Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 10:15
Static task
static1
Behavioral task
behavioral1
Sample
fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe
Resource
win10v2004-20230220-en
General
-
Target
fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe
-
Size
539KB
-
MD5
a5c30cfce3c165579cd19cce2ef5a415
-
SHA1
68cf4a6a25f65724fb83ac451e52dc48d268bcb0
-
SHA256
fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e
-
SHA512
1eb3592bd36b39a5f3224ae0ca86d71dbcd6055c9eadf9d4cc5a6ec713f11d6e36451880a16160b9a11101f121893ed954ee9ba47ed060d930e8adae4a92f1ee
-
SSDEEP
12288:2Mrmy90Yrpt16ZFTO4GIDq2XYNxWI4+BzQHVZhC3k7WrFp:cyHrp3R4GIDZXYfPpsAk7MFp
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro4548.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro4548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-155-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-158-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-156-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-160-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-162-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-164-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-166-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-168-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-173-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-175-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-177-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-179-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-181-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-183-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-185-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-187-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-189-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-191-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-193-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-195-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-197-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-199-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-201-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-203-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-205-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-207-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-209-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-211-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-213-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-215-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-217-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-219-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2220-221-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio7761.exepro4548.exequ4272.exesi781227.exepid process 4756 unio7761.exe 3128 pro4548.exe 2220 qu4272.exe 1200 si781227.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4548.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4548.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exeunio7761.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio7761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7761.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3224 2220 WerFault.exe qu4272.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4548.exequ4272.exesi781227.exepid process 3128 pro4548.exe 3128 pro4548.exe 2220 qu4272.exe 2220 qu4272.exe 1200 si781227.exe 1200 si781227.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4548.exequ4272.exesi781227.exedescription pid process Token: SeDebugPrivilege 3128 pro4548.exe Token: SeDebugPrivilege 2220 qu4272.exe Token: SeDebugPrivilege 1200 si781227.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exeunio7761.exedescription pid process target process PID 3516 wrote to memory of 4756 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe unio7761.exe PID 3516 wrote to memory of 4756 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe unio7761.exe PID 3516 wrote to memory of 4756 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe unio7761.exe PID 4756 wrote to memory of 3128 4756 unio7761.exe pro4548.exe PID 4756 wrote to memory of 3128 4756 unio7761.exe pro4548.exe PID 4756 wrote to memory of 2220 4756 unio7761.exe qu4272.exe PID 4756 wrote to memory of 2220 4756 unio7761.exe qu4272.exe PID 4756 wrote to memory of 2220 4756 unio7761.exe qu4272.exe PID 3516 wrote to memory of 1200 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe si781227.exe PID 3516 wrote to memory of 1200 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe si781227.exe PID 3516 wrote to memory of 1200 3516 fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe si781227.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe"C:\Users\Admin\AppData\Local\Temp\fe041582cd1c359f7158d73f87cd507273c3cddf8e54b909b3ade3962b50582e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7761.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4548.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4272.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4272.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 15164⤵
- Program crash
PID:3224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781227.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781227.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2220 -ip 22201⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD53a6a2afbc6b8c2f3fef40076c1fc6f03
SHA1abc456d054e37a5542a7414259f0a63b1082cad8
SHA25693676129cacb30868ffee21d1a56a55d41a415edf9a19ae28cfecc82df9cce01
SHA51299a4ca627d3a754926031ceb4b770809bdcd9a47ad6141620bff8ca378f18505a57a6f9ef460802c775c093070effb8a9b0af7f492ef539d6f9bc4493d3c9175
-
Filesize
397KB
MD53a6a2afbc6b8c2f3fef40076c1fc6f03
SHA1abc456d054e37a5542a7414259f0a63b1082cad8
SHA25693676129cacb30868ffee21d1a56a55d41a415edf9a19ae28cfecc82df9cce01
SHA51299a4ca627d3a754926031ceb4b770809bdcd9a47ad6141620bff8ca378f18505a57a6f9ef460802c775c093070effb8a9b0af7f492ef539d6f9bc4493d3c9175
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5649c707ee924c3b49b0043110feeb5ae
SHA1d327f390575eb5f07477d49a34a9914d2ad9760a
SHA256c3d5636fb5e5f38f0b385d1ba3f006ac25943ceee09920be1e6c164f836ccf86
SHA512f8ec7f1fa08c278d146d7e16cb03e1af244be78027502fbeeac5f77fb8eb62c3b614b629750576b1800961fb126c9f7318b31f9350027b74b6c0cc43837d7a68
-
Filesize
355KB
MD5649c707ee924c3b49b0043110feeb5ae
SHA1d327f390575eb5f07477d49a34a9914d2ad9760a
SHA256c3d5636fb5e5f38f0b385d1ba3f006ac25943ceee09920be1e6c164f836ccf86
SHA512f8ec7f1fa08c278d146d7e16cb03e1af244be78027502fbeeac5f77fb8eb62c3b614b629750576b1800961fb126c9f7318b31f9350027b74b6c0cc43837d7a68