Analysis
-
max time kernel
85s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 11:33
Static task
static1
Behavioral task
behavioral1
Sample
788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe
Resource
win10v2004-20230221-en
General
-
Target
788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe
-
Size
539KB
-
MD5
9684a0729afc634504b40cebfb555c5f
-
SHA1
153135b0fa794e494b24ce02c3bbdd530e491c52
-
SHA256
788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f
-
SHA512
08ecd83ee134e899c55361568a60b6258d9d7b52528454f60dcad23b4f601f06e842a3e9dffabaddb9cb4af0098da07ce820b8c14ff328e7cc53e05b31af5da2
-
SSDEEP
12288:7MrOy90ZHaCfdl7U9UZQLCubzj7B4LZ/bXNR8n:xyKtfdl7Qhfj1iZzEn
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro7750.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro7750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7750.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4996-155-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-156-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-159-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-163-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-165-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-167-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-169-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-171-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-173-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-175-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-177-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-179-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-181-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-183-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-185-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-187-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-189-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-191-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-193-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-195-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-197-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-199-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-201-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-203-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-205-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-207-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-209-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-211-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-213-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-215-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-217-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-219-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/4996-221-0x0000000007130000-0x000000000716E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio0056.exepro7750.exequ1826.exesi209135.exepid process 4776 unio0056.exe 1964 pro7750.exe 4996 qu1826.exe 3156 si209135.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7750.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7750.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exeunio0056.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0056.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 840 4996 WerFault.exe qu1826.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7750.exequ1826.exesi209135.exepid process 1964 pro7750.exe 1964 pro7750.exe 4996 qu1826.exe 4996 qu1826.exe 3156 si209135.exe 3156 si209135.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7750.exequ1826.exesi209135.exedescription pid process Token: SeDebugPrivilege 1964 pro7750.exe Token: SeDebugPrivilege 4996 qu1826.exe Token: SeDebugPrivilege 3156 si209135.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exeunio0056.exedescription pid process target process PID 1300 wrote to memory of 4776 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe unio0056.exe PID 1300 wrote to memory of 4776 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe unio0056.exe PID 1300 wrote to memory of 4776 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe unio0056.exe PID 4776 wrote to memory of 1964 4776 unio0056.exe pro7750.exe PID 4776 wrote to memory of 1964 4776 unio0056.exe pro7750.exe PID 4776 wrote to memory of 4996 4776 unio0056.exe qu1826.exe PID 4776 wrote to memory of 4996 4776 unio0056.exe qu1826.exe PID 4776 wrote to memory of 4996 4776 unio0056.exe qu1826.exe PID 1300 wrote to memory of 3156 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe si209135.exe PID 1300 wrote to memory of 3156 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe si209135.exe PID 1300 wrote to memory of 3156 1300 788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe si209135.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe"C:\Users\Admin\AppData\Local\Temp\788de1a9f6efcd35d02063c391999252a232894b08d83c274302b2d3aa6c946f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0056.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7750.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1826.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 14724⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si209135.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si209135.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4996 -ip 49961⤵PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
397KB
MD5ff70572b87d941c39753779be219c6cc
SHA109240879d0e76e50228c33f12942a8b56ac6c7bd
SHA25699d7837930874ab25c12fd3a0a676aa9ecc24565fe42a81638a5ca949e1afddc
SHA512ee8aea0e9a4df323f8e1ba6e2511203b7f99fc5c6fee5679f38adbdd862925ada89c7806ed73dd123660300a0dbc7e08b68142816e1aacdac2ad39f4b12e44dd
-
Filesize
397KB
MD5ff70572b87d941c39753779be219c6cc
SHA109240879d0e76e50228c33f12942a8b56ac6c7bd
SHA25699d7837930874ab25c12fd3a0a676aa9ecc24565fe42a81638a5ca949e1afddc
SHA512ee8aea0e9a4df323f8e1ba6e2511203b7f99fc5c6fee5679f38adbdd862925ada89c7806ed73dd123660300a0dbc7e08b68142816e1aacdac2ad39f4b12e44dd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
356KB
MD5dc07ab5ac44c611d7490e0a1cc6b3803
SHA141f734056a2b050c4c08ff5ea3bf2a55c5355aae
SHA256ab67ad6bb1237b1b2bec16db1911580f5d905b5f557ddb2ec3afc85cc730547c
SHA5125882c00772f9ef85c7af8fe0ab2658ded3dbe7052f8515b47a802503d11796b8b8af6d17015597b2f76374e60e5186fa5383a40e6569b3b75ba535f89696fb1c
-
Filesize
356KB
MD5dc07ab5ac44c611d7490e0a1cc6b3803
SHA141f734056a2b050c4c08ff5ea3bf2a55c5355aae
SHA256ab67ad6bb1237b1b2bec16db1911580f5d905b5f557ddb2ec3afc85cc730547c
SHA5125882c00772f9ef85c7af8fe0ab2658ded3dbe7052f8515b47a802503d11796b8b8af6d17015597b2f76374e60e5186fa5383a40e6569b3b75ba535f89696fb1c