Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:56
Static task
static1
Behavioral task
behavioral1
Sample
bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe
Resource
win10v2004-20230220-en
General
-
Target
bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe
-
Size
658KB
-
MD5
c1ab87257b7d4d203243eb9050fafc4e
-
SHA1
0035365e55ba34ba7b2e8ce296dbe61760999148
-
SHA256
bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9
-
SHA512
2a4f7d91ff9720b6841eeba8a9e04faeef0af42241d02df88c726ab66ae2116871959daf85b9c846548848aa248732fc7cd4fc0f2c84a89487a9ea73889c0f58
-
SSDEEP
12288:FMrey90TVErXhJ6oMuQK+t1bDQE53MzRlfee44MzWKim8v/xJzd:3y0urz6oxQNthMWGeX4FKwJzd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4336.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4024-193-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-194-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-196-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-198-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-200-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-202-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-204-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-206-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-208-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-210-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-212-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-214-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-216-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-218-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-220-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-222-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-224-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-226-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4024-584-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un257165.exepro4336.exequ5671.exesi267878.exepid process 3124 un257165.exe 476 pro4336.exe 4024 qu5671.exe 3360 si267878.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4336.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4336.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exeun257165.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un257165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un257165.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 528 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4372 476 WerFault.exe pro4336.exe 1888 4024 WerFault.exe qu5671.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4336.exequ5671.exesi267878.exepid process 476 pro4336.exe 476 pro4336.exe 4024 qu5671.exe 4024 qu5671.exe 3360 si267878.exe 3360 si267878.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4336.exequ5671.exesi267878.exedescription pid process Token: SeDebugPrivilege 476 pro4336.exe Token: SeDebugPrivilege 4024 qu5671.exe Token: SeDebugPrivilege 3360 si267878.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exeun257165.exedescription pid process target process PID 1120 wrote to memory of 3124 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe un257165.exe PID 1120 wrote to memory of 3124 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe un257165.exe PID 1120 wrote to memory of 3124 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe un257165.exe PID 3124 wrote to memory of 476 3124 un257165.exe pro4336.exe PID 3124 wrote to memory of 476 3124 un257165.exe pro4336.exe PID 3124 wrote to memory of 476 3124 un257165.exe pro4336.exe PID 3124 wrote to memory of 4024 3124 un257165.exe qu5671.exe PID 3124 wrote to memory of 4024 3124 un257165.exe qu5671.exe PID 3124 wrote to memory of 4024 3124 un257165.exe qu5671.exe PID 1120 wrote to memory of 3360 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe si267878.exe PID 1120 wrote to memory of 3360 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe si267878.exe PID 1120 wrote to memory of 3360 1120 bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe si267878.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe"C:\Users\Admin\AppData\Local\Temp\bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 476 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 13524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 476 -ip 4761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4024 -ip 40241⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exeFilesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exeFilesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exeFilesize
516KB
MD54b70746236b2d2bd101d1c965bb37ad8
SHA1bff75266f31a1fb19345d055c9f639329b48c433
SHA256f6a44fbe0f5de160deb110a65717ffb6e8d9a83f2b17769756a7ab432392c748
SHA512afe4bb76261c3be61974045af6f0771dd628a5974e6ae7d604496c0863a44bb572e6b10146aa23dfb195e75e737393bb1ec75a0b56a6a8c50f8f6c363121be83
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exeFilesize
516KB
MD54b70746236b2d2bd101d1c965bb37ad8
SHA1bff75266f31a1fb19345d055c9f639329b48c433
SHA256f6a44fbe0f5de160deb110a65717ffb6e8d9a83f2b17769756a7ab432392c748
SHA512afe4bb76261c3be61974045af6f0771dd628a5974e6ae7d604496c0863a44bb572e6b10146aa23dfb195e75e737393bb1ec75a0b56a6a8c50f8f6c363121be83
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exeFilesize
235KB
MD5aff34dd0718bf737740073844a94b309
