Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe
Resource
win10v2004-20230220-en
General
-
Target
57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe
-
Size
700KB
-
MD5
19b85b8fb698a47dd1147019551834ea
-
SHA1
909d35f195e14a17a41f5b3f13031b3894ab712c
-
SHA256
57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae
-
SHA512
76c97e27bd0fe0cfe29999833cf392df7bb68921648315c5b12976860651c484485bdac70309d1c61e8236daf726567addb1020a44afd2f21acce65f6bc5706e
-
SSDEEP
12288:+Mrvy90LSikiDaELixMGyZUlvPdGLRj7uIjDh0Qt:ByKSifaEOxMgvPdKRHuIjDWQt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6657.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6657.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1460-190-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-189-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-192-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-194-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-196-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-199-0x0000000004F20000-0x0000000004F30000-memory.dmp family_redline behavioral1/memory/1460-200-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-203-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-206-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-208-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-210-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-212-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-214-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-218-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-220-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-216-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-222-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-224-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-226-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/1460-1109-0x0000000004F20000-0x0000000004F30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1900 un210042.exe 3028 pro6657.exe 1460 qu8389.exe 3720 si373869.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6657.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un210042.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un210042.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2128 3028 WerFault.exe 86 3596 1460 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3028 pro6657.exe 3028 pro6657.exe 1460 qu8389.exe 1460 qu8389.exe 3720 si373869.exe 3720 si373869.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3028 pro6657.exe Token: SeDebugPrivilege 1460 qu8389.exe Token: SeDebugPrivilege 3720 si373869.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4156 wrote to memory of 1900 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 85 PID 4156 wrote to memory of 1900 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 85 PID 4156 wrote to memory of 1900 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 85 PID 1900 wrote to memory of 3028 1900 un210042.exe 86 PID 1900 wrote to memory of 3028 1900 un210042.exe 86 PID 1900 wrote to memory of 3028 1900 un210042.exe 86 PID 1900 wrote to memory of 1460 1900 un210042.exe 89 PID 1900 wrote to memory of 1460 1900 un210042.exe 89 PID 1900 wrote to memory of 1460 1900 un210042.exe 89 PID 4156 wrote to memory of 3720 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 92 PID 4156 wrote to memory of 3720 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 92 PID 4156 wrote to memory of 3720 4156 57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe"C:\Users\Admin\AppData\Local\Temp\57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 10804⤵
- Program crash
PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 16364⤵
- Program crash
PID:3596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3028 -ip 30281⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1460 -ip 14601⤵PID:3888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD517e9c00604f9f4a53f305e511a354be1
SHA19e5e4e29dc55fe792e3a08e6bd5d4fd587ad090f
SHA256de3885497ccce243cf3aa02514eb83dc14c53144e3901292469f5bf28907231a
SHA512b8c064884883ac627abb215507396489411aaa1e15d4f1e0bc72d3d2c322129b716dddd737eb3c4b78e49606f8304d58081f54d1bdfa57bb38ca14fae9ad52d5
-
Filesize
175KB
MD517e9c00604f9f4a53f305e511a354be1
SHA19e5e4e29dc55fe792e3a08e6bd5d4fd587ad090f
SHA256de3885497ccce243cf3aa02514eb83dc14c53144e3901292469f5bf28907231a
SHA512b8c064884883ac627abb215507396489411aaa1e15d4f1e0bc72d3d2c322129b716dddd737eb3c4b78e49606f8304d58081f54d1bdfa57bb38ca14fae9ad52d5
-
Filesize
557KB
MD5c6c0b5e4de1820c5d147c3c47d5dc34e
SHA1b7ce7a192b172647b3e15ea1b2dad08d1244f389
SHA256c4865ee9bebd7f77d37571087b619b6a99beac2c0f5e3535caa19b87305cdf4f
SHA512934ebfb0b4722c7876f768b0466927fdf1387ef3ebc3485dbf35e4587212f7937a22cf1188150b893e10e0ab8ed3865d47f3f9423a6a57ce5fcb315fa17179d6
-
Filesize
557KB
MD5c6c0b5e4de1820c5d147c3c47d5dc34e
SHA1b7ce7a192b172647b3e15ea1b2dad08d1244f389
SHA256c4865ee9bebd7f77d37571087b619b6a99beac2c0f5e3535caa19b87305cdf4f
SHA512934ebfb0b4722c7876f768b0466927fdf1387ef3ebc3485dbf35e4587212f7937a22cf1188150b893e10e0ab8ed3865d47f3f9423a6a57ce5fcb315fa17179d6
-
Filesize
307KB
MD53b0f5b69e8da4cd8443f99f926044f8c
SHA1a3b8b6dd34fcb335a95c5231f5bb9e537f358e46
SHA256992db562ca2f1b9ab72252bc4bc04b5dbed18cec9877f3da48a1dc786566697d
SHA512c24b41cb937b477384c6957a74576ca4fd465922885413d7f52948683234204be07ab3ead6bfb0e07ac8b9937ad8906678c39c553369c0eb4e4b9b9c2034288e
-
Filesize
307KB
MD53b0f5b69e8da4cd8443f99f926044f8c
SHA1a3b8b6dd34fcb335a95c5231f5bb9e537f358e46
SHA256992db562ca2f1b9ab72252bc4bc04b5dbed18cec9877f3da48a1dc786566697d
SHA512c24b41cb937b477384c6957a74576ca4fd465922885413d7f52948683234204be07ab3ead6bfb0e07ac8b9937ad8906678c39c553369c0eb4e4b9b9c2034288e
-
Filesize
365KB
MD51ca9d0bd571b19e17845b794ecf96aaa
SHA183b4c58d150ae521e06728397e26f179a85c2027
SHA25608b0c5da58b3773168137bbe94ccbef49fa6ceb6ca4313331287193a8e9cf25b
SHA512f230709a4fc17958d8985472e94e582b7f0025143fadb1b91021e25b6c03965a0279f1025c8cb387fcab1a227e88d4ff4d3fafb5843e2e0ed54808dc57c973f7
-
Filesize
365KB
MD51ca9d0bd571b19e17845b794ecf96aaa
SHA183b4c58d150ae521e06728397e26f179a85c2027
SHA25608b0c5da58b3773168137bbe94ccbef49fa6ceb6ca4313331287193a8e9cf25b
SHA512f230709a4fc17958d8985472e94e582b7f0025143fadb1b91021e25b6c03965a0279f1025c8cb387fcab1a227e88d4ff4d3fafb5843e2e0ed54808dc57c973f7