Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe
Resource
win10v2004-20230220-en
General
-
Target
a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe
-
Size
540KB
-
MD5
877ec18380656e6f9d92d459dc59ab8e
-
SHA1
aa028e949cf702edc77c57c0c659c5c214e6e62b
-
SHA256
a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428
-
SHA512
26664833d374edc454eee0c36cd08431ac1063f01353b8cf5bc64291e5c2b47da7f084bf21d1650079b7a50b9ab130884db9313c9331d0a718e96339c25607b1
-
SSDEEP
12288:QMr0y902TtHyHrszoQ0D5exHsktFlMBYX6uC5SWSZLy:0yPop2laYXHCgZLy
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro7202.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7202.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro7202.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4756-154-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-155-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-159-0x0000000007210000-0x0000000007220000-memory.dmp family_redline behavioral1/memory/4756-158-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-162-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-164-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-166-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-168-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-170-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-174-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-172-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-176-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-178-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-180-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-182-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-184-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-186-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-188-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-190-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-192-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-194-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-196-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-198-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-200-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-202-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-204-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-206-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-208-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-210-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-212-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-214-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-216-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-218-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/4756-220-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio4052.exepro7202.exequ0782.exesi097356.exepid process 3832 unio4052.exe 4504 pro7202.exe 4756 qu0782.exe 1288 si097356.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7202.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7202.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exeunio4052.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4052.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4052.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5008 4756 WerFault.exe qu0782.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7202.exequ0782.exesi097356.exepid process 4504 pro7202.exe 4504 pro7202.exe 4756 qu0782.exe 4756 qu0782.exe 1288 si097356.exe 1288 si097356.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7202.exequ0782.exesi097356.exedescription pid process Token: SeDebugPrivilege 4504 pro7202.exe Token: SeDebugPrivilege 4756 qu0782.exe Token: SeDebugPrivilege 1288 si097356.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exeunio4052.exedescription pid process target process PID 1636 wrote to memory of 3832 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe unio4052.exe PID 1636 wrote to memory of 3832 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe unio4052.exe PID 1636 wrote to memory of 3832 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe unio4052.exe PID 3832 wrote to memory of 4504 3832 unio4052.exe pro7202.exe PID 3832 wrote to memory of 4504 3832 unio4052.exe pro7202.exe PID 3832 wrote to memory of 4756 3832 unio4052.exe qu0782.exe PID 3832 wrote to memory of 4756 3832 unio4052.exe qu0782.exe PID 3832 wrote to memory of 4756 3832 unio4052.exe qu0782.exe PID 1636 wrote to memory of 1288 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe si097356.exe PID 1636 wrote to memory of 1288 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe si097356.exe PID 1636 wrote to memory of 1288 1636 a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe si097356.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe"C:\Users\Admin\AppData\Local\Temp\a7d34d3747f69def47d51e6928a6adb22b11559a49851fd85f64e8d70d862428.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4052.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7202.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0782.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 13324⤵
- Program crash
PID:5008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si097356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si097356.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4756 -ip 47561⤵PID:3532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD5869204863bfc81297cb7bf0c083a8ea2
SHA13bf0377e13d46319ab94223cfb25a9274c0af3a4
SHA256377653a2e9805579d9fe683311b28dbfe85e1fd0bfc88501a20fe8c6e81800db
SHA5123eb0fb99c4952e8e37dc93673c113a75b10fed6eddedbeae8876e6693f3b21742e442a40e054d214cdb212a893eeeda9508084f20a458a55ebbf634b0445c700
-
Filesize
397KB
MD5869204863bfc81297cb7bf0c083a8ea2
SHA13bf0377e13d46319ab94223cfb25a9274c0af3a4
SHA256377653a2e9805579d9fe683311b28dbfe85e1fd0bfc88501a20fe8c6e81800db
SHA5123eb0fb99c4952e8e37dc93673c113a75b10fed6eddedbeae8876e6693f3b21742e442a40e054d214cdb212a893eeeda9508084f20a458a55ebbf634b0445c700
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5b5f7cba9034b46d49cf8c7662d2942be
SHA12490de77fcf0d8a53467d4b97c6a3ad8ad41a203
SHA256394d983dc1e839c1eaa3f3a10c9fdf08cb14280cd8d45d4d04ce38c40180681d
SHA51247f59269f0eb8e6e24abdbceaebeeb38e33891d09ae036ad74867c464f6ae50f231b4c3c51fa3724b16a1091e1357f1d9b341cccb0ef569659a2381dd3ba0448
-
Filesize
355KB
MD5b5f7cba9034b46d49cf8c7662d2942be
SHA12490de77fcf0d8a53467d4b97c6a3ad8ad41a203
SHA256394d983dc1e839c1eaa3f3a10c9fdf08cb14280cd8d45d4d04ce38c40180681d
SHA51247f59269f0eb8e6e24abdbceaebeeb38e33891d09ae036ad74867c464f6ae50f231b4c3c51fa3724b16a1091e1357f1d9b341cccb0ef569659a2381dd3ba0448