Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe
Resource
win10v2004-20230220-en
General
-
Target
6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe
-
Size
686KB
-
MD5
8a351fb07109b5313380d8c59f0848a2
-
SHA1
27006ef799e8511b72ce3cf57b118b447db6b190
-
SHA256
6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3
-
SHA512
b645d3335c2ce2ed051be224d459602e9b01253568dc0f7d69ed18079806736c7c979f7cd601ce274abdc017294c89c7a851eac06e12e99216345e85ab401f0a
-
SSDEEP
12288:KMrmy908qC7k1yjxdrL//+Fti7N7VTIJ3iwPnVLds9YV:gyNq4k1yNN7mFtsQ5iO1EYV
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2210.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4296-191-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-192-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-194-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-196-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-198-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-200-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-202-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-204-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-206-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-208-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-211-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-214-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-218-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-220-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-222-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-224-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-228-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4296-226-0x0000000007150000-0x000000000718F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4184 un245704.exe 4736 pro2210.exe 4296 qu3638.exe 4784 si232727.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2210.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2210.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un245704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un245704.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5064 4736 WerFault.exe 84 1196 4296 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4736 pro2210.exe 4736 pro2210.exe 4296 qu3638.exe 4296 qu3638.exe 4784 si232727.exe 4784 si232727.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4736 pro2210.exe Token: SeDebugPrivilege 4296 qu3638.exe Token: SeDebugPrivilege 4784 si232727.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4184 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 83 PID 1504 wrote to memory of 4184 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 83 PID 1504 wrote to memory of 4184 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 83 PID 4184 wrote to memory of 4736 4184 un245704.exe 84 PID 4184 wrote to memory of 4736 4184 un245704.exe 84 PID 4184 wrote to memory of 4736 4184 un245704.exe 84 PID 4184 wrote to memory of 4296 4184 un245704.exe 90 PID 4184 wrote to memory of 4296 4184 un245704.exe 90 PID 4184 wrote to memory of 4296 4184 un245704.exe 90 PID 1504 wrote to memory of 4784 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 94 PID 1504 wrote to memory of 4784 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 94 PID 1504 wrote to memory of 4784 1504 6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe"C:\Users\Admin\AppData\Local\Temp\6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10804⤵
- Program crash
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 17564⤵
- Program crash
PID:1196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4736 -ip 47361⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4296 -ip 42961⤵PID:2144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5df9baae013ed51bfb0e889cfffe7b6d2
SHA1fd1f10ad96d5c5787e4d0600ac3199b51b23081e
SHA2560d1321bb46aadae262243b5fa14c22c7282ba67726f04ae57d6c87a622da19f8
SHA5122356bdcc0cd5f6ff7c2cf30bb5925819444e53399c67c9171850990b685454809adfbb4cf45202ecd5ddd51c41edc9067b74b5e81c832e99c5799874e058fbb2
-
Filesize
175KB
MD5df9baae013ed51bfb0e889cfffe7b6d2
SHA1fd1f10ad96d5c5787e4d0600ac3199b51b23081e
SHA2560d1321bb46aadae262243b5fa14c22c7282ba67726f04ae57d6c87a622da19f8
SHA5122356bdcc0cd5f6ff7c2cf30bb5925819444e53399c67c9171850990b685454809adfbb4cf45202ecd5ddd51c41edc9067b74b5e81c832e99c5799874e058fbb2
-
Filesize
544KB
MD5120199ef863c341519bf46098043defe
SHA1adda16d112099e56c8000a85a505bcbfdd37d63f
SHA25606c8c9e7268c93d3e3a1bf5c242af7f34d4895885792c4436c1945445869d30d
SHA5125fd29db9a4f82fc4907472fe81cfcbb4f2b89b8c3ba8ff501d8e5b16eb722d0ca779e4aab8b19705bbce866dd30f9fc9c580ea749c4040a9594a7678e7f746a7
-
Filesize
544KB
MD5120199ef863c341519bf46098043defe
SHA1adda16d112099e56c8000a85a505bcbfdd37d63f
SHA25606c8c9e7268c93d3e3a1bf5c242af7f34d4895885792c4436c1945445869d30d
SHA5125fd29db9a4f82fc4907472fe81cfcbb4f2b89b8c3ba8ff501d8e5b16eb722d0ca779e4aab8b19705bbce866dd30f9fc9c580ea749c4040a9594a7678e7f746a7
-
Filesize
326KB
MD571df80bd3a42b603bdd5b93ad5a48007
SHA17fb9b5b06b30824737f86ec6d3b8f3a0fc22dc70
SHA2565e01f2d2e6e4da5129af0579d1696892e95a90612fba66f226e2b332917c3f76
SHA51298255a4fbea89ac79faf2e960ab8cd8a1bf42ec65cf270f420dab691da7e1e9f4407123fa016ed2cbe32699f294de226b99a30b007ab301479375472efa52a39
-
Filesize
326KB
MD571df80bd3a42b603bdd5b93ad5a48007
SHA17fb9b5b06b30824737f86ec6d3b8f3a0fc22dc70
SHA2565e01f2d2e6e4da5129af0579d1696892e95a90612fba66f226e2b332917c3f76
SHA51298255a4fbea89ac79faf2e960ab8cd8a1bf42ec65cf270f420dab691da7e1e9f4407123fa016ed2cbe32699f294de226b99a30b007ab301479375472efa52a39
-
Filesize
384KB
MD50eb8613915f64af0021032f7280c9855
SHA18fbf864dd085d9e30dcedbedc228b0425bf31f43
SHA2568cc9d56206bba7790b59e867de9e1ea7f7a25ee82d6b83952f9375e4d48cf9c1
SHA512532e01206f7ee4e9b26073acd6ee2192e1cc4b84e9cf2b0afded8894a1651b45ed85c191d63ed9bf91f03feb5850e17475e5104b6202c641fd71de9306c2607a
-
Filesize
384KB
MD50eb8613915f64af0021032f7280c9855
SHA18fbf864dd085d9e30dcedbedc228b0425bf31f43
SHA2568cc9d56206bba7790b59e867de9e1ea7f7a25ee82d6b83952f9375e4d48cf9c1
SHA512532e01206f7ee4e9b26073acd6ee2192e1cc4b84e9cf2b0afded8894a1651b45ed85c191d63ed9bf91f03feb5850e17475e5104b6202c641fd71de9306c2607a