Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe
Resource
win10v2004-20230220-en
General
-
Target
ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe
-
Size
658KB
-
MD5
f3e70e106bfcf7df3ce1c008e297e8fe
-
SHA1
9419740bf4c85cc7517c3c71a5192e8e584849f7
-
SHA256
ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b
-
SHA512
b9532697c7864225ba30c865d250be8e6b6a29bc1fa50b5a7e99853d6099cee82f7da5d7eaa464109ffa31331ad3a76cc2777cfae9be6888d076d198c8652525
-
SSDEEP
12288:JMrYy90tBUKU09K27MiD+Mety+dQJHIAUoF9x644xzWKb78vAIMQGAN:NyuqCtMkmtdO3UoDx74EK0h
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3505.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3505.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3505.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4240-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4240-1108-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un765319.exepro3505.exequ0863.exesi719538.exepid process 1516 un765319.exe 4676 pro3505.exe 4240 qu0863.exe 4564 si719538.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3505.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3505.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exeun765319.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un765319.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un765319.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4804 4676 WerFault.exe pro3505.exe 1276 4240 WerFault.exe qu0863.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3505.exequ0863.exesi719538.exepid process 4676 pro3505.exe 4676 pro3505.exe 4240 qu0863.exe 4240 qu0863.exe 4564 si719538.exe 4564 si719538.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3505.exequ0863.exesi719538.exedescription pid process Token: SeDebugPrivilege 4676 pro3505.exe Token: SeDebugPrivilege 4240 qu0863.exe Token: SeDebugPrivilege 4564 si719538.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exeun765319.exedescription pid process target process PID 4412 wrote to memory of 1516 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe un765319.exe PID 4412 wrote to memory of 1516 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe un765319.exe PID 4412 wrote to memory of 1516 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe un765319.exe PID 1516 wrote to memory of 4676 1516 un765319.exe pro3505.exe PID 1516 wrote to memory of 4676 1516 un765319.exe pro3505.exe PID 1516 wrote to memory of 4676 1516 un765319.exe pro3505.exe PID 1516 wrote to memory of 4240 1516 un765319.exe qu0863.exe PID 1516 wrote to memory of 4240 1516 un765319.exe qu0863.exe PID 1516 wrote to memory of 4240 1516 un765319.exe qu0863.exe PID 4412 wrote to memory of 4564 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe si719538.exe PID 4412 wrote to memory of 4564 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe si719538.exe PID 4412 wrote to memory of 4564 4412 ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe si719538.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe"C:\Users\Admin\AppData\Local\Temp\ec7e0be847b78cd2100aa669c004ff7e92d95b20bed8a221b1d3ca14d548227b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765319.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765319.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3505.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3505.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 10804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0863.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 19684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si719538.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si719538.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4676 -ip 46761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4240 -ip 42401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si719538.exeFilesize
175KB
MD5c60488f678115445b48915c75ab2a71b
SHA12a8cf61201917109d9e1067783536a8dd22e9a7c
SHA256773e94f07ef21dbe05c1c497f53047228f818b31bbe2f8547f1d95d16c44c6f7
SHA51291eabe1f04a42ffff3ac9d6d2217644ff35c20ea8f1bf70656a0ee1090729ab76c34ffc930fe0cb7a75cf517fe470c52cad29ebdce7ec3159c5a809242c591ee
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si719538.exeFilesize
175KB
MD5c60488f678115445b48915c75ab2a71b
SHA12a8cf61201917109d9e1067783536a8dd22e9a7c
SHA256773e94f07ef21dbe05c1c497f53047228f818b31bbe2f8547f1d95d16c44c6f7
SHA51291eabe1f04a42ffff3ac9d6d2217644ff35c20ea8f1bf70656a0ee1090729ab76c34ffc930fe0cb7a75cf517fe470c52cad29ebdce7ec3159c5a809242c591ee
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765319.exeFilesize
516KB
MD521568e6e4f01708bc31205b5ed6cb265
SHA1fbcdfcceb07549117d2527cd44f6fafcffbd5603
SHA256054d9505830f500b557ea5ecd8896dab50c409d0c2fdaa01cfad5bff4463d49d
SHA5123ccc1ae809c97cf4f035729434a9c0e3902b7f552243eecc4a219a2f4c8df709114d37ac37d91ddacc5ae75e36381244f0902300b434d5b0821ad2109dd245ca
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765319.exeFilesize
516KB
MD521568e6e4f01708bc31205b5ed6cb265
SHA1fbcdfcceb07549117d2527cd44f6fafcffbd5603
