010f71904e5af6e8f34dfa8ad33
SHA2569877f8e3cd24d27ff43b116413b47405b9a79fd0d39a476e9541f7701ed7e2ec
SHA512881685b4891c5dd69a6f37b8ff9bc0c5a9e4ce795766f94efe444b114492d7307f01716d3f1e08a07e8b5785cc4a0a0f15c48ca37890bbff2445177130db418e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5012.exeFilesize
294KB
MD5e5f36be5b5a25b647ac057a5920397db
SHA1233114d68c2c7db9e0394153aa9d55fe2faedf8c
SHA256c990ce6e1090164eec02d8d5f8b715ad9cfb979b1f8fa3860905cd038e62e635
SHA512f63f41490c463aa27f03cee505c79cc24d8d80aacbf42511bd96f51c763f49f92afcd8589873a86f6fa15ea34b68d14abfa5f677393b882b62e8f46c0758df4a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5012.exeFilesize
294KB
MD5e5f36be5b5a25b647ac057a5920397db
SHA1233114d68c2c7db9e0394153aa9d55fe2faedf8c
SHA256c990ce6e1090164eec02d8d5f8b715ad9cfb979b1f8fa3860905cd038e62e635
SHA512f63f41490c463aa27f03cee505c79cc24d8d80aacbf42511bd96f51c763f49f92afcd8589873a86f6fa15ea34b68d14abfa5f677393b882b62e8f46c0758df4a
-
memory/2936-1122-0x0000000000AC0000-0x0000000000AF2000-memory.dmpFilesize
200KB
-
memory/2936-1123-0x0000000005420000-0x0000000005430000-memory.dmpFilesize
64KB
-
memory/2972-159-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-173-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-151-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-153-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-155-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-157-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-149-0x0000000004BA0000-0x0000000005144000-memory.dmpFilesize
5.6MB
-
memory/2972-161-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-163-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-165-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-167-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-169-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-171-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-150-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-175-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-177-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/2972-178-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-179-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-180-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2972-183-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-184-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-185-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/2972-186-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2972-148-0x0000000000840000-0x000000000086D000-memory.dmpFilesize
180KB
-
memory/5056-194-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-228-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-197-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-196-0x0000000000630000-0x000000000067B000-memory.dmpFilesize
300KB
-
memory/5056-201-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-200-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-199-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-204-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-203-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-206-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-208-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-210-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-212-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-214-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-216-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-218-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-220-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-222-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-224-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-191-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-226-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-1101-0x0000000005270000-0x0000000005888000-memory.dmpFilesize
6.1MB
-
memory/5056-1102-0x0000000004B80000-0x0000000004C8A000-memory.dmpFilesize
1.0MB
-
memory/5056-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/5056-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/5056-1105-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-1107-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/5056-1108-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/5056-1109-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-1110-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-1111-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/5056-1112-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/5056-1113-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/5056-192-0x00000000024F0000-0x000000000252F000-memory.dmpFilesize
252KB
-
memory/5056-1114-0x0000000006560000-0x0000000006722000-memory.dmpFilesize
1.8MB
-
memory/5056-1115-0x0000000006730000-0x0000000006C5C000-memory.dmpFilesize
5.2MB
-
memory/5056-1116-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB