Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe
Resource
win10v2004-20230220-en
General
-
Target
16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe
-
Size
658KB
-
MD5
a5cca2a0c06d9366e56ff79c603cbf6a
-
SHA1
a421c89ca4d2491c315b14a3fab47e83a5fc8921
-
SHA256
16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1
-
SHA512
731185b3c0920cb416e121b1d7ac9b44aa59f468031ab61cf44e7432c9c16c784804c428f2f51fab9d12fc14cc26fe3fc668a17ec5f241d3f441a83a155af795
-
SSDEEP
12288:zMrny90ACOUDvbl/R5FF5QAnmYjtFztQeG6Dj0EFyGGC44OzWK4Q8vUgOX9o:MyhCRvbtHFFV7+etGT4XK3Hto
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1030.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1030.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1030.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3696-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-223-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3696-224-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un616864.exepro1030.exequ0874.exesi221282.exepid process 3476 un616864.exe 1960 pro1030.exe 3696 qu0874.exe 4600 si221282.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1030.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1030.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1030.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exeun616864.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un616864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un616864.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 228 1960 WerFault.exe pro1030.exe 4344 3696 WerFault.exe qu0874.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1030.exequ0874.exesi221282.exepid process 1960 pro1030.exe 1960 pro1030.exe 3696 qu0874.exe 3696 qu0874.exe 4600 si221282.exe 4600 si221282.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1030.exequ0874.exesi221282.exedescription pid process Token: SeDebugPrivilege 1960 pro1030.exe Token: SeDebugPrivilege 3696 qu0874.exe Token: SeDebugPrivilege 4600 si221282.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exeun616864.exedescription pid process target process PID 2092 wrote to memory of 3476 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe un616864.exe PID 2092 wrote to memory of 3476 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe un616864.exe PID 2092 wrote to memory of 3476 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe un616864.exe PID 3476 wrote to memory of 1960 3476 un616864.exe pro1030.exe PID 3476 wrote to memory of 1960 3476 un616864.exe pro1030.exe PID 3476 wrote to memory of 1960 3476 un616864.exe pro1030.exe PID 3476 wrote to memory of 3696 3476 un616864.exe qu0874.exe PID 3476 wrote to memory of 3696 3476 un616864.exe qu0874.exe PID 3476 wrote to memory of 3696 3476 un616864.exe qu0874.exe PID 2092 wrote to memory of 4600 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe si221282.exe PID 2092 wrote to memory of 4600 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe si221282.exe PID 2092 wrote to memory of 4600 2092 16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe si221282.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe"C:\Users\Admin\AppData\Local\Temp\16c2dfaf8d2ea6c2c4b12e77aea3387f8c9dba0070f76dc2f0f4f2f673a0d9f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un616864.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un616864.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1030.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1030.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0874.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0874.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221282.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221282.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1960 -ip 19601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3696 -ip 36961⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221282.exeFilesize
175KB
MD52f11e5e815d81fb959a65142fc8c1264
SHA1109cba37c1baec4dc8d9a653c6adfd8270be003f
SHA256644563f423d6e69d3f9fad29e4c796974b1085b73080a16c83cb744923f10e0b
SHA512a5f74006c3bc078902d6e5e62f71756a1e107d28e3ea33b4324e2caf47d7e9042375de5e1dfa067b081718c3608547e5401126b55be85372f85f7123aec5589e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221282.exeFilesize
175KB
MD52f11e5e815d81fb959a65142fc8c1264
SHA1109cba37c1baec4dc8d9a653c6adfd8270be003f
SHA256644563f423d6e69d3f9fad29e4c796974b1085b73080a16c83cb744923f10e0b
SHA512a5f74006c3bc078902d6e5e62f71756a1e107d28e3ea33b4324e2caf47d7e9042375de5e1dfa067b081718c3608547e5401126b55be85372f85f7123aec5589e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un616864.exeFilesize
516KB
MD52114c0e275f9e06476aa9fc6fc69c5e3
SHA1998978b95694f717be2b09f1ed6ab163e427386c
SHA256b8f06c328c13dee4ce5ecb26f27a0fe08dd7bb59a3d0f5c89c135124474b3ee3
SHA51247262a9caf3d9e31815c9910ea4865875a6871f490003b6b8eeff918c64a81e03d2b8e0870809b777a65b40c03533b6c34c90242e6f0933ceef60fcf40dc483d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un616864.exeFilesize
516KB
MD52114c0e275f9e06476aa9fc6fc69c5e3
SHA1998978b95694f717be2b09f1ed6ab163e427386c
SHA256b8f06c328c13dee4ce5ecb26f27a0fe08dd7bb59a3d0f5c89c135124474b3ee3
SHA51247262a9caf3d9e31815c9910ea4865875a6871f490003b6b8eeff918c64a81e03d2b8e0870809b777a65b40c03533b6c34c90242e6f0933ceef60fcf40dc483d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1030.exeFilesize
