Analysis
-
max time kernel
78s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 08:17
Static task
static1
Behavioral task
behavioral1
Sample
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe
Resource
win10v2004-20230221-en
General
-
Target
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe
-
Size
539KB
-
MD5
aee6ec98e68510fb95db5e295f0ae17b
-
SHA1
508df5c3e02d2919265309017c6e0c7ca1c92953
-
SHA256
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c
-
SHA512
bae367520b359fbf271eef8f7558bc2630fea6696b2ac6a8673849cfc9c7cbd9ac6da52cd809e6a560a1bc06a6bb84856d4ac380e715714157089069ecb41def
-
SSDEEP
12288:zMr1y90g0AesSCwyOIvvnnWXYzxVI4+HgzvUGyGpniZ:yyYAesS67vnWXYtsA8GQZ
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro9067.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro9067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9067.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-155-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-158-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-160-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-162-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-156-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-164-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-166-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-168-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-170-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-172-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-174-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-176-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-178-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-180-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-184-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-187-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-191-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-193-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-189-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-195-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-197-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-199-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-201-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-203-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-205-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-207-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-209-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-211-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-213-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-215-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-217-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-219-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/1404-221-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio7795.exepro9067.exequ4502.exesi429648.exepid process 4244 unio7795.exe 1296 pro9067.exe 1404 qu4502.exe 2132 si429648.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9067.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9067.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exeunio7795.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio7795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7795.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4760 1404 WerFault.exe qu4502.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9067.exequ4502.exesi429648.exepid process 1296 pro9067.exe 1296 pro9067.exe 1404 qu4502.exe 1404 qu4502.exe 2132 si429648.exe 2132 si429648.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9067.exequ4502.exesi429648.exedescription pid process Token: SeDebugPrivilege 1296 pro9067.exe Token: SeDebugPrivilege 1404 qu4502.exe Token: SeDebugPrivilege 2132 si429648.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exeunio7795.exedescription pid process target process PID 1644 wrote to memory of 4244 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe unio7795.exe PID 1644 wrote to memory of 4244 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe unio7795.exe PID 1644 wrote to memory of 4244 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe unio7795.exe PID 4244 wrote to memory of 1296 4244 unio7795.exe pro9067.exe PID 4244 wrote to memory of 1296 4244 unio7795.exe pro9067.exe PID 4244 wrote to memory of 1404 4244 unio7795.exe qu4502.exe PID 4244 wrote to memory of 1404 4244 unio7795.exe qu4502.exe PID 4244 wrote to memory of 1404 4244 unio7795.exe qu4502.exe PID 1644 wrote to memory of 2132 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe si429648.exe PID 1644 wrote to memory of 2132 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe si429648.exe PID 1644 wrote to memory of 2132 1644 2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe si429648.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe"C:\Users\Admin\AppData\Local\Temp\2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7795.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7795.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9067.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4502.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4502.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 18964⤵
- Program crash
PID:4760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429648.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429648.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1404 -ip 14041⤵PID:2264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD5a84138812265cd2c5dfd0c6551952ae0
SHA1f521f96700c136d5793d6a5d8d9fb4ee2cdd7697
SHA256215322cad19020b0e1c581e57d4f423fc87b210e5a9f9d12e476a7ae383b5954
SHA512df63542abc6d2bf0193b6f7db9a4afb299d1cbe78713064e5c0d985b385b9931599d1c98aeea5ce23516f166cd7405c0164c1d86369e5179153b61e3056fbf73
-
Filesize
397KB
MD5a84138812265cd2c5dfd0c6551952ae0
SHA1f521f96700c136d5793d6a5d8d9fb4ee2cdd7697
SHA256215322cad19020b0e1c581e57d4f423fc87b210e5a9f9d12e476a7ae383b5954
SHA512df63542abc6d2bf0193b6f7db9a4afb299d1cbe78713064e5c0d985b385b9931599d1c98aeea5ce23516f166cd7405c0164c1d86369e5179153b61e3056fbf73
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD58c2ee266bfa8f8cfdcd24ed16c4098e5
SHA166c45b9f523bb25789740ecec455295ad7f2e3e0
SHA2564c90cdbee320104295fa3e8efac0fff25eb22d010899ff745a71c3bb94e5bd66
SHA512adb73f05166a242665a0545a05c3fd2bfbe1bfe602e6d7ff5f86e91a2a1aad2733792d711ee13fce38099811ca56400f214b1da6cc2fce2725942b57070ef141
-
Filesize
355KB
MD58c2ee266bfa8f8cfdcd24ed16c4098e5
SHA166c45b9f523bb25789740ecec455295ad7f2e3e0
SHA2564c90cdbee320104295fa3e8efac0fff25eb22d010899ff745a71c3bb94e5bd66
SHA512adb73f05166a242665a0545a05c3fd2bfbe1bfe602e6d7ff5f86e91a2a1aad2733792d711ee13fce38099811ca56400f214b1da6cc2fce2725942b57070ef141