Analysis
-
max time kernel
94s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:58
Static task
static1
Behavioral task
behavioral1
Sample
cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe
Resource
win10v2004-20230220-en
General
-
Target
cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe
-
Size
658KB
-
MD5
116b5030a92030603dbda375948b9564
-
SHA1
0e0a89dbe879c75a7bd8dd3487cab4bded8482f0
-
SHA256
cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb
-
SHA512
6aaf01eda8d80d992086cc0f20e680012a152104393738c0f0ebc11830c6c889f1c3e0ed786928f21804bb5103faa2ea38162205088a9ec9dbf1802a1d476103
-
SSDEEP
12288:VMrey90ucuyX3p3a4X2bRJobtrfqQlPaH2r6f8QX449zWKCL8vh07i96B:Hyz7yXZTBtT3Rzr6EQI4AKmu9k
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro2200.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/908-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-188-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/908-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un720246.exepro2200.exequ1327.exesi950370.exepid process 3372 un720246.exe 4924 pro2200.exe 908 qu1327.exe 4048 si950370.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2200.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2200.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exeun720246.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un720246.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un720246.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4764 4924 WerFault.exe pro2200.exe 2256 908 WerFault.exe qu1327.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2200.exequ1327.exesi950370.exepid process 4924 pro2200.exe 4924 pro2200.exe 908 qu1327.exe 908 qu1327.exe 4048 si950370.exe 4048 si950370.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2200.exequ1327.exesi950370.exedescription pid process Token: SeDebugPrivilege 4924 pro2200.exe Token: SeDebugPrivilege 908 qu1327.exe Token: SeDebugPrivilege 4048 si950370.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exeun720246.exedescription pid process target process PID 1364 wrote to memory of 3372 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe un720246.exe PID 1364 wrote to memory of 3372 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe un720246.exe PID 1364 wrote to memory of 3372 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe un720246.exe PID 3372 wrote to memory of 4924 3372 un720246.exe pro2200.exe PID 3372 wrote to memory of 4924 3372 un720246.exe pro2200.exe PID 3372 wrote to memory of 4924 3372 un720246.exe pro2200.exe PID 3372 wrote to memory of 908 3372 un720246.exe qu1327.exe PID 3372 wrote to memory of 908 3372 un720246.exe qu1327.exe PID 3372 wrote to memory of 908 3372 un720246.exe qu1327.exe PID 1364 wrote to memory of 4048 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe si950370.exe PID 1364 wrote to memory of 4048 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe si950370.exe PID 1364 wrote to memory of 4048 1364 cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe si950370.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe"C:\Users\Admin\AppData\Local\Temp\cccf436da7f77f96a045dec4dad01b1df36af89f595daeec62c596e37bf362fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720246.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720246.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2200.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1327.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 12084⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si950370.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si950370.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4924 -ip 49241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 908 -ip 9081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si950370.exeFilesize
175KB
MD5f24837eaf5275b69aca6e421fbfe62d2
SHA1d07a270ff079fe597cb2e765284f6f32a6c735f1
SHA25684fde24cb8ad67d72df161b3d76172476867ab2f25808b965305a4e718ffc279
SHA512066881cffbb01a34f1052a962f854d7c770e1ff676a763dc26dfcfeb19e8e0cc80e0323bcadc2acd67cbc2306ef061dc3bfb9760935324450c875cfe3752093a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si950370.exeFilesize
175KB
MD5f24837eaf5275b69aca6e421fbfe62d2
SHA1d07a270ff079fe597cb2e765284f6f32a6c735f1
SHA25684fde24cb8ad67d72df161b3d76172476867ab2f25808b965305a4e718ffc279
SHA512066881cffbb01a34f1052a962f854d7c770e1ff676a763dc26dfcfeb19e8e0cc80e0323bcadc2acd67cbc2306ef061dc3bfb9760935324450c875cfe3752093a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720246.exeFilesize
516KB
MD530c61c3a917230679040a9c1d495d5cf
SHA1145b25df8b3bd2c6e5625dfc512d74f77e9131bd
SHA256a04c24d02c0f6cec89cd3e348dfb714fa2a864526b8afcfd7ee8e7e4deee55ba
SHA512bd658806e7be773c572c868740dc48dd23ad20a1fee51b7b36ff67584f2803b7490a8d23d357817b2bac796b9bbe2da5c4cf674c7daa47d36ffe96476c69ae7d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720246.exeFilesize
516KB
MD530c61c3a917230679040a9c1d495d5cf
SHA1145b25df8b3bd2c6e5625dfc512d74f77e9131bd
SHA256a04c24d02c0f6cec89cd3e348dfb714fa2a864526b8afcfd7ee8e7e4deee55ba
SHA512bd658806e7be773c572c868740dc48dd23ad20a1fee51b7b36ff67584f2803b7490a8d23d357817b2bac796b9bbe2da5c4cf674c7daa47d36ffe96476c69ae7d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2200.exeFilesize
