Analysis
-
max time kernel
52s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe
Resource
win10v2004-20230220-en
General
-
Target
b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe
-
Size
699KB
-
MD5
03979b982b7948f80f6548b1dd81b95e
-
SHA1
a1c83bad34a96783c04b6df645b564d011c2d0c5
-
SHA256
b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090
-
SHA512
4eb1fbbec18e3db8b719d45ef7a9d6791f33fef1c13624c2d9ea826bbe4f4cdf794f714260b160e3f40ab070624afcdd4562a1ebbe72c8e25664929531ee3c14
-
SSDEEP
12288:PMray90uhWn+XZ2OTmADxyB7lWnOahFXiQzj7LeRPiyDghD:lyBU2X7DxS7IPnXiQzHLeRKyDghD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3118.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2868-191-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-192-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-194-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-196-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-198-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-200-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-202-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-204-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-206-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-208-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-210-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-212-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-214-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-216-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-218-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-220-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-222-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/2868-224-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4748 un481407.exe 1968 pro3118.exe 2868 qu1810.exe 4720 si630362.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3118.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un481407.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un481407.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4412 1968 WerFault.exe 84 1312 2868 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1968 pro3118.exe 1968 pro3118.exe 2868 qu1810.exe 2868 qu1810.exe 4720 si630362.exe 4720 si630362.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1968 pro3118.exe Token: SeDebugPrivilege 2868 qu1810.exe Token: SeDebugPrivilege 4720 si630362.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4748 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 83 PID 2820 wrote to memory of 4748 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 83 PID 2820 wrote to memory of 4748 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 83 PID 4748 wrote to memory of 1968 4748 un481407.exe 84 PID 4748 wrote to memory of 1968 4748 un481407.exe 84 PID 4748 wrote to memory of 1968 4748 un481407.exe 84 PID 4748 wrote to memory of 2868 4748 un481407.exe 92 PID 4748 wrote to memory of 2868 4748 un481407.exe 92 PID 4748 wrote to memory of 2868 4748 un481407.exe 92 PID 2820 wrote to memory of 4720 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 96 PID 2820 wrote to memory of 4720 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 96 PID 2820 wrote to memory of 4720 2820 b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe"C:\Users\Admin\AppData\Local\Temp\b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 10764⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 15564⤵
- Program crash
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1968 -ip 19681⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2868 -ip 28681⤵PID:3596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD504ce436a9f5d91e7f4537b2f1d043302
SHA195602e42555c4ccd8f120632f1a26a5acd85cc5a
SHA256ca37030d4941e5e2119370e921adc31acba849e8ff2729a59dfc535f1bfc9166
SHA5124aeca95b131586f1ab1697800a0b06ad221e449ef295104a950e88884455496acd786c8b12c14edf55936434a9f394f131ff5dd8b2a21a406b5617b28706521e
-
Filesize
175KB
MD504ce436a9f5d91e7f4537b2f1d043302
SHA195602e42555c4ccd8f120632f1a26a5acd85cc5a
SHA256ca37030d4941e5e2119370e921adc31acba849e8ff2729a59dfc535f1bfc9166
SHA5124aeca95b131586f1ab1697800a0b06ad221e449ef295104a950e88884455496acd786c8b12c14edf55936434a9f394f131ff5dd8b2a21a406b5617b28706521e
-
Filesize
557KB
MD57a68cb0197d828c021fa7fe7e30e8249
SHA1b82e2e8564474738c07a3d02842aa88093e43936
SHA2568741e52b7464e6da9089f23b5f7870b2f5b6d8ad1f31d85f55b6b8b4abe7e426
SHA512b22d64c98242253feaf80cd45a9c09ac64ff2373da91c1acad11ce2a16c87d0dacbaf5f1e13cf181a19eee2dbd53d36ddfab8552ebd67d824cb4f0303c6bb5b4
-
Filesize
557KB
MD57a68cb0197d828c021fa7fe7e30e8249
SHA1b82e2e8564474738c07a3d02842aa88093e43936
SHA2568741e52b7464e6da9089f23b5f7870b2f5b6d8ad1f31d85f55b6b8b4abe7e426
SHA512b22d64c98242253feaf80cd45a9c09ac64ff2373da91c1acad11ce2a16c87d0dacbaf5f1e13cf181a19eee2dbd53d36ddfab8552ebd67d824cb4f0303c6bb5b4
-
Filesize
307KB
MD5629dda5ab31b5b11d230e84414139176
SHA1bb9c4ad31d94ab3a061a15ce716650a27d85c3d3
SHA256677720072bdc5c71954cfa2639cbe2c7a3441bcedb449cf268b11d6d6976d541
SHA51205902fa5fa2e469a4c8f9e528af3137204adae1c04bdefbaa27715348cbf15337b287dd30a077d49f080df7e0a6a8f952d2d9aba622305fd7018b1b916a66697
-
Filesize
307KB
MD5629dda5ab31b5b11d230e84414139176
SHA1bb9c4ad31d94ab3a061a15ce716650a27d85c3d3
SHA256677720072bdc5c71954cfa2639cbe2c7a3441bcedb449cf268b11d6d6976d541
SHA51205902fa5fa2e469a4c8f9e528af3137204adae1c04bdefbaa27715348cbf15337b287dd30a077d49f080df7e0a6a8f952d2d9aba622305fd7018b1b916a66697
-
Filesize
365KB
MD58e76bde4a687164be26b09df3c6373ff
SHA163da9a4432842d99f2ade0edd7df3f71cd43f7bd
SHA256c0c5c89c17e2e509bec4ec3dcb14e14de910d2859f8bce8ac8918aac5656fa84
SHA5128555657f01938f7dc08c304b71c1ace7f4e7d2ac2b3412768f0abd7a3b55929c29a5d1824e3ce307db2b43242b6805e13dc1577ebe88a7be724d3d08e2b5c1ac
-
Filesize
365KB
MD58e76bde4a687164be26b09df3c6373ff
SHA163da9a4432842d99f2ade0edd7df3f71cd43f7bd
SHA256c0c5c89c17e2e509bec4ec3dcb14e14de910d2859f8bce8ac8918aac5656fa84
SHA5128555657f01938f7dc08c304b71c1ace7f4e7d2ac2b3412768f0abd7a3b55929c29a5d1824e3ce307db2b43242b6805e13dc1577ebe88a7be724d3d08e2b5c1ac