Analysis
-
max time kernel
65s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 15:49
Static task
static1
Behavioral task
behavioral1
Sample
0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe
Resource
win10v2004-20230220-en
General
-
Target
0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe
-
Size
686KB
-
MD5
2884a70322919d08210d11db599ec073
-
SHA1
e5ee516fe50bd47cc834904fed616f33dcedfe48
-
SHA256
0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a
-
SHA512
417d31444bf02551a74e3a1d240b99fb90f1c5747a08b388a3edbe5877e84076bd229cf3e0f0fdd940506479b45528eae3f1334c7f65dbc7e75de6dceba0e660
-
SSDEEP
12288:CMrIy90xncoXxvRpn5UO21N3v0bp7R4/RXZ7VTIeNilKdfol:+yUn/XxvdUO219v0bp7RbYiAdI
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7846.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1696-198-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-195-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-196-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-200-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-202-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-204-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-206-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-208-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-210-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-212-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-214-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-216-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-218-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-220-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-222-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-224-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-226-0x0000000007850000-0x000000000788F000-memory.dmp family_redline behavioral1/memory/1696-228-0x0000000007850000-0x000000000788F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5060 un410575.exe 5064 pro7846.exe 1696 qu8138.exe 3896 si977045.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7846.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un410575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un410575.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4504 5064 WerFault.exe 83 972 1696 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5064 pro7846.exe 5064 pro7846.exe 1696 qu8138.exe 1696 qu8138.exe 3896 si977045.exe 3896 si977045.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5064 pro7846.exe Token: SeDebugPrivilege 1696 qu8138.exe Token: SeDebugPrivilege 3896 si977045.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4232 wrote to memory of 5060 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 82 PID 4232 wrote to memory of 5060 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 82 PID 4232 wrote to memory of 5060 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 82 PID 5060 wrote to memory of 5064 5060 un410575.exe 83 PID 5060 wrote to memory of 5064 5060 un410575.exe 83 PID 5060 wrote to memory of 5064 5060 un410575.exe 83 PID 5060 wrote to memory of 1696 5060 un410575.exe 89 PID 5060 wrote to memory of 1696 5060 un410575.exe 89 PID 5060 wrote to memory of 1696 5060 un410575.exe 89 PID 4232 wrote to memory of 3896 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 93 PID 4232 wrote to memory of 3896 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 93 PID 4232 wrote to memory of 3896 4232 0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe"C:\Users\Admin\AppData\Local\Temp\0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 10844⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 13284⤵
- Program crash
PID:972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5064 -ip 50641⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1696 -ip 16961⤵PID:2800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5906d268aed8a5ff404a00da73ddb9b4d
SHA1cc6903f393419687a561d7ca36c373029e47cb9a
SHA256b9a39ad1965772694d1deb2ef7a9cb21457139f6f37e8af8d58a2dcfe5beac4c
SHA5121dee5a6d6f84141b1a23f46e5e37cd98e78875bc2e796fef4db9be8c3ab28dcf920aaaa8ca5587e12b2682d58c31349ea67f72fd91ebf64c90dbfcd2b08a488f
-
Filesize
175KB
MD5906d268aed8a5ff404a00da73ddb9b4d
SHA1cc6903f393419687a561d7ca36c373029e47cb9a
SHA256b9a39ad1965772694d1deb2ef7a9cb21457139f6f37e8af8d58a2dcfe5beac4c
SHA5121dee5a6d6f84141b1a23f46e5e37cd98e78875bc2e796fef4db9be8c3ab28dcf920aaaa8ca5587e12b2682d58c31349ea67f72fd91ebf64c90dbfcd2b08a488f
-
Filesize
544KB
MD5332ac0c5dbec00a67c9ded3205126fc0
SHA16df3105c63e297e10c98953ca3167c4f8928ad2a
SHA256b4e9d1e1b21b70f927e4f858e8ab4de342eb528ebb4407eedaf52c2d77b5fb99
SHA5128b5ca135b219667f8555a8e710a96afcad5b6202f878b72462a79affb91f4d23386d86a04574a87c7b2d44426ce9b1cf210437bf7c20198d7ecd138d636c6dc2
-
Filesize
544KB
MD5332ac0c5dbec00a67c9ded3205126fc0
SHA16df3105c63e297e10c98953ca3167c4f8928ad2a
SHA256b4e9d1e1b21b70f927e4f858e8ab4de342eb528ebb4407eedaf52c2d77b5fb99
SHA5128b5ca135b219667f8555a8e710a96afcad5b6202f878b72462a79affb91f4d23386d86a04574a87c7b2d44426ce9b1cf210437bf7c20198d7ecd138d636c6dc2
-
Filesize
326KB
MD5e8946364ecac8e8730b477a15c6ac5ea
SHA157a6736f0d8b444fd953a2ed1f49fd6708d6be43
SHA256c37d06f2145761a8ee137e9d4d9d7ef4698c70fcf685ad3ca55bebfb4a378cb1
SHA5122fd8ad160c5f16bdcc1af2f1d55d4f8d40ecf3690ea3a8e557fded518e56b79d1ce5bc3c09f0de75f9d44a2d2d048eacc922fcdb43ca673a031ac193e2e4ef0d
-
Filesize
326KB
MD5e8946364ecac8e8730b477a15c6ac5ea
SHA157a6736f0d8b444fd953a2ed1f49fd6708d6be43
SHA256c37d06f2145761a8ee137e9d4d9d7ef4698c70fcf685ad3ca55bebfb4a378cb1
SHA5122fd8ad160c5f16bdcc1af2f1d55d4f8d40ecf3690ea3a8e557fded518e56b79d1ce5bc3c09f0de75f9d44a2d2d048eacc922fcdb43ca673a031ac193e2e4ef0d
-
Filesize
384KB
MD5fcf17f0aa68e9ea4322a1616d8344041
SHA14506d219fca97fb46354f2d2ba1e6ab58cf8970e
SHA256329550f7030c607f632933a66b8b25815dd21e26b48ad3d84bab0ae8809f1e32
SHA5126a1ba4967972d1fb97457f5edfcb68597c37db4d2285d0527125bcec5cb94b0b267967440abee5127338bdd7260308c87ea6ed802c18ca8941cab0c5a6695002
-
Filesize
384KB
MD5fcf17f0aa68e9ea4322a1616d8344041
SHA14506d219fca97fb46354f2d2ba1e6ab58cf8970e
SHA256329550f7030c607f632933a66b8b25815dd21e26b48ad3d84bab0ae8809f1e32
SHA5126a1ba4967972d1fb97457f5edfcb68597c37db4d2285d0527125bcec5cb94b0b267967440abee5127338bdd7260308c87ea6ed802c18ca8941cab0c5a6695002