SHA1a5a25ec83f2d60b24b6242dfdfd7e6bb260ef1fe
SHA256c8ac5801e05d3c3718830835c516067a72d8177bc905a08db4eef91c462a8ce3
SHA512d3bb3d05cef0f319b3a73d022aaa02e0784dbbf69a0e4f02f24639abd28ea3e39a7bf6f8b2ce4af753a7cd5866287ea8b21437ce043cc73f5c4add6900331117
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exeFilesize
235KB
MD5aff34dd0718bf737740073844a94b309
SHA1a5a25ec83f2d60b24b6242dfdfd7e6bb260ef1fe
SHA256c8ac5801e05d3c3718830835c516067a72d8177bc905a08db4eef91c462a8ce3
SHA512d3bb3d05cef0f319b3a73d022aaa02e0784dbbf69a0e4f02f24639abd28ea3e39a7bf6f8b2ce4af753a7cd5866287ea8b21437ce043cc73f5c4add6900331117
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exeFilesize
294KB
MD58cd801dec34fd766fb00a2b90b85ebbe
SHA1cfda72954ad02d76665ba8229f51cfbd9273ff53
SHA25640722cab00fa5f71d88604096670539045187888bbb73ab4872ef86600362c5c
SHA512198fe29d177b7ed0e8ba551c9fa53e54a39d36858dd295fbb805b39e6e7171aa5aba17c55f60914048d3e00cc5304388064e9265bcf8f09b8e80034e27b90e8a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exeFilesize
294KB
MD58cd801dec34fd766fb00a2b90b85ebbe
SHA1cfda72954ad02d76665ba8229f51cfbd9273ff53
SHA25640722cab00fa5f71d88604096670539045187888bbb73ab4872ef86600362c5c
SHA512198fe29d177b7ed0e8ba551c9fa53e54a39d36858dd295fbb805b39e6e7171aa5aba17c55f60914048d3e00cc5304388064e9265bcf8f09b8e80034e27b90e8a
-
memory/476-148-0x0000000004C10000-0x00000000051B4000-memory.dmpFilesize
5.6MB
-
memory/476-149-0x0000000000850000-0x000000000087D000-memory.dmpFilesize
180KB
-
memory/476-150-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/476-151-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/476-152-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/476-153-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-156-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-154-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-158-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-160-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-162-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-164-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-166-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-168-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-170-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-172-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-174-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-176-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-178-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-180-0x0000000002410000-0x0000000002422000-memory.dmpFilesize
72KB
-
memory/476-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/476-182-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/476-183-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/476-185-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/3360-1121-0x00000000001A0000-0x00000000001D2000-memory.dmpFilesize
200KB
-
memory/3360-1122-0x0000000004AB0000-0x0000000004AC0000-memory.dmpFilesize
64KB
-
memory/4024-191-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-226-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-193-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-194-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-196-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-198-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-200-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-202-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-204-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-206-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-208-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-210-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-212-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-214-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-216-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-218-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-220-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-222-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-224-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4024-192-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-584-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-1100-0x00000000052C0000-0x00000000058D8000-memory.dmpFilesize
6.1MB
-
memory/4024-1101-0x00000000058E0000-0x00000000059EA000-memory.dmpFilesize
1.0MB
-
memory/4024-1102-0x00000000059F0000-0x0000000005A02000-memory.dmpFilesize
72KB
-
memory/4024-1103-0x0000000005A10000-0x0000000005A4C000-memory.dmpFilesize
240KB
-
memory/4024-1104-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4024-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4024-1107-0x00000000065C0000-0x0000000006782000-memory.dmpFilesize
1.8MB
-
memory/4024-1108-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/4024-1110-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-1111-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-1112-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/4024-190-0x0000000002120000-0x000000000216B000-memory.dmpFilesize
300KB
-
memory/4024-1113-0x0000000006F20000-0x0000000006F96000-memory.dmpFilesize
472KB
-
memory/4024-1114-0x0000000006FB0000-0x0000000007000000-memory.dmpFilesize
320KB
-
memory/4024-1115-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB