Analysis
-
max time kernel
78s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe
Resource
win10v2004-20230221-en
General
-
Target
c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe
-
Size
691KB
-
MD5
b612f78f272281643670255cd166d42c
-
SHA1
ad6df7a1804a5caf4567aa331b7544a6e58799a0
-
SHA256
c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a
-
SHA512
5f634c6c78f2de1afd2a5468e67881dc19e2ab7a16f2c202edefc620c6cdc3536a19545e0af2c314413db669880ab42797caaf827c2ef1c5bb4bd942d72f11bd
-
SSDEEP
12288:WMrFy90oZECEqB0DOImWbgti8U4awyZgKZOuQwYDp:Hy3ZE0qDOsbJ94uZqfwkp
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8952.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8952.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3672-191-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-192-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-194-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-196-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-198-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-200-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-202-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-205-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-208-0x0000000007260000-0x0000000007270000-memory.dmp family_redline behavioral1/memory/3672-212-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-209-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-214-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-216-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-218-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-220-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-222-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-224-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-226-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-228-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/3672-1113-0x0000000007260000-0x0000000007270000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4204 unio8894.exe 4492 pro8952.exe 3672 qu4576.exe 2712 si693842.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8952.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio8894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8894.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4716 4492 WerFault.exe 87 2560 3672 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4492 pro8952.exe 4492 pro8952.exe 3672 qu4576.exe 3672 qu4576.exe 2712 si693842.exe 2712 si693842.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4492 pro8952.exe Token: SeDebugPrivilege 3672 qu4576.exe Token: SeDebugPrivilege 2712 si693842.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4204 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 86 PID 4176 wrote to memory of 4204 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 86 PID 4176 wrote to memory of 4204 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 86 PID 4204 wrote to memory of 4492 4204 unio8894.exe 87 PID 4204 wrote to memory of 4492 4204 unio8894.exe 87 PID 4204 wrote to memory of 4492 4204 unio8894.exe 87 PID 4204 wrote to memory of 3672 4204 unio8894.exe 98 PID 4204 wrote to memory of 3672 4204 unio8894.exe 98 PID 4204 wrote to memory of 3672 4204 unio8894.exe 98 PID 4176 wrote to memory of 2712 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 104 PID 4176 wrote to memory of 2712 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 104 PID 4176 wrote to memory of 2712 4176 c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe"C:\Users\Admin\AppData\Local\Temp\c9f3acb8c701310fb6c9dff815f3d6feb9cb790206c98b03ddcda9df2873cd3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8894.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8952.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 3364⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4576.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4576.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 13484⤵
- Program crash
PID:2560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693842.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693842.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4492 -ip 44921⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3672 -ip 36721⤵PID:2104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD525320540698d33b8336c5d485a3359a6
SHA1d12926e9186c705ac1dc55af860251b9da121007
SHA25699a8e1d856324af02ea79d89497d912bf0a3c43a58f8b9f2f287f38d2c8791a8
SHA512f61be09b01c82b7d15efbabe2439d0496e1056c5b340ffdbe5e430eada2f45bb28b141c7604281e642821696ee36006b468c7b2893064cac4fc6b3cc31df24c8
-
Filesize
175KB
MD525320540698d33b8336c5d485a3359a6
SHA1d12926e9186c705ac1dc55af860251b9da121007
SHA25699a8e1d856324af02ea79d89497d912bf0a3c43a58f8b9f2f287f38d2c8791a8
SHA512f61be09b01c82b7d15efbabe2439d0496e1056c5b340ffdbe5e430eada2f45bb28b141c7604281e642821696ee36006b468c7b2893064cac4fc6b3cc31df24c8
-
Filesize
549KB
MD57f64ae356ca608166c070e27ba1bb961
SHA1ce329190712a9a3b9b6ffa5b4d50ad06ddeed4f5
SHA25626daef72685917373c1e8a5ca9cf368f2da5ce81460abb19861ecd2a7ca0bbed
SHA5123baebfc98385157e10acf7ab419900f03e637f5291e6afcd3a0fa8f0f993c3ccfe19defed3a688ba5afc60b97bee54f1290328077195efd13d8ba17596637346
-
Filesize
549KB
MD57f64ae356ca608166c070e27ba1bb961
SHA1ce329190712a9a3b9b6ffa5b4d50ad06ddeed4f5
SHA25626daef72685917373c1e8a5ca9cf368f2da5ce81460abb19861ecd2a7ca0bbed
SHA5123baebfc98385157e10acf7ab419900f03e637f5291e6afcd3a0fa8f0f993c3ccfe19defed3a688ba5afc60b97bee54f1290328077195efd13d8ba17596637346
-
Filesize
329KB
MD528cbd126f282b9ab836538261eac4cd9
SHA1d9228720576b1c1f9f28505d46cf89bbbb53d01c
SHA2561145813f7735a4186f488b16f56ff49209050832b67db705bea83ba6ffd16d95
SHA512327462834c263a9d7259cbbb381e0e9ada5f0bb88fc74e625f1d540b8b39e8719d7e3bf2a16de37a9875cec0ffe9150b507a33e359936f7b78559463c983b76a
-
Filesize
329KB
MD528cbd126f282b9ab836538261eac4cd9
SHA1d9228720576b1c1f9f28505d46cf89bbbb53d01c
SHA2561145813f7735a4186f488b16f56ff49209050832b67db705bea83ba6ffd16d95
SHA512327462834c263a9d7259cbbb381e0e9ada5f0bb88fc74e625f1d540b8b39e8719d7e3bf2a16de37a9875cec0ffe9150b507a33e359936f7b78559463c983b76a
-
Filesize
387KB
MD5029dcc199cae5e26af5e03f6bb2a8d4b
SHA1b29d54844e8ac67ff0e00f3f66f956605947dcd4
SHA2566fb93fc563155dda7b9c7db051e75e00db9b5346a968c88d17d35690a7305d4c
SHA512453a4a3373d1da16343496dd93ac73bf75c8ac9ee7a6ad7e89bb71a504fe707300f97539784b9e310ac8b7ef1c6693ab510059cd8d61e52d75e27e0b6e0980ce
-
Filesize
387KB
MD5029dcc199cae5e26af5e03f6bb2a8d4b
SHA1b29d54844e8ac67ff0e00f3f66f956605947dcd4
SHA2566fb93fc563155dda7b9c7db051e75e00db9b5346a968c88d17d35690a7305d4c
SHA512453a4a3373d1da16343496dd93ac73bf75c8ac9ee7a6ad7e89bb71a504fe707300f97539784b9e310ac8b7ef1c6693ab510059cd8d61e52d75e27e0b6e0980ce