SHA256054d9505830f500b557ea5ecd8896dab50c409d0c2fdaa01cfad5bff4463d49d
SHA5123ccc1ae809c97cf4f035729434a9c0e3902b7f552243eecc4a219a2f4c8df709114d37ac37d91ddacc5ae75e36381244f0902300b434d5b0821ad2109dd245ca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3505.exeFilesize
235KB
MD50668182b3cfef9c857b382eaede777d3
SHA1b517788e7cce24005cc4003f7cb4a7499fc61fe0
SHA256f32b0e000f0554bd9f3938e3862f93fc81e5e77cea3bce082856070a543a9891
SHA512572e535035622e955f9afad22fb06e2b44ced49779c9c442248daba9cc3f9e772dda14386c4308d0fa8cbad308db078aa84a2baea4e53cdcd90f4890f4a72694
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3505.exeFilesize
235KB
MD50668182b3cfef9c857b382eaede777d3
SHA1b517788e7cce24005cc4003f7cb4a7499fc61fe0
SHA256f32b0e000f0554bd9f3938e3862f93fc81e5e77cea3bce082856070a543a9891
SHA512572e535035622e955f9afad22fb06e2b44ced49779c9c442248daba9cc3f9e772dda14386c4308d0fa8cbad308db078aa84a2baea4e53cdcd90f4890f4a72694
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0863.exeFilesize
294KB
MD55fc5f1e27cd61ca233fdcd5f48ca35dd
SHA1020a376bfc50aa7c8a89a884d2e23dedd1799d52
SHA256bb8919ee01155b61bec6db8bac515c460acd0b57b001319cd1d1ea022b3839e9
SHA512ad8fee1c8aaf209ba14b8a7e4e6fd8c5b0be215ffc8471ff8cf0fdf655e8913c7361ce7be9d011585534485a5ba0f423adce4aef9200d2011b18749a6af6abe0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0863.exeFilesize
294KB
MD55fc5f1e27cd61ca233fdcd5f48ca35dd
SHA1020a376bfc50aa7c8a89a884d2e23dedd1799d52
SHA256bb8919ee01155b61bec6db8bac515c460acd0b57b001319cd1d1ea022b3839e9
SHA512ad8fee1c8aaf209ba14b8a7e4e6fd8c5b0be215ffc8471ff8cf0fdf655e8913c7361ce7be9d011585534485a5ba0f423adce4aef9200d2011b18749a6af6abe0
-
memory/4240-1102-0x0000000005830000-0x000000000593A000-memory.dmpFilesize
1.0MB
-
memory/4240-1103-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4240-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-1116-0x00000000080A0000-0x00000000080F0000-memory.dmpFilesize
320KB
-
memory/4240-1115-0x0000000002450000-0x00000000024C6000-memory.dmpFilesize
472KB
-
memory/4240-1114-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-1113-0x0000000007A50000-0x0000000007F7C000-memory.dmpFilesize
5.2MB
-
memory/4240-1112-0x0000000007870000-0x0000000007A32000-memory.dmpFilesize
1.8MB
-
memory/4240-1111-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4240-1110-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4240-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-1109-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-1108-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-1107-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-1105-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-1104-0x0000000004BD0000-0x0000000004C0C000-memory.dmpFilesize
240KB
-
memory/4240-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-1101-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/4240-280-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-276-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-277-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4240-275-0x0000000000550000-0x000000000059B000-memory.dmpFilesize
300KB
-
memory/4240-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4240-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4564-1123-0x0000000000EF0000-0x0000000000F22000-memory.dmpFilesize
200KB
-
memory/4564-1124-0x0000000005B30000-0x0000000005B40000-memory.dmpFilesize
64KB
-
memory/4564-1125-0x0000000005B30000-0x0000000005B40000-memory.dmpFilesize
64KB
-
memory/4676-182-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4676-176-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-160-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-151-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-152-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-186-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4676-150-0x0000000004C70000-0x0000000005214000-memory.dmpFilesize
5.6MB
-
memory/4676-184-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4676-183-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4676-154-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-181-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/4676-180-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-178-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-174-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-172-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-170-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-168-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-166-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-164-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-162-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-149-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4676-148-0x00000000005D0000-0x00000000005FD000-memory.dmpFilesize
180KB
-
memory/4676-159-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4676-156-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/4676-157-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB