Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:26
Static task
static1
Behavioral task
behavioral1
Sample
89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe
Resource
win10v2004-20230221-en
General
-
Target
89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe
-
Size
657KB
-
MD5
33f136b75b866035d78339d2caee28f0
-
SHA1
5add608bd2c9f83e9fe8515fbbbaa09e32ee61b6
-
SHA256
89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9
-
SHA512
9581fa3df9c67c5f85c7045e4a02c445ae3b7a265da1b509b9de1438bdc0a931109b98c562046ffde37a4cb6cb1801950cf0a2f3ad7ab063501529398db5817c
-
SSDEEP
12288:KMr+y90807CMqn+AcCrwugveVtNOa297ChbL+Lt8wuXyys44tzWKaK8vCuHty:QyqeMGFxwugYtcpW9KhyCyt4wKcY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0045.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0045.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0045.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4372-191-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-192-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-194-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-198-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-202-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-201-0x0000000004C60000-0x0000000004C70000-memory.dmp family_redline behavioral1/memory/4372-204-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-206-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-208-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-210-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-212-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-214-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-216-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-218-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-220-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-222-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-224-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-226-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline behavioral1/memory/4372-228-0x0000000002470000-0x00000000024AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un906710.exepro0045.exequ0611.exesi071938.exepid process 3980 un906710.exe 2852 pro0045.exe 4372 qu0611.exe 4404 si071938.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0045.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0045.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exeun906710.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un906710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un906710.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3308 2852 WerFault.exe pro0045.exe 2512 4372 WerFault.exe qu0611.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0045.exequ0611.exesi071938.exepid process 2852 pro0045.exe 2852 pro0045.exe 4372 qu0611.exe 4372 qu0611.exe 4404 si071938.exe 4404 si071938.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0045.exequ0611.exesi071938.exedescription pid process Token: SeDebugPrivilege 2852 pro0045.exe Token: SeDebugPrivilege 4372 qu0611.exe Token: SeDebugPrivilege 4404 si071938.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exeun906710.exedescription pid process target process PID 4580 wrote to memory of 3980 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe un906710.exe PID 4580 wrote to memory of 3980 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe un906710.exe PID 4580 wrote to memory of 3980 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe un906710.exe PID 3980 wrote to memory of 2852 3980 un906710.exe pro0045.exe PID 3980 wrote to memory of 2852 3980 un906710.exe pro0045.exe PID 3980 wrote to memory of 2852 3980 un906710.exe pro0045.exe PID 3980 wrote to memory of 4372 3980 un906710.exe qu0611.exe PID 3980 wrote to memory of 4372 3980 un906710.exe qu0611.exe PID 3980 wrote to memory of 4372 3980 un906710.exe qu0611.exe PID 4580 wrote to memory of 4404 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe si071938.exe PID 4580 wrote to memory of 4404 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe si071938.exe PID 4580 wrote to memory of 4404 4580 89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe si071938.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe"C:\Users\Admin\AppData\Local\Temp\89fea5b9c18c796e57b62b5e117137919bf7ce56f658df84b28aa25d6617f8e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0045.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0611.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 15644⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071938.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071938.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2852 -ip 28521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4372 -ip 43721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071938.exeFilesize
175KB
MD5201278a0c52e7efbe98cb3504c750887
SHA18d02c8934a255534763d35ca6164a13a91bb39a3
SHA256ce29a8506cabb807f444a28e61836fada020a36ada02730e0b5a227da33e396a
SHA51257760a8c6a1122bcc23d1f73e421e72db7ceb029e8be0e6f2e45f865ff47810f13cca6aad01058cbd9011b6266da961298e409015518c6cadca101ae2faa5ce9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071938.exeFilesize
175KB
MD5201278a0c52e7efbe98cb3504c750887
SHA18d02c8934a255534763d35ca6164a13a91bb39a3
SHA256ce29a8506cabb807f444a28e61836fada020a36ada02730e0b5a227da33e396a
SHA51257760a8c6a1122bcc23d1f73e421e72db7ceb029e8be0e6f2e45f865ff47810f13cca6aad01058cbd9011b6266da961298e409015518c6cadca101ae2faa5ce9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906710.exeFilesize
515KB
MD544533cc94877d75f0ec057f16a3a0602
SHA14745cbab28b0ebbf3c343fda80cebf075e338622
SHA256e18a0051c26a31ba4491858f37e7cd17b4a977962a89776c3bc9055e829f7f3f
SHA512618d0eb1d590531ba35e11226b84c45afa6b7337d9e88fdd1770a955795640aa8ff13f643422510e82450879edb402599b4a37454a581ce1393dca6c42d0519e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906710.exeFilesize
