Analysis
-
max time kernel
80s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe
Resource
win10v2004-20230221-en
General
-
Target
8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe
-
Size
687KB
-
MD5
3b6bd5b4ed4f9ed6a667da92e054c69e
-
SHA1
5d6c26e84110e020fd4013a842c496023f373d03
-
SHA256
8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db
-
SHA512
d64d48bf11001e0cf84a599496c5f4e0c9e9fe3b7e793c569d5195f38847d8841cf1ceb99a9636c8ea92d12233607d21bdab5757feeb0815445e9a46af91b258
-
SSDEEP
12288:jMrwy90wm2gdg/25jI9qzGf55CuvgTyL9ogDApUU1BM4zXkAqeP/wzV7b:7yfm28O0jBGfnN3L9ogUCUIePP/wzRb
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1886.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1886.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/380-192-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-191-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-196-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-198-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-200-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-202-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-204-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-206-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-208-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-210-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-212-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-214-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-216-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-218-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-220-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-222-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-224-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-226-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/380-1111-0x00000000071C0000-0x00000000071D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 732 un800590.exe 432 pro1886.exe 380 qu8409.exe 376 si122582.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1886.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un800590.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un800590.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 540 432 WerFault.exe 87 4392 380 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 432 pro1886.exe 432 pro1886.exe 380 qu8409.exe 380 qu8409.exe 376 si122582.exe 376 si122582.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 432 pro1886.exe Token: SeDebugPrivilege 380 qu8409.exe Token: SeDebugPrivilege 376 si122582.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4816 wrote to memory of 732 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 86 PID 4816 wrote to memory of 732 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 86 PID 4816 wrote to memory of 732 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 86 PID 732 wrote to memory of 432 732 un800590.exe 87 PID 732 wrote to memory of 432 732 un800590.exe 87 PID 732 wrote to memory of 432 732 un800590.exe 87 PID 732 wrote to memory of 380 732 un800590.exe 90 PID 732 wrote to memory of 380 732 un800590.exe 90 PID 732 wrote to memory of 380 732 un800590.exe 90 PID 4816 wrote to memory of 376 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 94 PID 4816 wrote to memory of 376 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 94 PID 4816 wrote to memory of 376 4816 8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe"C:\Users\Admin\AppData\Local\Temp\8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 10804⤵
- Program crash
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 12124⤵
- Program crash
PID:4392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 432 -ip 4321⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 380 -ip 3801⤵PID:976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
545KB
MD5cf4db7ae78e99e15f970055523a0ab83
SHA1250e52ea022d8e3bb406b243e50c26ce45a4a270
SHA2568fad90d92654a72f62639f19966a8ee69c3e7e7ba228676525666595cbb46bb5
SHA5129ad3d423631f0a56fdd7c23ec1db443ae1b8353c68375982591706b119ddbdf23c525a7b48df836da9fe9d6ce0f1406708328437f8fe3e1f38cab6537f2fbbb2
-
Filesize
545KB
MD5cf4db7ae78e99e15f970055523a0ab83
SHA1250e52ea022d8e3bb406b243e50c26ce45a4a270
SHA2568fad90d92654a72f62639f19966a8ee69c3e7e7ba228676525666595cbb46bb5
SHA5129ad3d423631f0a56fdd7c23ec1db443ae1b8353c68375982591706b119ddbdf23c525a7b48df836da9fe9d6ce0f1406708328437f8fe3e1f38cab6537f2fbbb2
-
Filesize
325KB
MD5d4e323940019c98aeef282f7a32a240a
SHA18f101d2e7f6543fb7b7bd9a89e1ee46ba3f9f2c0
SHA2561253adbf5275a6c825fb14e07785089516ef5dda34c8edc6947889f429329e8d
SHA512af12a11a2649fbc12f5ded116a834f7ac39ae7358dd2b673146601011f30122449ed861335cf07ddee0d99a95c219750e22e55de58df55aa330b9daacc28cb16
-
Filesize
325KB
MD5d4e323940019c98aeef282f7a32a240a
SHA18f101d2e7f6543fb7b7bd9a89e1ee46ba3f9f2c0
SHA2561253adbf5275a6c825fb14e07785089516ef5dda34c8edc6947889f429329e8d
SHA512af12a11a2649fbc12f5ded116a834f7ac39ae7358dd2b673146601011f30122449ed861335cf07ddee0d99a95c219750e22e55de58df55aa330b9daacc28cb16
-
Filesize
383KB
MD51e9e0cff15a5fbdb504b5c66d08e1c7d
SHA1eeb3e4fe842bbb29c6512b76d5e005432aa89b14
SHA256f62b71fac4c116b8f78adf01e6efc30698fd466a2d0116c2163d22c13f0b540a
SHA512546764945742119279ac7818df6770e836131d5af904c53bfea08b507467f8b15391c4e6883f5c7fd4efb2a3f3edb9010365f5cac030bd7bc48a9b017f639d84
-
Filesize
383KB
MD51e9e0cff15a5fbdb504b5c66d08e1c7d
SHA1eeb3e4fe842bbb29c6512b76d5e005432aa89b14
SHA256f62b71fac4c116b8f78adf01e6efc30698fd466a2d0116c2163d22c13f0b540a
SHA512546764945742119279ac7818df6770e836131d5af904c53bfea08b507467f8b15391c4e6883f5c7fd4efb2a3f3edb9010365f5cac030bd7bc48a9b017f639d84