Analysis
-
max time kernel
84s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe
Resource
win10v2004-20230220-en
General
-
Target
02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe
-
Size
540KB
-
MD5
a28082632cfaea7d30a1dd2cff7eb5d3
-
SHA1
07f7299cfb0d894619f0e8cfa457ed73e14cc99c
-
SHA256
02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2
-
SHA512
91d982ef49475ca6b45716c4365ee8cc16a6c9c49e5c30fc13cc0c642049aa87dc67472e3c99d65fb180108176d8acbfcf523991a3103ea31d5cefe5d2f360d2
-
SSDEEP
12288:7Mryy90NXKG0zfzbebaEWt4HDSMMJ2ApFVNcBXIA2:hyewz8aEWt4HiJ2WPKBXIA2
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro5957.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5957.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3808-158-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-161-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-159-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-163-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-165-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-167-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-169-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-171-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-173-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-175-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-177-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-179-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-183-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-181-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-185-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-187-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-189-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-191-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-193-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-195-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-197-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-199-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-201-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-203-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-205-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-207-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-211-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-213-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-209-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-215-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-217-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-219-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/3808-221-0x0000000007730000-0x000000000776E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio4201.exepro5957.exequ6226.exesi579533.exepid process 2016 unio4201.exe 3272 pro5957.exe 3808 qu6226.exe 1592 si579533.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5957.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5957.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
unio4201.exe02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4201.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4201.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3504 3808 WerFault.exe qu6226.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5957.exequ6226.exesi579533.exepid process 3272 pro5957.exe 3272 pro5957.exe 3808 qu6226.exe 3808 qu6226.exe 1592 si579533.exe 1592 si579533.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5957.exequ6226.exesi579533.exedescription pid process Token: SeDebugPrivilege 3272 pro5957.exe Token: SeDebugPrivilege 3808 qu6226.exe Token: SeDebugPrivilege 1592 si579533.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exeunio4201.exedescription pid process target process PID 1100 wrote to memory of 2016 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe unio4201.exe PID 1100 wrote to memory of 2016 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe unio4201.exe PID 1100 wrote to memory of 2016 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe unio4201.exe PID 2016 wrote to memory of 3272 2016 unio4201.exe pro5957.exe PID 2016 wrote to memory of 3272 2016 unio4201.exe pro5957.exe PID 2016 wrote to memory of 3808 2016 unio4201.exe qu6226.exe PID 2016 wrote to memory of 3808 2016 unio4201.exe qu6226.exe PID 2016 wrote to memory of 3808 2016 unio4201.exe qu6226.exe PID 1100 wrote to memory of 1592 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe si579533.exe PID 1100 wrote to memory of 1592 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe si579533.exe PID 1100 wrote to memory of 1592 1100 02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe si579533.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe"C:\Users\Admin\AppData\Local\Temp\02cbe89edde94b2a010f53a059fe7437d28e26612fe7efb5b8f07a0a08ae99c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6226.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 19404⤵
- Program crash
PID:3504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si579533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si579533.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3808 -ip 38081⤵PID:640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
398KB
MD5e2f7205d9bba1e495cdab041216bc2f4
SHA1ca2075a851353cfbff04c04ec997e11e495a28e6
SHA256343a87887ace07efaa0469e7219bddff683a816a2a0c05b55e16870c4f06adbe
SHA51287dc7e50e87559c4c16830832e76d067ac25bbfa16bdbb8513235179a7cdc1396f86c98514925242365de1744c5774ff9bd8d2e5d9a338d1237f58c15ea4455d
-
Filesize
398KB
MD5e2f7205d9bba1e495cdab041216bc2f4
SHA1ca2075a851353cfbff04c04ec997e11e495a28e6
SHA256343a87887ace07efaa0469e7219bddff683a816a2a0c05b55e16870c4f06adbe
SHA51287dc7e50e87559c4c16830832e76d067ac25bbfa16bdbb8513235179a7cdc1396f86c98514925242365de1744c5774ff9bd8d2e5d9a338d1237f58c15ea4455d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5c5456a7d207e1ef2628e80dd3701e9ac
SHA17c33fcdd44696dd1427e06425ab905550b24a9af
SHA2568583a271048fd400c2eeec6033e5184695c6cd49620cca7ba56549cdf95988c5
SHA5124112a36f0f3f0b62156fa4ef0359dbec359cfad5d736683cee978ac6a49cca27acd3316123fccb8dac963f4cf2954f9cc37ef3a1d2df0697a9164576b49174d2
-
Filesize
355KB
MD5c5456a7d207e1ef2628e80dd3701e9ac
SHA17c33fcdd44696dd1427e06425ab905550b24a9af
SHA2568583a271048fd400c2eeec6033e5184695c6cd49620cca7ba56549cdf95988c5
SHA5124112a36f0f3f0b62156fa4ef0359dbec359cfad5d736683cee978ac6a49cca27acd3316123fccb8dac963f4cf2954f9cc37ef3a1d2df0697a9164576b49174d2