235KB
MD5b45e76689733602be3b2fd8ea2146aab
SHA1a5f26c125be9bdc08921e10474182ae6234bd853
SHA2567d688232605014c5e50fd9bbcf3e510b150cc3b2596e689deb08645db7b7e7be
SHA5123f000a2e63cc13c460c24cafbca91d933d839e0767460ea7b1e246814a272b4a8d13386e640263528d6af9e25f79da41263d18b49aa4dd405b3b2a49216e41a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2200.exeFilesize
235KB
MD5b45e76689733602be3b2fd8ea2146aab
SHA1a5f26c125be9bdc08921e10474182ae6234bd853
SHA2567d688232605014c5e50fd9bbcf3e510b150cc3b2596e689deb08645db7b7e7be
SHA5123f000a2e63cc13c460c24cafbca91d933d839e0767460ea7b1e246814a272b4a8d13386e640263528d6af9e25f79da41263d18b49aa4dd405b3b2a49216e41a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1327.exeFilesize
294KB
MD5d8a89d4317b23f207494599f52c56bba
SHA119828abdbb4ce7985644d9a2ad993423e478bda5
SHA256fce0bf91230748cdb2ac23ce7875c9905fa05df607e7dd00e732243db720925e
SHA51245ca1f06f140ea25fef73cff158564369b59f20c044e56ed1f93484fe2151ab39c2705f84310870ff39478800275e84924c533e9de4d3ab783f06ee88ef1b914
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1327.exeFilesize
294KB
MD5d8a89d4317b23f207494599f52c56bba
SHA119828abdbb4ce7985644d9a2ad993423e478bda5
SHA256fce0bf91230748cdb2ac23ce7875c9905fa05df607e7dd00e732243db720925e
SHA51245ca1f06f140ea25fef73cff158564369b59f20c044e56ed1f93484fe2151ab39c2705f84310870ff39478800275e84924c533e9de4d3ab783f06ee88ef1b914
-
memory/908-459-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-1099-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/908-1111-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-1110-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-1109-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-1108-0x0000000006630000-0x0000000006B5C000-memory.dmpFilesize
5.2MB
-
memory/908-1107-0x0000000006460000-0x0000000006622000-memory.dmpFilesize
1.8MB
-
memory/908-1106-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/908-1105-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/908-1103-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/908-1102-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/908-1101-0x0000000004BD0000-0x0000000004C0C000-memory.dmpFilesize
240KB
-
memory/908-1100-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-1098-0x0000000005810000-0x000000000591A000-memory.dmpFilesize
1.0MB
-
memory/908-1097-0x00000000051F0000-0x0000000005808000-memory.dmpFilesize
6.1MB
-
memory/908-456-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/908-455-0x0000000002010000-0x000000000205B000-memory.dmpFilesize
300KB
-
memory/908-219-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-221-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-217-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-189-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-191-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-188-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-193-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-195-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-197-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-199-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-201-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-203-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-205-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-207-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-209-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-211-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-213-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/908-215-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/4048-1117-0x0000000000AD0000-0x0000000000B02000-memory.dmpFilesize
200KB
-
memory/4048-1118-0x0000000005370000-0x0000000005380000-memory.dmpFilesize
64KB
-
memory/4924-170-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-180-0x00000000022B0000-0x00000000022C0000-memory.dmpFilesize
64KB
-
memory/4924-168-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-150-0x00000000022B0000-0x00000000022C0000-memory.dmpFilesize
64KB
-
memory/4924-179-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4924-178-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-154-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-176-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-166-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-172-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-152-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-181-0x00000000022B0000-0x00000000022C0000-memory.dmpFilesize
64KB
-
memory/4924-174-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-164-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-162-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-160-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-158-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-156-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB
-
memory/4924-149-0x0000000000580000-0x00000000005AD000-memory.dmpFilesize
180KB
-
memory/4924-148-0x0000000004CA0000-0x0000000005244000-memory.dmpFilesize
5.6MB
-
memory/4924-183-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4924-151-0x0000000002360000-0x0000000002372000-memory.dmpFilesize
72KB