515KB
MD544533cc94877d75f0ec057f16a3a0602
SHA14745cbab28b0ebbf3c343fda80cebf075e338622
SHA256e18a0051c26a31ba4491858f37e7cd17b4a977962a89776c3bc9055e829f7f3f
SHA512618d0eb1d590531ba35e11226b84c45afa6b7337d9e88fdd1770a955795640aa8ff13f643422510e82450879edb402599b4a37454a581ce1393dca6c42d0519e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0045.exeFilesize
235KB
MD5092f81bae1e0496215e679443b7ef664
SHA15ca6bb7c43f81213c206b637e947b0bdb281f059
SHA2564272922f9a2a59fcd28f8c6d7b6c270396dfa2cdf2190d9ab4d979df367cb6e3
SHA512328ca046691981d005541845cc7a37c71b901f6112f8c95fb9bdeeef4e3a9b33a871058ed66207f55c64c6788f040fccbc768eead1627c5ab34394d6817193e6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0045.exeFilesize
235KB
MD5092f81bae1e0496215e679443b7ef664
SHA15ca6bb7c43f81213c206b637e947b0bdb281f059
SHA2564272922f9a2a59fcd28f8c6d7b6c270396dfa2cdf2190d9ab4d979df367cb6e3
SHA512328ca046691981d005541845cc7a37c71b901f6112f8c95fb9bdeeef4e3a9b33a871058ed66207f55c64c6788f040fccbc768eead1627c5ab34394d6817193e6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0611.exeFilesize
294KB
MD5991d82f3537542fb50e1e7db1f8c4f5c
SHA14356d4cfa0ee87256d0cef2d8be761822264a6d6
SHA25667630a5424c86bf9cceedadbcd39f1c19a7cb061a66dbaad9836b464f4a88fee
SHA5120260e25569d25d93363c6a87e89c130e5cbf71fe6e744a4f545c29835e960e93810e9317be0b5c813d0e09fdbb0c1e4db717535bd50627af4ed594006643e602
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0611.exeFilesize
294KB
MD5991d82f3537542fb50e1e7db1f8c4f5c
SHA14356d4cfa0ee87256d0cef2d8be761822264a6d6
SHA25667630a5424c86bf9cceedadbcd39f1c19a7cb061a66dbaad9836b464f4a88fee
SHA5120260e25569d25d93363c6a87e89c130e5cbf71fe6e744a4f545c29835e960e93810e9317be0b5c813d0e09fdbb0c1e4db717535bd50627af4ed594006643e602
-
memory/2852-149-0x0000000002110000-0x000000000213D000-memory.dmpFilesize
180KB
-
memory/2852-150-0x0000000004B70000-0x0000000005114000-memory.dmpFilesize
5.6MB
-
memory/2852-151-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/2852-152-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/2852-153-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-154-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-156-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-158-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-160-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-162-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-164-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-166-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-168-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-170-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-172-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-174-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-176-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-178-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-180-0x00000000025C0000-0x00000000025D2000-memory.dmpFilesize
72KB
-
memory/2852-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/2852-182-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/2852-183-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/2852-184-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/2852-186-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4372-191-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-192-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-194-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-196-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/4372-198-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-200-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-202-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-201-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-204-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-197-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-206-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-208-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-210-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-212-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-214-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-216-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-218-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-220-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-222-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-224-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-226-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-228-0x0000000002470000-0x00000000024AF000-memory.dmpFilesize
252KB
-
memory/4372-1101-0x0000000005220000-0x0000000005838000-memory.dmpFilesize
6.1MB
-
memory/4372-1102-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4372-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4372-1104-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-1105-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4372-1107-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-1108-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-1109-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-1110-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4372-1111-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/4372-1112-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4372-1113-0x0000000007770000-0x0000000007932000-memory.dmpFilesize
1.8MB
-
memory/4372-1114-0x0000000007940000-0x0000000007E6C000-memory.dmpFilesize
5.2MB
-
memory/4372-1115-0x00000000025E0000-0x0000000002656000-memory.dmpFilesize
472KB
-
memory/4372-1116-0x00000000080A0000-0x00000000080F0000-memory.dmpFilesize
320KB
-
memory/4404-1123-0x0000000000570000-0x00000000005A2000-memory.dmpFilesize
200KB
-
memory/4404-1124-0x0000000005140000-0x0000000005150000-memory.dmpFilesize
64KB