235KB
MD54b467ba7c6b75e0002cd5f6a96dfdf1f
SHA1eda80446313ec952ee4d1e329c4e4c24df41f7d1
SHA256bc4361e17c822ef44fa95715f3c60877b253224c2d0c3d482e2b020d75be6996
SHA512f8ef7eaecd46ba9b51d1c867996c1433b46c54acd613954f5e3c53f0c9dcc210954871f9b5ed754c544cbb661545fd80aa733e60681c07e9405804d0229b4215
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1030.exeFilesize
235KB
MD54b467ba7c6b75e0002cd5f6a96dfdf1f
SHA1eda80446313ec952ee4d1e329c4e4c24df41f7d1
SHA256bc4361e17c822ef44fa95715f3c60877b253224c2d0c3d482e2b020d75be6996
SHA512f8ef7eaecd46ba9b51d1c867996c1433b46c54acd613954f5e3c53f0c9dcc210954871f9b5ed754c544cbb661545fd80aa733e60681c07e9405804d0229b4215
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0874.exeFilesize
294KB
MD5678fed710a5adcae5a11dd407b9a73d1
SHA124a4f9ef3072da121587b58517cd99a8d2ddc0d7
SHA2560a435d537694fabf778af0afc0608656321f15696f7128e85e18902b9195c9fd
SHA51246a6fb55b94cbd5d1b16fb24dc11e9d91d111e2b4828ba4e6ae3d55f6b32fc5f0dce19eb58da0a0f2f0dd639b7785abaf3f07326d9049192c6fb600539b453d2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0874.exeFilesize
294KB
MD5678fed710a5adcae5a11dd407b9a73d1
SHA124a4f9ef3072da121587b58517cd99a8d2ddc0d7
SHA2560a435d537694fabf778af0afc0608656321f15696f7128e85e18902b9195c9fd
SHA51246a6fb55b94cbd5d1b16fb24dc11e9d91d111e2b4828ba4e6ae3d55f6b32fc5f0dce19eb58da0a0f2f0dd639b7785abaf3f07326d9049192c6fb600539b453d2
-
memory/1960-148-0x00000000006E0000-0x000000000070D000-memory.dmpFilesize
180KB
-
memory/1960-149-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1960-150-0x0000000004C90000-0x0000000005234000-memory.dmpFilesize
5.6MB
-
memory/1960-151-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-152-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-154-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-156-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-158-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-160-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-164-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-162-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-166-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-168-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-170-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-172-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-174-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-176-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-178-0x00000000023B0000-0x00000000023C2000-memory.dmpFilesize
72KB
-
memory/1960-179-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/1960-180-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1960-182-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/3696-187-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-188-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-190-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-192-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-194-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-196-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-198-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-200-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-202-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-204-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-206-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-208-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-210-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-212-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-214-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-216-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-220-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-219-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-218-0x0000000000820000-0x000000000086B000-memory.dmpFilesize
300KB
-
memory/3696-223-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3696-222-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-224-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1097-0x0000000005290000-0x00000000058A8000-memory.dmpFilesize
6.1MB
-
memory/3696-1098-0x00000000058B0000-0x00000000059BA000-memory.dmpFilesize
1.0MB
-
memory/3696-1099-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/3696-1100-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1101-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/3696-1102-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/3696-1103-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/3696-1105-0x00000000065B0000-0x0000000006626000-memory.dmpFilesize
472KB
-
memory/3696-1106-0x0000000006640000-0x0000000006690000-memory.dmpFilesize
320KB
-
memory/3696-1108-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1107-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1109-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1110-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/3696-1111-0x0000000006810000-0x00000000069D2000-memory.dmpFilesize
1.8MB
-
memory/3696-1112-0x00000000069E0000-0x0000000006F0C000-memory.dmpFilesize
5.2MB
-
memory/4600-1118-0x0000000000230000-0x0000000000262000-memory.dmpFilesize
200KB
-
memory/4600-1119-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB