Analysis
-
max time kernel
79s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 11:21
Static task
static1
Behavioral task
behavioral1
Sample
536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe
Resource
win10v2004-20230221-en
General
-
Target
536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe
-
Size
688KB
-
MD5
d96660f011cecbf930925e455e5a01d9
-
SHA1
5c4a4d5661e4f6fafd1a68412d96d16670df52bb
-
SHA256
536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404
-
SHA512
a9a4e846f3837a01ce54c28dc92f3a788927d13fa2eb9275322c0a98522a6c17998b01f42f8ae99fd9d7dd7c64b02fcf550f9f2c6209f3b66b57848e88f6d2a2
-
SSDEEP
12288:0MrOy90uB+DPhk7UNh7/6iCqMxZSNydFj099RF3ezDXkoV6LSfy8EgC6:CylqPhk7ShGiqdh29RF3ezooVCSDE/6
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
firmu
193.233.20.32:4125
-
auth_value
9f3e5e35e4a3a38fc36c5a851728aa33
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9373.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1784-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-196-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-202-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/1784-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5088 un022702.exe 3508 pro9373.exe 1784 qu6569.exe 4876 si121492.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9373.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un022702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un022702.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2036 3508 WerFault.exe 85 4508 1784 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3508 pro9373.exe 3508 pro9373.exe 1784 qu6569.exe 1784 qu6569.exe 4876 si121492.exe 4876 si121492.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3508 pro9373.exe Token: SeDebugPrivilege 1784 qu6569.exe Token: SeDebugPrivilege 4876 si121492.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4792 wrote to memory of 5088 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 84 PID 4792 wrote to memory of 5088 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 84 PID 4792 wrote to memory of 5088 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 84 PID 5088 wrote to memory of 3508 5088 un022702.exe 85 PID 5088 wrote to memory of 3508 5088 un022702.exe 85 PID 5088 wrote to memory of 3508 5088 un022702.exe 85 PID 5088 wrote to memory of 1784 5088 un022702.exe 97 PID 5088 wrote to memory of 1784 5088 un022702.exe 97 PID 5088 wrote to memory of 1784 5088 un022702.exe 97 PID 4792 wrote to memory of 4876 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 101 PID 4792 wrote to memory of 4876 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 101 PID 4792 wrote to memory of 4876 4792 536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe"C:\Users\Admin\AppData\Local\Temp\536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 10924⤵
- Program crash
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 13724⤵
- Program crash
PID:4508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3508 -ip 35081⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1784 -ip 17841⤵PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
546KB
MD5cde24b89a93958c36de6ee910b43cad7
SHA1d00d4168d4b66a2b61ee819d215a26514f781d41
SHA2562810f24c5ce62a7a56b1a944c320b6766da1302b5b452dfe73166ddbf96860eb
SHA5128979b0e5653f36dc725afb0abbd861fd693dd29cadce1128e172a901433be44102e3aa990a60433dc871b6939d34fe619804fa5e0064a414ca41dff1d3e25f4f
-
Filesize
546KB
MD5cde24b89a93958c36de6ee910b43cad7
SHA1d00d4168d4b66a2b61ee819d215a26514f781d41
SHA2562810f24c5ce62a7a56b1a944c320b6766da1302b5b452dfe73166ddbf96860eb
SHA5128979b0e5653f36dc725afb0abbd861fd693dd29cadce1128e172a901433be44102e3aa990a60433dc871b6939d34fe619804fa5e0064a414ca41dff1d3e25f4f
-
Filesize
328KB
MD5323753131e1274b0f3240424819e7d01
SHA144a35603335b29a1c9307bad9748042f33ba4e97
SHA256632838806adbe78345ba5252d0496e7fe8ec10e65f3b4aa931d4d78c4e559d0d
SHA512cb9d5bf1d4a553f864002c0bfc280fa7f9e8e37479f972d5dfecac534f6101d77c48bd5a6f915dccd2b848ca33b866d629c2d1b25a77f50da32f5b15c4186125
-
Filesize
328KB
MD5323753131e1274b0f3240424819e7d01
SHA144a35603335b29a1c9307bad9748042f33ba4e97
SHA256632838806adbe78345ba5252d0496e7fe8ec10e65f3b4aa931d4d78c4e559d0d
SHA512cb9d5bf1d4a553f864002c0bfc280fa7f9e8e37479f972d5dfecac534f6101d77c48bd5a6f915dccd2b848ca33b866d629c2d1b25a77f50da32f5b15c4186125
-
Filesize
385KB
MD5cd048cc36bef4480f946320a6d736fc1
SHA19a6e424de693f89f7a1593a790a3e22f764101e3
SHA256dbe2e1aa25bca96916fa37ef9713a286f6dea4feaaa2a3ea974456d658e2cb82
SHA512e538ce16d12723ca84a6d881206b5004c79bbe8c288b3f7570518734e872e8a572fdcf905aa1b681e347e7448881372e42365d1967e47c3b8f469e3284916e52
-
Filesize
385KB
MD5cd048cc36bef4480f946320a6d736fc1
SHA19a6e424de693f89f7a1593a790a3e22f764101e3
SHA256dbe2e1aa25bca96916fa37ef9713a286f6dea4feaaa2a3ea974456d658e2cb82
SHA512e538ce16d12723ca84a6d881206b5004c79bbe8c288b3f7570518734e872e8a572fdcf905aa1b681e347e7448881372e42365d1967e47c3b8f469e3284916e52