Analysis
-
max time kernel
102s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 07:12
Static task
static1
Behavioral task
behavioral1
Sample
a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe
Resource
win10v2004-20230220-en
General
-
Target
a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe
-
Size
688KB
-
MD5
d24b186b53f9d4c93b407ad90cd74ecd
-
SHA1
b10da9442bdb40ed7e3fa5bede9fe7e64abbdf38
-
SHA256
a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b
-
SHA512
77e6d3fe1c39fb1f5cdc9327017130e36df1ed8135daff0f1fae0409644f873dd7d5762e3171d599c54140790ab771cecc931fd901988e78cf0a43be5bc4987c
-
SSDEEP
12288:AMrIy90YhCBvK6830sgBMO6EQNNatobxLoqQJybpVF6e6gmFjIRgjVjV9ZoWc:4yxhwvKIqOMQSxcqJFHmFh1o1
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7086.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3116-195-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-198-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-196-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-200-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-202-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-204-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-206-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-208-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-210-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-212-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-214-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-218-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-216-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-220-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-222-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-226-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-224-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/3116-228-0x0000000007710000-0x000000000774F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1120 unio4580.exe 2728 pro7086.exe 3116 qu0515.exe 1552 si085251.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7086.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5060 2728 WerFault.exe 85 4676 3116 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2728 pro7086.exe 2728 pro7086.exe 3116 qu0515.exe 3116 qu0515.exe 1552 si085251.exe 1552 si085251.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2728 pro7086.exe Token: SeDebugPrivilege 3116 qu0515.exe Token: SeDebugPrivilege 1552 si085251.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1120 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 84 PID 1872 wrote to memory of 1120 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 84 PID 1872 wrote to memory of 1120 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 84 PID 1120 wrote to memory of 2728 1120 unio4580.exe 85 PID 1120 wrote to memory of 2728 1120 unio4580.exe 85 PID 1120 wrote to memory of 2728 1120 unio4580.exe 85 PID 1120 wrote to memory of 3116 1120 unio4580.exe 91 PID 1120 wrote to memory of 3116 1120 unio4580.exe 91 PID 1120 wrote to memory of 3116 1120 unio4580.exe 91 PID 1872 wrote to memory of 1552 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 96 PID 1872 wrote to memory of 1552 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 96 PID 1872 wrote to memory of 1552 1872 a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe"C:\Users\Admin\AppData\Local\Temp\a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 10844⤵
- Program crash
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 13484⤵
- Program crash
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2728 -ip 27281⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3116 -ip 31161⤵PID:3684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bdd8a15b31fef779bac8b5d0515bde84
SHA1ae702d9d0e7c9070e5f1e1de19c942c3a562ad71
SHA256c61a707626f34537dfec0f751337728b96c6f816f5c4ecbee31ed637150b8ab6
SHA5125c3eda0027d352cd7bbb54406dbb6dde41fbd641b99df8c338e3445ba1ce4f706bf3de690057975d84ccff2f1ca632826e890024120b2c8a9eada3e81953b65f
-
Filesize
175KB
MD5bdd8a15b31fef779bac8b5d0515bde84
SHA1ae702d9d0e7c9070e5f1e1de19c942c3a562ad71
SHA256c61a707626f34537dfec0f751337728b96c6f816f5c4ecbee31ed637150b8ab6
SHA5125c3eda0027d352cd7bbb54406dbb6dde41fbd641b99df8c338e3445ba1ce4f706bf3de690057975d84ccff2f1ca632826e890024120b2c8a9eada3e81953b65f
-
Filesize
546KB
MD5927ceb1c2cee70966322af24779e9991
SHA11cdb2b440b6061cbe7cb0bfcfb2bfd41a282edfe
SHA256f0d1e42c46405e271b42a36db03f88e738df5f3101d3507e1217e79fcc34faf1
SHA512e1a102992e2d48436626aa9c609a4bcba7cfd7492bcca8b6e3fe4c86616ad0ae2e349ff5b4982d1e2e86a2565d6cd2e5acc752329275ca27dab42d4001ad0cd7
-
Filesize
546KB
MD5927ceb1c2cee70966322af24779e9991
SHA11cdb2b440b6061cbe7cb0bfcfb2bfd41a282edfe
SHA256f0d1e42c46405e271b42a36db03f88e738df5f3101d3507e1217e79fcc34faf1
SHA512e1a102992e2d48436626aa9c609a4bcba7cfd7492bcca8b6e3fe4c86616ad0ae2e349ff5b4982d1e2e86a2565d6cd2e5acc752329275ca27dab42d4001ad0cd7
-
Filesize
328KB
MD579804700263d76df72c31d187b83d207
SHA110ecdd5a342f2ee14a5d0fee08471f75f65ba729
SHA256123b1324dfd9edf2b3f825f7f1ae596f58eafa8d456956e1b8baee006829c84e
SHA5128d8fbc2a4acb719ee8fa5a9f8bbfc117e94eb1e70c47f0447980a40e2a7f981df0c1b3a47bef5c9f05c2234b80b02b2bc9c6a725229f8c96d5c260e2492279ed
-
Filesize
328KB
MD579804700263d76df72c31d187b83d207
SHA110ecdd5a342f2ee14a5d0fee08471f75f65ba729
SHA256123b1324dfd9edf2b3f825f7f1ae596f58eafa8d456956e1b8baee006829c84e
SHA5128d8fbc2a4acb719ee8fa5a9f8bbfc117e94eb1e70c47f0447980a40e2a7f981df0c1b3a47bef5c9f05c2234b80b02b2bc9c6a725229f8c96d5c260e2492279ed
-
Filesize
386KB
MD5311900cb8eb51a37e7494209a5b5fe1f
SHA1edb9d35290083f301bfd44d967c036773170a45f
SHA2569a3b038956a2c7368336c8156c7dbeebc1708ba5a72736f0dae9a236198e7fd7
SHA512c36e278137430ea243fac23983915e61d13d175fe2c766d2e5ad7a5aa17269896613f5809383b8e00d63ed9734e8029fb3d259d0b70db95d77e48e787f957472
-
Filesize
386KB
MD5311900cb8eb51a37e7494209a5b5fe1f
SHA1edb9d35290083f301bfd44d967c036773170a45f
SHA2569a3b038956a2c7368336c8156c7dbeebc1708ba5a72736f0dae9a236198e7fd7
SHA512c36e278137430ea243fac23983915e61d13d175fe2c766d2e5ad7a5aa17269896613f5809383b8e00d63ed9734e8029fb3d259d0b70db95d77e48e787f957472