Analysis
-
max time kernel
87s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe
Resource
win10v2004-20230220-en
General
-
Target
d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe
-
Size
688KB
-
MD5
b254d548f860743b8ded8174f3ecdb1a
-
SHA1
d2da541eb0d3beb63780b9063839067c4e98492f
-
SHA256
d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb
-
SHA512
274f23a984f98b29b7323b4eb88e5c05c41887dccc9ead07306c545e37ed37f0176a25f80d0bd3438f67dd5f0b071bf3e766cee354afa89714d32ba1ceb45095
-
SSDEEP
12288:0MrWy90oEr4rlDJtLIN7npqWnrne+wJhTqIO3XyWePP0aRkdrUnE:iyvErEtLIW4neDmzCPsxdrv
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
firmu
193.233.20.32:4125
-
auth_value
9f3e5e35e4a3a38fc36c5a851728aa33
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6546.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1440-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1440-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 316 un444316.exe 4396 pro6546.exe 1440 qu7886.exe 3180 si432157.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6546.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un444316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un444316.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4652 4396 WerFault.exe 83 3440 1440 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4396 pro6546.exe 4396 pro6546.exe 1440 qu7886.exe 1440 qu7886.exe 3180 si432157.exe 3180 si432157.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4396 pro6546.exe Token: SeDebugPrivilege 1440 qu7886.exe Token: SeDebugPrivilege 3180 si432157.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 432 wrote to memory of 316 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 82 PID 432 wrote to memory of 316 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 82 PID 432 wrote to memory of 316 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 82 PID 316 wrote to memory of 4396 316 un444316.exe 83 PID 316 wrote to memory of 4396 316 un444316.exe 83 PID 316 wrote to memory of 4396 316 un444316.exe 83 PID 316 wrote to memory of 1440 316 un444316.exe 87 PID 316 wrote to memory of 1440 316 un444316.exe 87 PID 316 wrote to memory of 1440 316 un444316.exe 87 PID 432 wrote to memory of 3180 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 92 PID 432 wrote to memory of 3180 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 92 PID 432 wrote to memory of 3180 432 d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe"C:\Users\Admin\AppData\Local\Temp\d62906d98cb4da493ecf57496a75754251b1e722d3ad183d3429c5c88347a8cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6546.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 10844⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7886.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 17644⤵
- Program crash
PID:3440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432157.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432157.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4396 -ip 43961⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1440 -ip 14401⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
175KB
MD56b780eb9c71d7b15142e05f33765678b
SHA11b853b28e715a7c7a8e4a39567e7b22697265741
SHA2562067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76
SHA512a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314
-
Filesize
546KB
MD5c4097b97d4bf533f0a0131d0fbd4a1e4
SHA1bbb71c7be94944eb8f7c3f7f02cfb6b686b12dcd
SHA25659a222b70df72cd20d795b417aefda0cdaa7d51aeb594bc962e79d5fb5fd69a4
SHA5120152ff2ba22c002a256bafef887ac061284759a6d10615a930e9275c9febed30d94508f97565c035a33db042e9e07b84993560945e9aae10b3670406b4018bbb
-
Filesize
546KB
MD5c4097b97d4bf533f0a0131d0fbd4a1e4
SHA1bbb71c7be94944eb8f7c3f7f02cfb6b686b12dcd
SHA25659a222b70df72cd20d795b417aefda0cdaa7d51aeb594bc962e79d5fb5fd69a4
SHA5120152ff2ba22c002a256bafef887ac061284759a6d10615a930e9275c9febed30d94508f97565c035a33db042e9e07b84993560945e9aae10b3670406b4018bbb
-
Filesize
325KB
MD5afe5fd3de54c9af89d738f9b9a480d42
SHA13834bce01d35eed96aa04c556e92ae95665f68eb
SHA256648803c70a4fefe90529fc22d22f28df2d9df21da79899abcb89eea8568dd6c6
SHA512be7d05e918a141c4b0ff7d53163210991cff1b2541e8e1497edf371f9eacb41613440ce4a429626d9d0113a838b1c74dfdcbe925e84b1b066970c91c17070ae7
-
Filesize
325KB
MD5afe5fd3de54c9af89d738f9b9a480d42
SHA13834bce01d35eed96aa04c556e92ae95665f68eb
SHA256648803c70a4fefe90529fc22d22f28df2d9df21da79899abcb89eea8568dd6c6
SHA512be7d05e918a141c4b0ff7d53163210991cff1b2541e8e1497edf371f9eacb41613440ce4a429626d9d0113a838b1c74dfdcbe925e84b1b066970c91c17070ae7
-
Filesize
382KB
MD59dea52c8b87458eb7fc48f393bdbd831
SHA1f4162b84bde3d68a087bb4da82435c2028dc0d4e
SHA25663c241596e383680cb5c72acde5c3a56869243e1c64fd92e1fdf633a5e26d897
SHA5122f2accd6b1935c09ddb3f815a014681a9514c4d3417d1a8e9373954d99e1d9f7f2257a5d47cbad3cd5801afb34298f5b3ebc33e79b9b61709000c73706728f4c
-
Filesize
382KB
MD59dea52c8b87458eb7fc48f393bdbd831
SHA1f4162b84bde3d68a087bb4da82435c2028dc0d4e
SHA25663c241596e383680cb5c72acde5c3a56869243e1c64fd92e1fdf633a5e26d897
SHA5122f2accd6b1935c09ddb3f815a014681a9514c4d3417d1a8e9373954d99e1d9f7f2257a5d47cbad3cd5801afb34298f5b3ebc33e79b9b61709000c73706728f4c