Analysis
-
max time kernel
131s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe
Resource
win10v2004-20230220-en
General
-
Target
12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe
-
Size
686KB
-
MD5
86ad10fdd51cb2ccfe6bf0f97a099610
-
SHA1
43a2d2ff7e87a566ce202987a1d57c6ed8dd3883
-
SHA256
12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c
-
SHA512
c791e6e0a6972ed3682feb7e25a61e8fba5cddfe5811ffe84e235e89a4edcfe9f0e0b0cd9ea2402710418869e156a735b04dfbabad36b90b65b3fc24385f06d5
-
SSDEEP
12288:bMrSy90p3a//LOWQGev5F+Cos/LuF7VTIK5iP5NVSmqoa/D:1yia/SWg5gCXLgiRQb
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0184.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0184.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2768-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-190-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-193-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-199-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-203-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-205-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-209-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-214-0x0000000007280000-0x0000000007290000-memory.dmp family_redline behavioral1/memory/2768-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-217-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-219-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-221-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-223-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-225-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2768-227-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4824 un496627.exe 2596 pro0184.exe 2768 qu7020.exe 4752 si924482.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0184.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un496627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un496627.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1856 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3536 2596 WerFault.exe 86 4908 2768 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2596 pro0184.exe 2596 pro0184.exe 2768 qu7020.exe 2768 qu7020.exe 4752 si924482.exe 4752 si924482.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2596 pro0184.exe Token: SeDebugPrivilege 2768 qu7020.exe Token: SeDebugPrivilege 4752 si924482.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4824 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 85 PID 4112 wrote to memory of 4824 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 85 PID 4112 wrote to memory of 4824 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 85 PID 4824 wrote to memory of 2596 4824 un496627.exe 86 PID 4824 wrote to memory of 2596 4824 un496627.exe 86 PID 4824 wrote to memory of 2596 4824 un496627.exe 86 PID 4824 wrote to memory of 2768 4824 un496627.exe 92 PID 4824 wrote to memory of 2768 4824 un496627.exe 92 PID 4824 wrote to memory of 2768 4824 un496627.exe 92 PID 4112 wrote to memory of 4752 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 96 PID 4112 wrote to memory of 4752 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 96 PID 4112 wrote to memory of 4752 4112 12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe"C:\Users\Admin\AppData\Local\Temp\12ef38c9bd95d4ae186fdf54aa627d418c94c1b720f73c347b22c8457042755c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496627.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496627.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0184.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 10804⤵
- Program crash
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7020.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 18244⤵
- Program crash
PID:4908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si924482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si924482.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2596 -ip 25961⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2768 -ip 27681⤵PID:3232
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e0f7e496e6ca96ab54203221b67008d4
SHA1f5d97bd9d7c88160ccc3abde29229eb9cdf9c20a
SHA256824ade640b4257de236e8e2e04734c105b95bcd99a8ccede6e0432f2ea3e3ff7
SHA512515e47849e1424d33fba8af773bb800f6e95ab5e99fa4bfc94062bc8f665d263026f334d31020bbebce3c783e62b8e91f92f3fcb78ea74c8c13c5b88588b5798
-
Filesize
175KB
MD5e0f7e496e6ca96ab54203221b67008d4
SHA1f5d97bd9d7c88160ccc3abde29229eb9cdf9c20a
SHA256824ade640b4257de236e8e2e04734c105b95bcd99a8ccede6e0432f2ea3e3ff7
SHA512515e47849e1424d33fba8af773bb800f6e95ab5e99fa4bfc94062bc8f665d263026f334d31020bbebce3c783e62b8e91f92f3fcb78ea74c8c13c5b88588b5798
-
Filesize
544KB
MD58d076ac084959c441373a184d301f217
SHA1926d23b998531ba63d45ffbcc0e40b360ea46510
SHA256cc9ce8a0f1d9b22622c86bbe00c15903f15e808dffdd2048ae5734696247fef2
SHA512e4fe297586dc0bc1b8f3fd602fd6ceb2888346aad49a1dbf971ed3687c3b644e05c1724419f2d25420d039184b2146739de3bfaef74abf59b93363cf3054d7d9
-
Filesize
544KB
MD58d076ac084959c441373a184d301f217
SHA1926d23b998531ba63d45ffbcc0e40b360ea46510
SHA256cc9ce8a0f1d9b22622c86bbe00c15903f15e808dffdd2048ae5734696247fef2
SHA512e4fe297586dc0bc1b8f3fd602fd6ceb2888346aad49a1dbf971ed3687c3b644e05c1724419f2d25420d039184b2146739de3bfaef74abf59b93363cf3054d7d9
-
Filesize
326KB
MD5d5e464263e776905e7ee196e8c7b4e4f
SHA17f85ca0ec8bf7e172bb170e0b6667524daa2d413
SHA2566c9b14e4bfe0e621f5c8242746955f9e5bdf10647920274a92044c41cbcb2541
SHA512fbbd3e736fbaa49258f917ee7b5a53d67c1de5a7f92f0bd8b3db2b954b446dcda5ea5e4e1676c7fe9cd346b7c290428e754cd69753efb9db934d6523e28d8252
-
Filesize
326KB
MD5d5e464263e776905e7ee196e8c7b4e4f
SHA17f85ca0ec8bf7e172bb170e0b6667524daa2d413
SHA2566c9b14e4bfe0e621f5c8242746955f9e5bdf10647920274a92044c41cbcb2541
SHA512fbbd3e736fbaa49258f917ee7b5a53d67c1de5a7f92f0bd8b3db2b954b446dcda5ea5e4e1676c7fe9cd346b7c290428e754cd69753efb9db934d6523e28d8252
-
Filesize
384KB
MD593593a1869713c587023b455c0a7001d
SHA1f3fe8d233ba1503bd68d57766f8e23b2d544a73a
SHA2564ef86d0baf6bcc71d207e4c659d94458a3ca05a4bb90d1e9f108533fb74ccab9
SHA512c94284924634b93a02860d808b3fcbbf60483d041e8c4b36498430bf9b66f30305a919adc79606ab8f93540b8192cebaeeba440a36fdd42099a946065e22b2b2
-
Filesize
384KB
MD593593a1869713c587023b455c0a7001d
SHA1f3fe8d233ba1503bd68d57766f8e23b2d544a73a
SHA2564ef86d0baf6bcc71d207e4c659d94458a3ca05a4bb90d1e9f108533fb74ccab9
SHA512c94284924634b93a02860d808b3fcbbf60483d041e8c4b36498430bf9b66f30305a919adc79606ab8f93540b8192cebaeeba440a36fdd42099a946065e22b2b2