Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 09:13
Static task
static1
Behavioral task
behavioral1
Sample
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe
Resource
win10v2004-20230221-en
General
-
Target
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe
-
Size
539KB
-
MD5
dc4e50cb8ae63c30e37bb7c719b99b07
-
SHA1
a2418448e6097e666bf4984f4faff7ff5bfc8a73
-
SHA256
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23
-
SHA512
a71b7819eda2aad78a394e094a4e29983bc3ff2d40bfd40ec4372fd8ff31229e9d95b6d003cc470e6bf2f32edc8031c7ba6ec7162ddda5bed2c5628517942f9f
-
SSDEEP
12288:XMryy90zZ5nAXIM++KWKimpsYUxsI4+vn5EQUq7fm1:lyE5nYKWKi2sYkJP5EQK
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro8420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8420.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro8420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-155-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-156-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-158-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-160-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-162-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-164-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-166-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-168-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-170-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-172-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-174-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-176-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-178-0x0000000007290000-0x00000000072A0000-memory.dmp family_redline behavioral1/memory/2896-180-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-182-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-184-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-186-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-188-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-190-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-192-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-194-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-198-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-204-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-202-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-200-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-196-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-206-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-208-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-210-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-212-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-214-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-216-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-218-0x0000000007850000-0x000000000788E000-memory.dmp family_redline behavioral1/memory/2896-220-0x0000000007850000-0x000000000788E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio7815.exepro8420.exequ6279.exesi690483.exepid process 1504 unio7815.exe 220 pro8420.exe 2896 qu6279.exe 2628 si690483.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8420.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exeunio7815.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio7815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7815.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4700 2896 WerFault.exe qu6279.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8420.exequ6279.exesi690483.exepid process 220 pro8420.exe 220 pro8420.exe 2896 qu6279.exe 2896 qu6279.exe 2628 si690483.exe 2628 si690483.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8420.exequ6279.exesi690483.exedescription pid process Token: SeDebugPrivilege 220 pro8420.exe Token: SeDebugPrivilege 2896 qu6279.exe Token: SeDebugPrivilege 2628 si690483.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exeunio7815.exedescription pid process target process PID 3368 wrote to memory of 1504 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe unio7815.exe PID 3368 wrote to memory of 1504 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe unio7815.exe PID 3368 wrote to memory of 1504 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe unio7815.exe PID 1504 wrote to memory of 220 1504 unio7815.exe pro8420.exe PID 1504 wrote to memory of 220 1504 unio7815.exe pro8420.exe PID 1504 wrote to memory of 2896 1504 unio7815.exe qu6279.exe PID 1504 wrote to memory of 2896 1504 unio7815.exe qu6279.exe PID 1504 wrote to memory of 2896 1504 unio7815.exe qu6279.exe PID 3368 wrote to memory of 2628 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe si690483.exe PID 3368 wrote to memory of 2628 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe si690483.exe PID 3368 wrote to memory of 2628 3368 fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe si690483.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe"C:\Users\Admin\AppData\Local\Temp\fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6279.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 16844⤵
- Program crash
PID:4700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690483.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2896 -ip 28961⤵PID:4104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD5ea6c5bc5a177b6311b6e79e32eb3e486
SHA192bfa1c46dbe71b194d9dd9436d9f31dfc83a40a
SHA2561ae1144d7ec543e8583217a5b8a9f6ae72d744dc42d20efd4df8c512ec96c4b3
SHA512a927f4068bde32123d9d059fc5435a57c25085771887c2419da6f0757ba59a59a8df111df8dab2796001e69bd8876c40698bef7999331e40a802704c95ed958e
-
Filesize
397KB
MD5ea6c5bc5a177b6311b6e79e32eb3e486
SHA192bfa1c46dbe71b194d9dd9436d9f31dfc83a40a
SHA2561ae1144d7ec543e8583217a5b8a9f6ae72d744dc42d20efd4df8c512ec96c4b3
SHA512a927f4068bde32123d9d059fc5435a57c25085771887c2419da6f0757ba59a59a8df111df8dab2796001e69bd8876c40698bef7999331e40a802704c95ed958e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD52567711d1825b5af28bef7a8d7d3b0b6
SHA1d85f4cc5702085b2bac54b6e12e59e983b5f01e6
SHA25604843079ac19f11007135e9728a59e7bc5b48531d64b11e2a4880e310db5a8a4
SHA5126669248fe76afcf941e1bc666e87f4e16c1c8a300efc7f45cd606d414fa05e2d53ffde01996c414c82ac843e6dcff72b140e2833ba602be559ec71df3558ab46
-
Filesize
355KB
MD52567711d1825b5af28bef7a8d7d3b0b6
SHA1d85f4cc5702085b2bac54b6e12e59e983b5f01e6
SHA25604843079ac19f11007135e9728a59e7bc5b48531d64b11e2a4880e310db5a8a4
SHA5126669248fe76afcf941e1bc666e87f4e16c1c8a300efc7f45cd606d414fa05e2d53ffde01996c414c82ac843e6dcff72b140e2833ba602be559ec71df3558ab46