Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe
Resource
win10v2004-20230221-en
General
-
Target
8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe
-
Size
688KB
-
MD5
43583372303621c7eacab22dba09c7f4
-
SHA1
a5196ff3d26dd7ee94c6d7627e875733f9bb4ca5
-
SHA256
8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8
-
SHA512
97eb790504495abbdc83e4bec4494d368ade4b1e9f86935f4434ca353d840c4db282d92cb4b18354946571fd71ae45ecd7edcf8be032e68501600e32ac89e922
-
SSDEEP
12288:IMr8y906I5IzPc98hC4NzmUtAH7rQww/zHLL7EQh78BMqzhkeW8FS:UyNDcehC4NzxynQyQbMg
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3508-194-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-195-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-197-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-199-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-201-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-203-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-205-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-207-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-209-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-211-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-213-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-215-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-218-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-220-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-222-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-224-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-226-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-228-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3508-1112-0x0000000007200000-0x0000000007210000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4560 un355204.exe 4660 pro6566.exe 3508 qu1331.exe 3456 si164503.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6566.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un355204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355204.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4100 4660 WerFault.exe 85 5064 3508 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4660 pro6566.exe 4660 pro6566.exe 3508 qu1331.exe 3508 qu1331.exe 3456 si164503.exe 3456 si164503.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4660 pro6566.exe Token: SeDebugPrivilege 3508 qu1331.exe Token: SeDebugPrivilege 3456 si164503.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4560 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 84 PID 4772 wrote to memory of 4560 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 84 PID 4772 wrote to memory of 4560 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 84 PID 4560 wrote to memory of 4660 4560 un355204.exe 85 PID 4560 wrote to memory of 4660 4560 un355204.exe 85 PID 4560 wrote to memory of 4660 4560 un355204.exe 85 PID 4560 wrote to memory of 3508 4560 un355204.exe 91 PID 4560 wrote to memory of 3508 4560 un355204.exe 91 PID 4560 wrote to memory of 3508 4560 un355204.exe 91 PID 4772 wrote to memory of 3456 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 95 PID 4772 wrote to memory of 3456 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 95 PID 4772 wrote to memory of 3456 4772 8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe"C:\Users\Admin\AppData\Local\Temp\8c2e7e6e6f869a3bd8ecede5edc311641acf728ab75be29919ca8318d4ed24f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355204.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6566.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10804⤵
- Program crash
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1331.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 13364⤵
- Program crash
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164503.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164503.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4660 -ip 46601⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3508 -ip 35081⤵PID:4352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
545KB
MD5c462960120fa0d2ba302e23e8b9ead08
SHA1c375a75c5e9133ab3461b30814237abb95c4aacf
SHA256f2f84006c09cbd2a8f12e20c305199e23c3bca0667d35fe077216c79a118be12
SHA512fdf4bfafaa2c1af0a83eb4f921cc88d2c52544bf50eeb85f5960d926627e0399960e47bd41eddae67b42940d6988e93469954e882ab6e9a01dee17a33a95a673
-
Filesize
545KB
MD5c462960120fa0d2ba302e23e8b9ead08
SHA1c375a75c5e9133ab3461b30814237abb95c4aacf
SHA256f2f84006c09cbd2a8f12e20c305199e23c3bca0667d35fe077216c79a118be12
SHA512fdf4bfafaa2c1af0a83eb4f921cc88d2c52544bf50eeb85f5960d926627e0399960e47bd41eddae67b42940d6988e93469954e882ab6e9a01dee17a33a95a673
-
Filesize
325KB
MD539a3c61bad8dbd53315054e044e61445
SHA1ad78906ff886b6e4c42fbc1abca79e7c17498c54
SHA2562747dbf5e9223e9fdcb17d7ab2078de873b7731460b395277c4694a3d7efa73f
SHA512a26dd50feb93a599466034718bee5be1f4add641409f59e6e42cc7e9335545531f27abe47082641d9bb0bb06455de6aecf92edbc672cb2ddcf5003870fe9f53d
-
Filesize
325KB
MD539a3c61bad8dbd53315054e044e61445
SHA1ad78906ff886b6e4c42fbc1abca79e7c17498c54
SHA2562747dbf5e9223e9fdcb17d7ab2078de873b7731460b395277c4694a3d7efa73f
SHA512a26dd50feb93a599466034718bee5be1f4add641409f59e6e42cc7e9335545531f27abe47082641d9bb0bb06455de6aecf92edbc672cb2ddcf5003870fe9f53d
-
Filesize
383KB
MD5f0aa8250dbd75143f8be643afb79b93e
SHA1870d783872bb1c0f867238c03b215281e393d22b
SHA2569231f0e2fab0ffdcb557bee373d49b5ce1dd923c27d56b2295327f724b6c741d
SHA5122b74037a0054a3882902a6bb753b7e66411c264120fd58859900f2c511bc1691befb6513fac79c6416d0419922da741279667a6ae8f60fe277de0892888158d3
-
Filesize
383KB
MD5f0aa8250dbd75143f8be643afb79b93e
SHA1870d783872bb1c0f867238c03b215281e393d22b
SHA2569231f0e2fab0ffdcb557bee373d49b5ce1dd923c27d56b2295327f724b6c741d
SHA5122b74037a0054a3882902a6bb753b7e66411c264120fd58859900f2c511bc1691befb6513fac79c6416d0419922da741279667a6ae8f60fe277de0892888158d3