Analysis
-
max time kernel
86s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe
Resource
win10v2004-20230220-en
General
-
Target
4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe
-
Size
777KB
-
MD5
309c99d2bc3e4d0afd95be0275432158
-
SHA1
debf2e8beb57817fcc32eac30add37d8828fc8e8
-
SHA256
4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b
-
SHA512
7264c45428e1c765b8f2aa7b0464709e8fc6a5f9f4e7db88c6bdb0d2f534e6fb3d5e2655e4c3fd25a8e1eb80299cff421db4f3adf129ec40f79b0b5ae2c28b43
-
SSDEEP
12288:pMrqy90kNvRVq/2F3p15xuTxph5Jc9mjIwT7VrfKcqjIMOlT5IQUlTBd8D5t:3yBrnp15KH4mjIWrtM4IrTBWDL
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1913.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu7816.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro1913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1913.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3608-203-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-204-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-206-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-208-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-210-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-212-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-214-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-216-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-218-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-220-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-224-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-222-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-226-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-228-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-230-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-232-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-237-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/3608-236-0x0000000004B00000-0x0000000004B10000-memory.dmp family_redline behavioral1/memory/3608-240-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2212 unio0818.exe 796 unio5462.exe 1808 pro1913.exe 4208 qu7816.exe 3608 rWr40s40.exe 2168 si711066.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1913.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu7816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu7816.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0818.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0818.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5462.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio5462.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3032 4208 WerFault.exe 92 3676 3608 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1808 pro1913.exe 1808 pro1913.exe 4208 qu7816.exe 4208 qu7816.exe 3608 rWr40s40.exe 3608 rWr40s40.exe 2168 si711066.exe 2168 si711066.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1808 pro1913.exe Token: SeDebugPrivilege 4208 qu7816.exe Token: SeDebugPrivilege 3608 rWr40s40.exe Token: SeDebugPrivilege 2168 si711066.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2212 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 85 PID 4548 wrote to memory of 2212 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 85 PID 4548 wrote to memory of 2212 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 85 PID 2212 wrote to memory of 796 2212 unio0818.exe 86 PID 2212 wrote to memory of 796 2212 unio0818.exe 86 PID 2212 wrote to memory of 796 2212 unio0818.exe 86 PID 796 wrote to memory of 1808 796 unio5462.exe 87 PID 796 wrote to memory of 1808 796 unio5462.exe 87 PID 796 wrote to memory of 4208 796 unio5462.exe 92 PID 796 wrote to memory of 4208 796 unio5462.exe 92 PID 796 wrote to memory of 4208 796 unio5462.exe 92 PID 2212 wrote to memory of 3608 2212 unio0818.exe 98 PID 2212 wrote to memory of 3608 2212 unio0818.exe 98 PID 2212 wrote to memory of 3608 2212 unio0818.exe 98 PID 4548 wrote to memory of 2168 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 102 PID 4548 wrote to memory of 2168 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 102 PID 4548 wrote to memory of 2168 4548 4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe"C:\Users\Admin\AppData\Local\Temp\4c03cb97506b770d1e1f3e22fc965533d811f73ffe5b71a9716762a94484d40b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0818.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5462.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1913.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1913.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu7816.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu7816.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 10805⤵
- Program crash
PID:3032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWr40s40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWr40s40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 13364⤵
- Program crash
PID:3676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711066.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4208 -ip 42081⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3608 -ip 36081⤵PID:3544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
635KB
MD56f3fc5ad128627e77ea59e827ca4bfd2
SHA1161395ea266ab0aab388d06e4ed28865f9fe581b
SHA256165fd7d7ece5bc0bf527d76c6074912931dcf7c3f8fb5f102782af58f5815297
SHA512526be0dfb034f2eed7387c01245818a739fdeee9da938e89a5aee616d10072e26cb820afed9c53612d0ef86ec1efbaf53267c67ba377d42939fcd783c19bf8c1
-
Filesize
635KB
MD56f3fc5ad128627e77ea59e827ca4bfd2
SHA1161395ea266ab0aab388d06e4ed28865f9fe581b
SHA256165fd7d7ece5bc0bf527d76c6074912931dcf7c3f8fb5f102782af58f5815297
SHA512526be0dfb034f2eed7387c01245818a739fdeee9da938e89a5aee616d10072e26cb820afed9c53612d0ef86ec1efbaf53267c67ba377d42939fcd783c19bf8c1
-
Filesize
288KB
MD55ca45323c394aca44e0429177566cfe9
SHA1fa431adb8a3218d292594a1bb1aad9ad44c177db
SHA25679851ab5e6bb3ba45c2acfbb6c293c2c8df3509ede9d4c5e8c3ba6fcb62b5679
SHA5129630d3e4f15a25ac537faabcdafabdae3d2a3d1d769970b0c39cb6c7206cc28a5f9d0d073bfbd876d050a7b5ae463b59a130212b3d84d080eebf0ab21cf93757
-
Filesize
288KB
MD55ca45323c394aca44e0429177566cfe9
SHA1fa431adb8a3218d292594a1bb1aad9ad44c177db
SHA25679851ab5e6bb3ba45c2acfbb6c293c2c8df3509ede9d4c5e8c3ba6fcb62b5679
SHA5129630d3e4f15a25ac537faabcdafabdae3d2a3d1d769970b0c39cb6c7206cc28a5f9d0d073bfbd876d050a7b5ae463b59a130212b3d84d080eebf0ab21cf93757
-
Filesize
313KB
MD5d93bb7feca3b3af96c6bba369339609a
SHA16dd28dd9d007c943578ca988b5f479809f40cb51
SHA256f1204d221de20ff55fb6d24153958d23df97ed61265c185e354671ef6092381d
SHA512c8a2833dba95bf23da4b2a9a5583dc390c97e8b9f8605d9d116d6596b9e84f0d06086edfc44ab5e092d034a902ef454f43afc9871700a94d904383b4dd84b83f
-
Filesize
313KB
MD5d93bb7feca3b3af96c6bba369339609a
SHA16dd28dd9d007c943578ca988b5f479809f40cb51
SHA256f1204d221de20ff55fb6d24153958d23df97ed61265c185e354671ef6092381d
SHA512c8a2833dba95bf23da4b2a9a5583dc390c97e8b9f8605d9d116d6596b9e84f0d06086edfc44ab5e092d034a902ef454f43afc9871700a94d904383b4dd84b83f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
230KB
MD5a44e711e827c120768897aa668c137ee
SHA13bde46e888ab19e6b72a6521a128eae650d73fe2
SHA2561caab1615a6ecec7d764756846714d96f33d66bdd1696818276fcfe7fc885547
SHA51207e49980dd01962b139a63c267241366433591c6fb3ea44c4ce448ca2b58f679a049574534ac260d86115261ab36ca6a387ba7c2f4f96df19d7a85f3bebbfa00
-
Filesize
230KB
MD5a44e711e827c120768897aa668c137ee
SHA13bde46e888ab19e6b72a6521a128eae650d73fe2
SHA2561caab1615a6ecec7d764756846714d96f33d66bdd1696818276fcfe7fc885547
SHA51207e49980dd01962b139a63c267241366433591c6fb3ea44c4ce448ca2b58f679a049574534ac260d86115261ab36ca6a387ba7c2f4f96df19d7a85f3bebbfa00