Analysis
-
max time kernel
115s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 08:31
Static task
static1
Behavioral task
behavioral1
Sample
35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe
Resource
win10v2004-20230220-en
General
-
Target
35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe
-
Size
539KB
-
MD5
a5937f0dc1334b05b108cbf2c97a6b5f
-
SHA1
d3cfb3cfd630d9f2cec54cfa38cea9be765fa04e
-
SHA256
35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca
-
SHA512
fd44829050c5cb9f9df1016bfe9c060ac0f32a42a0815070340b44dc7bb2457554399fdfebf31740ab825788850d758833dbdd9d281564b4cd55887cd7d16712
-
SSDEEP
12288:CMrGy90bJ3AjHcbvrIjuQfoYZYox4I4+3Uo9lWZsup8U:oyubDISQfRZY4FkelWQU
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro9866.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9866.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro9866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9866.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-158-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-159-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-161-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-163-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-167-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-165-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-169-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-171-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-179-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-181-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-177-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-183-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-175-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-173-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-185-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-187-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-189-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-191-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-193-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-195-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-197-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-201-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-199-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-205-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-211-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-209-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-221-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-219-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-217-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-215-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-213-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-207-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2020-203-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio5645.exepro9866.exequ4100.exesi157812.exepid process 1168 unio5645.exe 3888 pro9866.exe 2020 qu4100.exe 1112 si157812.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9866.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9866.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
unio5645.exe35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5645.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5645.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4588 2020 WerFault.exe qu4100.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9866.exequ4100.exesi157812.exepid process 3888 pro9866.exe 3888 pro9866.exe 2020 qu4100.exe 2020 qu4100.exe 1112 si157812.exe 1112 si157812.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9866.exequ4100.exesi157812.exedescription pid process Token: SeDebugPrivilege 3888 pro9866.exe Token: SeDebugPrivilege 2020 qu4100.exe Token: SeDebugPrivilege 1112 si157812.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exeunio5645.exedescription pid process target process PID 2284 wrote to memory of 1168 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe unio5645.exe PID 2284 wrote to memory of 1168 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe unio5645.exe PID 2284 wrote to memory of 1168 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe unio5645.exe PID 1168 wrote to memory of 3888 1168 unio5645.exe pro9866.exe PID 1168 wrote to memory of 3888 1168 unio5645.exe pro9866.exe PID 1168 wrote to memory of 2020 1168 unio5645.exe qu4100.exe PID 1168 wrote to memory of 2020 1168 unio5645.exe qu4100.exe PID 1168 wrote to memory of 2020 1168 unio5645.exe qu4100.exe PID 2284 wrote to memory of 1112 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe si157812.exe PID 2284 wrote to memory of 1112 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe si157812.exe PID 2284 wrote to memory of 1112 2284 35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe si157812.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe"C:\Users\Admin\AppData\Local\Temp\35830c0d15da8524a5cebaef9c23f1b4b812ccd16abc4ef22ffbca5bce0dd2ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9866.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9866.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4100.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 13324⤵
- Program crash
PID:4588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157812.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2020 -ip 20201⤵PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD51d3e45ea974895abfa1e88367a51bb0f
SHA1a5d43110228e36b9d30529bbea3dc22da696315c
SHA256266687004eca0abf7898590ac08f273f2356baa0560e980f22e04764b749e69c
SHA512f3aaf7c062a0ff79e69b58255f75f1296170594f4dd477d1b6145426270bc74aea9ad463bb2d478b8eed37accef7102df3ce04e0c6f27370dd31cf133fa0df76
-
Filesize
397KB
MD51d3e45ea974895abfa1e88367a51bb0f
SHA1a5d43110228e36b9d30529bbea3dc22da696315c
SHA256266687004eca0abf7898590ac08f273f2356baa0560e980f22e04764b749e69c
SHA512f3aaf7c062a0ff79e69b58255f75f1296170594f4dd477d1b6145426270bc74aea9ad463bb2d478b8eed37accef7102df3ce04e0c6f27370dd31cf133fa0df76
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD556ffaff42ec045035fead183b4f3ceb4
SHA14ef51095b849aed93d8045a2ac47b79d69d64388
SHA256ed8e441c15c0c1b8fb87f3b872e03b91b0ea82690dbf52096753e1fa6af51386
SHA512c70ef8837ac2052bbbd2514eeb9e603a6de8fc27b59f5e7f3c23cb5258d58e7280e552d98605f274fc826a902f131ebe63b4e615827d72e65979695f75924a2a
-
Filesize
355KB
MD556ffaff42ec045035fead183b4f3ceb4
SHA14ef51095b849aed93d8045a2ac47b79d69d64388
SHA256ed8e441c15c0c1b8fb87f3b872e03b91b0ea82690dbf52096753e1fa6af51386
SHA512c70ef8837ac2052bbbd2514eeb9e603a6de8fc27b59f5e7f3c23cb5258d58e7280e552d98605f274fc826a902f131ebe63b4e615827d72e65979695f75924a2a