Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe
Resource
win10v2004-20230221-en
General
-
Target
b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe
-
Size
700KB
-
MD5
fa9f2b86cf9c24e9835b89da7d8ff9a7
-
SHA1
a95927430f442822964978c39acc289e2897a8bb
-
SHA256
b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1
-
SHA512
be09cab83c3f41160f18fff03d5b007f46b83898d5c445cae5adc6ad40bed2267c50bab7c70e8c142f26359bd9e2f6887e68f099be3b3bdc5fbfad11fa165ad0
-
SSDEEP
12288:pMr4y903QYLFfxr1b5KrQPouZxQ+GJPiZWleuSIyYcG:dyylxhb5AbM4qZWlehpG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9059.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2624-193-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-192-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-195-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-197-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-199-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-201-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-203-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-205-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-207-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-209-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-211-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-213-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-215-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-217-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-219-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-221-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-223-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-225-0x0000000004CD0000-0x0000000004D0F000-memory.dmp family_redline behavioral1/memory/2624-1111-0x0000000004D70000-0x0000000004D80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3096 un358908.exe 2968 pro9059.exe 2624 qu0845.exe 2848 si683045.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9059.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un358908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un358908.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4840 2968 WerFault.exe 86 2996 2624 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2968 pro9059.exe 2968 pro9059.exe 2624 qu0845.exe 2624 qu0845.exe 2848 si683045.exe 2848 si683045.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2968 pro9059.exe Token: SeDebugPrivilege 2624 qu0845.exe Token: SeDebugPrivilege 2848 si683045.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3096 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 85 PID 3524 wrote to memory of 3096 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 85 PID 3524 wrote to memory of 3096 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 85 PID 3096 wrote to memory of 2968 3096 un358908.exe 86 PID 3096 wrote to memory of 2968 3096 un358908.exe 86 PID 3096 wrote to memory of 2968 3096 un358908.exe 86 PID 3096 wrote to memory of 2624 3096 un358908.exe 92 PID 3096 wrote to memory of 2624 3096 un358908.exe 92 PID 3096 wrote to memory of 2624 3096 un358908.exe 92 PID 3524 wrote to memory of 2848 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 96 PID 3524 wrote to memory of 2848 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 96 PID 3524 wrote to memory of 2848 3524 b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe"C:\Users\Admin\AppData\Local\Temp\b55943d8174cde460b0092fc748afaf47aa653f8c47263fe45041ee46bcab5d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9059.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10804⤵
- Program crash
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0845.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0845.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 13404⤵
- Program crash
PID:2996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683045.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2968 -ip 29681⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2624 -ip 26241⤵PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50e10dd14f4b8a67d3a220b64dc574066
SHA1c2bfef9dd5f27178f12b7ab14ba190826cd4ab50
SHA2566fc1b68da04f5b7511ecfe6836da8412e8e0d3a5a4d61eebe574b8d0a75930ab
SHA5121c060833ef9925be8212fb3bd3df91031d02e67c6857b47836d5cd729277b8df244a4f9856e13c4e3de99391420fa78bb38e55f5abeae3af58266074aa7b5fb6
-
Filesize
175KB
MD50e10dd14f4b8a67d3a220b64dc574066
SHA1c2bfef9dd5f27178f12b7ab14ba190826cd4ab50
SHA2566fc1b68da04f5b7511ecfe6836da8412e8e0d3a5a4d61eebe574b8d0a75930ab
SHA5121c060833ef9925be8212fb3bd3df91031d02e67c6857b47836d5cd729277b8df244a4f9856e13c4e3de99391420fa78bb38e55f5abeae3af58266074aa7b5fb6
-
Filesize
558KB
MD5f17b1ba13bb8ced3a4d81ab1864153e4
SHA1376d1d592303243e524160947af1b9b104ac7276
SHA256dad42d36703bfa7200490225eeee0ab865d0402be0fd08ab5ac94f245cc0742f
SHA512d2c38c94f628fd48561a582db0ef0952b2198c3cfedbdf872950305cd2a6cb74bc21a6b9b729c09653ce367246864f7c2da21aa3268008c228c0558fbe6e2240
-
Filesize
558KB
MD5f17b1ba13bb8ced3a4d81ab1864153e4
SHA1376d1d592303243e524160947af1b9b104ac7276
SHA256dad42d36703bfa7200490225eeee0ab865d0402be0fd08ab5ac94f245cc0742f
SHA512d2c38c94f628fd48561a582db0ef0952b2198c3cfedbdf872950305cd2a6cb74bc21a6b9b729c09653ce367246864f7c2da21aa3268008c228c0558fbe6e2240
-
Filesize
307KB
MD5e22740343267f377832c91ab495cc109
SHA10d6f760748b983b6a8cfb7cda4f219cb1db2a2be
SHA2563ed893274368e996db400f6a070594f1cb1e4a4c8c2ff5099e73d916f5e954a6
SHA512136a926767d427b9abb69f5fe7f66d1f8a320280acfe246375176e95e9202621448f7605da94ab0ffef3d830a939cf536a3084068084b11f31b1538d22835109
-
Filesize
307KB
MD5e22740343267f377832c91ab495cc109
SHA10d6f760748b983b6a8cfb7cda4f219cb1db2a2be
SHA2563ed893274368e996db400f6a070594f1cb1e4a4c8c2ff5099e73d916f5e954a6
SHA512136a926767d427b9abb69f5fe7f66d1f8a320280acfe246375176e95e9202621448f7605da94ab0ffef3d830a939cf536a3084068084b11f31b1538d22835109
-
Filesize
365KB
MD51fabb6317e91566e855a82a5b6680dd5
SHA15ac2c5baabcdda9c431c27ee8c101ad7b066934d
SHA2563b3c0afeb8f9138bfb7f94d0423e75b8fac391626614f4ed1061b48c5fdd1a0d
SHA5128491745335c78a195825a2972e9fae8afe31b048ee1c7563bd66597defadff009118b49b1dd89fc1c64ebb6b09959654f911bbc5c989c6ff00979626854c3478
-
Filesize
365KB
MD51fabb6317e91566e855a82a5b6680dd5
SHA15ac2c5baabcdda9c431c27ee8c101ad7b066934d
SHA2563b3c0afeb8f9138bfb7f94d0423e75b8fac391626614f4ed1061b48c5fdd1a0d
SHA5128491745335c78a195825a2972e9fae8afe31b048ee1c7563bd66597defadff009118b49b1dd89fc1c64ebb6b09959654f911bbc5c989c6ff00979626854c3478