Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe
Resource
win10v2004-20230220-en
General
-
Target
b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe
-
Size
687KB
-
MD5
006305a44a9fe801ca1208e9a0e69044
-
SHA1
8aa035b8378eebf0c8e2d8e0f5c5fecd844b085f
-
SHA256
b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee
-
SHA512
6ae081db45d8a1430313b50a191730ab34ff9a1f74d94082fd93826d36de3bdd297c49432fcd64835c1fcb52467edabe7222a7cee5a1fa4384ad1b7b9d856a0d
-
SSDEEP
12288:lMr+y90QeQo/NSSc+HQKl0Nzazd9OrGfe7VTIgmiWr9Y2dQdN:bybeQo/bcmdqFUdaglJiWr9Y2dkN
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1621.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3024-190-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-192-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-196-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-198-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-200-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-202-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-204-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-206-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-208-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-210-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-212-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-214-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-216-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-218-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-220-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-222-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3024-224-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2820 un926738.exe 4960 pro1621.exe 3024 qu4905.exe 4144 si076023.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1621.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un926738.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un926738.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4128 4960 WerFault.exe 85 2836 3024 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4960 pro1621.exe 4960 pro1621.exe 3024 qu4905.exe 3024 qu4905.exe 4144 si076023.exe 4144 si076023.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4960 pro1621.exe Token: SeDebugPrivilege 3024 qu4905.exe Token: SeDebugPrivilege 4144 si076023.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2820 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 84 PID 1696 wrote to memory of 2820 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 84 PID 1696 wrote to memory of 2820 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 84 PID 2820 wrote to memory of 4960 2820 un926738.exe 85 PID 2820 wrote to memory of 4960 2820 un926738.exe 85 PID 2820 wrote to memory of 4960 2820 un926738.exe 85 PID 2820 wrote to memory of 3024 2820 un926738.exe 91 PID 2820 wrote to memory of 3024 2820 un926738.exe 91 PID 2820 wrote to memory of 3024 2820 un926738.exe 91 PID 1696 wrote to memory of 4144 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 95 PID 1696 wrote to memory of 4144 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 95 PID 1696 wrote to memory of 4144 1696 b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe"C:\Users\Admin\AppData\Local\Temp\b8c12b4c38646e3769a448e6bd8f6b5528bfa0b9fb397c31f7448b13d26a1eee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926738.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1621.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1621.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 10844⤵
- Program crash
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4905.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 13484⤵
- Program crash
PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076023.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4960 -ip 49601⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3024 -ip 30241⤵PID:2408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5974204b773af983ccd145412a451e4a8
SHA16d3a2f2b231fc68acd7e12267bc22d9de613258f
SHA256c7f5af1c850ffa25e2026ab6ffdb360f1f77169d56981a4d3e384d9eb1abebda
SHA512232af70b60416707cef27b0a0e66725d19fb50b4364fa1893c3affd15d82ee28ee576bba77fd874e72cc9b9c688a5f49328a84732428362b7c95775d7855b8f0
-
Filesize
175KB
MD5974204b773af983ccd145412a451e4a8
SHA16d3a2f2b231fc68acd7e12267bc22d9de613258f
SHA256c7f5af1c850ffa25e2026ab6ffdb360f1f77169d56981a4d3e384d9eb1abebda
SHA512232af70b60416707cef27b0a0e66725d19fb50b4364fa1893c3affd15d82ee28ee576bba77fd874e72cc9b9c688a5f49328a84732428362b7c95775d7855b8f0
-
Filesize
545KB
MD57ac0588a04bd223dfec075e2c71b28b1
SHA1395f66d548493195e5d7f0e2b34c44cd04ded11d
SHA25679836706299e7fe41e15104d1bd8d589173ecbedfbc53825f6cb50747662fdb1
SHA5128beed06924bc38770eb89d46a741fe7503b743a37b159eb23d888a70db2c23313eac450158d514d2c7aa7f1b1aeb3ffacd0ab939425b119e51303381f2394c4a
-
Filesize
545KB
MD57ac0588a04bd223dfec075e2c71b28b1
SHA1395f66d548493195e5d7f0e2b34c44cd04ded11d
SHA25679836706299e7fe41e15104d1bd8d589173ecbedfbc53825f6cb50747662fdb1
SHA5128beed06924bc38770eb89d46a741fe7503b743a37b159eb23d888a70db2c23313eac450158d514d2c7aa7f1b1aeb3ffacd0ab939425b119e51303381f2394c4a
-
Filesize
326KB
MD5cbe0d24a134663676435f2231a3241fb
SHA1fad1aff6961983d5a7db195ce46c3365257065e9
SHA256d5e692881546cd3d0d0f83f84427ec095d3a0b47876dc1490c45dbc56ccbfc39
SHA51258d8961cd68264f421b9b2d05ae4432145ffb5fc2de69983ce5b33c1f04e01f3117a368303d586d238df0774d3145bfaa8622bee3dabe5ee1e892b7045844c96
-
Filesize
326KB
MD5cbe0d24a134663676435f2231a3241fb
SHA1fad1aff6961983d5a7db195ce46c3365257065e9
SHA256d5e692881546cd3d0d0f83f84427ec095d3a0b47876dc1490c45dbc56ccbfc39
SHA51258d8961cd68264f421b9b2d05ae4432145ffb5fc2de69983ce5b33c1f04e01f3117a368303d586d238df0774d3145bfaa8622bee3dabe5ee1e892b7045844c96
-
Filesize
384KB
MD5f5ca9017778ec498c4521e28c98bfdfa
SHA110e6c1ae60b52db740f10c924b39f2b8bb299efb
SHA2569054873eaf6b04e9498d8480bb20e897553caf488c402b87ab8ac6bc088b337c
SHA512cf09d69755c58350917fe6fb5a5cc5adf74433d97407b5de7416e7423a498560b8a361c9f99c0161b2d327a1f2241c1fd1b9e1cefffa02eea193827cb3ec8d83
-
Filesize
384KB
MD5f5ca9017778ec498c4521e28c98bfdfa
SHA110e6c1ae60b52db740f10c924b39f2b8bb299efb
SHA2569054873eaf6b04e9498d8480bb20e897553caf488c402b87ab8ac6bc088b337c
SHA512cf09d69755c58350917fe6fb5a5cc5adf74433d97407b5de7416e7423a498560b8a361c9f99c0161b2d327a1f2241c1fd1b9e1cefffa02eea193827cb3ec8d83