Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 12:58
Static task
static1
Behavioral task
behavioral1
Sample
38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe
Resource
win10v2004-20230220-en
General
-
Target
38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe
-
Size
688KB
-
MD5
7d4b392d8b42f16971fd4302b755d4b2
-
SHA1
7dade609632cee1848eff1cc8fec91aae824a007
-
SHA256
38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec
-
SHA512
d5fa1d9e6ad57cae84232a317eb253ba95552dd7e5d4b8bc7d73a2c7b2683e50e9efd88e03f4b0eafe4b5c7ba9af021d21f94a2c97e006f81c319227c714bcef
-
SSDEEP
12288:TMrCy90Obk79QSTI8ihIhvqIO3rygicZM0aQVi9Viv:FyJWySTshYyH99xWMv
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
firmu
193.233.20.32:4125
-
auth_value
9f3e5e35e4a3a38fc36c5a851728aa33
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9929.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9929.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1064-191-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-192-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-194-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-196-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-198-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-200-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-205-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-208-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-210-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-212-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-204-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline behavioral1/memory/1064-214-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-216-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-218-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-220-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-222-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-224-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-226-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/1064-228-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2124 un181200.exe 3780 pro9929.exe 1064 qu9228.exe 3764 si379809.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9929.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9929.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un181200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un181200.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 968 3780 WerFault.exe 86 3876 1064 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3780 pro9929.exe 3780 pro9929.exe 1064 qu9228.exe 1064 qu9228.exe 3764 si379809.exe 3764 si379809.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3780 pro9929.exe Token: SeDebugPrivilege 1064 qu9228.exe Token: SeDebugPrivilege 3764 si379809.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4380 wrote to memory of 2124 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 85 PID 4380 wrote to memory of 2124 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 85 PID 4380 wrote to memory of 2124 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 85 PID 2124 wrote to memory of 3780 2124 un181200.exe 86 PID 2124 wrote to memory of 3780 2124 un181200.exe 86 PID 2124 wrote to memory of 3780 2124 un181200.exe 86 PID 2124 wrote to memory of 1064 2124 un181200.exe 92 PID 2124 wrote to memory of 1064 2124 un181200.exe 92 PID 2124 wrote to memory of 1064 2124 un181200.exe 92 PID 4380 wrote to memory of 3764 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 96 PID 4380 wrote to memory of 3764 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 96 PID 4380 wrote to memory of 3764 4380 38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe"C:\Users\Admin\AppData\Local\Temp\38bbd348773c7ff9ac5d51dc5337fc4baf9da5083fbfec1d7cceb10ec50adcec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181200.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9929.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9929.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 10884⤵
- Program crash
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9228.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9228.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 20084⤵
- Program crash
PID:3876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379809.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3780 -ip 37801⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1064 -ip 10641⤵PID:2544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
546KB
MD5ec0942c333d62a067905b6133b5906ca
SHA11186a25cbcb1919497b7b1fddbb797135a501826
SHA25679e67ad7208f2613c9dd7cc1824d7b7be4420e0fa90e05bcaa529c192c104c76
SHA512ce2a1268a833dc0f1a03c3a92229c1c565b20a6fc53f408ecb06f102ff03944f21f8e401b65660df192160ad8852c44dd3108be9cecf60ff8ab09e90443eb1af
-
Filesize
546KB
MD5ec0942c333d62a067905b6133b5906ca
SHA11186a25cbcb1919497b7b1fddbb797135a501826
SHA25679e67ad7208f2613c9dd7cc1824d7b7be4420e0fa90e05bcaa529c192c104c76
SHA512ce2a1268a833dc0f1a03c3a92229c1c565b20a6fc53f408ecb06f102ff03944f21f8e401b65660df192160ad8852c44dd3108be9cecf60ff8ab09e90443eb1af
-
Filesize
325KB
MD5804e2850c8e4e5c22505311a68f774ba
SHA1ca62d6fc6161db3750825c9a17aa45276906da76
SHA2561379d3bb90f59c05cf3de623760d4c2392fa39edcb2683cebffd14f428cc1d39
SHA512642107092240e420987a7e12c5322556523484f4d46231959fc1fd0e05292c1d91e021e50a7b44cbe451396d418a7956f0e39e34a8b50835e3b586a6e2b107c4
-
Filesize
325KB
MD5804e2850c8e4e5c22505311a68f774ba
SHA1ca62d6fc6161db3750825c9a17aa45276906da76
SHA2561379d3bb90f59c05cf3de623760d4c2392fa39edcb2683cebffd14f428cc1d39
SHA512642107092240e420987a7e12c5322556523484f4d46231959fc1fd0e05292c1d91e021e50a7b44cbe451396d418a7956f0e39e34a8b50835e3b586a6e2b107c4
-
Filesize
382KB
MD514a5e2dc831fa8afcdc3ad1e69a419d9
SHA14021685688b60f6d7b99e0cb1f388bdc549581d3
SHA2561f4a71ebeacc58a6c7b79aef0f642db1c8f9d64ab8b7d2f1d83169f8f07568dc
SHA5121ed8a6b31efa9e83008b94b8cc0e22a9078ef9e461292aa749a421b23893b885bb5838a161ae2286dbd632979f8a459a4a21b8f5c59552d1dab2af1eb4ab604f
-
Filesize
382KB
MD514a5e2dc831fa8afcdc3ad1e69a419d9
SHA14021685688b60f6d7b99e0cb1f388bdc549581d3
SHA2561f4a71ebeacc58a6c7b79aef0f642db1c8f9d64ab8b7d2f1d83169f8f07568dc
SHA5121ed8a6b31efa9e83008b94b8cc0e22a9078ef9e461292aa749a421b23893b885bb5838a161ae2286dbd632979f8a459a4a21b8f5c59552d1dab2af1eb4ab604f