Analysis
-
max time kernel
102s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:44
Static task
static1
Behavioral task
behavioral1
Sample
d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe
Resource
win10v2004-20230220-en
General
-
Target
d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe
-
Size
700KB
-
MD5
d736c9c11f444e105b21e7ce72bfd257
-
SHA1
b07f61a0a875c25e63dc48054fc3f0dfa3122ad7
-
SHA256
d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666
-
SHA512
70d50615df982fdc12b5233f05d0c222aed759398d14e91ff0e86f632d2ca7b7dee0eff4ed668723af4ae3c8aa012fc79a2ad23d41cea8b396637bd830e08b71
-
SSDEEP
12288:/Mrly90+8E09pcs0eAsn9DS9cAF0x8FxA+IYebPOQIaARyyu3aOxl1QX:KyNGrcs0a8F0x8bwYcoaARyJ3PIX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3548.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/112-192-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-194-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-191-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-196-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-198-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-200-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-202-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-204-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-206-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-208-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-210-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-212-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-214-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-216-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-218-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-220-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-222-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/112-224-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2180 un287991.exe 1344 pro3548.exe 112 qu4746.exe 1028 si567001.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3548.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un287991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un287991.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4760 1344 WerFault.exe 82 2728 112 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1344 pro3548.exe 1344 pro3548.exe 112 qu4746.exe 112 qu4746.exe 1028 si567001.exe 1028 si567001.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1344 pro3548.exe Token: SeDebugPrivilege 112 qu4746.exe Token: SeDebugPrivilege 1028 si567001.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3612 wrote to memory of 2180 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 81 PID 3612 wrote to memory of 2180 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 81 PID 3612 wrote to memory of 2180 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 81 PID 2180 wrote to memory of 1344 2180 un287991.exe 82 PID 2180 wrote to memory of 1344 2180 un287991.exe 82 PID 2180 wrote to memory of 1344 2180 un287991.exe 82 PID 2180 wrote to memory of 112 2180 un287991.exe 87 PID 2180 wrote to memory of 112 2180 un287991.exe 87 PID 2180 wrote to memory of 112 2180 un287991.exe 87 PID 3612 wrote to memory of 1028 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 90 PID 3612 wrote to memory of 1028 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 90 PID 3612 wrote to memory of 1028 3612 d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe"C:\Users\Admin\AppData\Local\Temp\d31bf6f6aff13957ecf60449fb20a37c63240bb05c20000628748992ab90f666.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3548.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 10804⤵
- Program crash
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4746.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 18084⤵
- Program crash
PID:2728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si567001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si567001.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1344 -ip 13441⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 112 -ip 1121⤵PID:4808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52e9a50d136a98226bba1e8ce86169c34
SHA15231ef8a0773d627d41177c6ccb632b1d1e01f1d
SHA2568050e50f650e0f28c7902885f11535e36ccd969c6362d2864234e538feda591d
SHA5127abd7028964aa4f1180ab5bbceb2646984a2774f657468d02034ece13d74a7ef38953d166dafdd039c8a9c8dfbb9c9e9941786b6eb66a7304a6d37866adcfd4e
-
Filesize
175KB
MD52e9a50d136a98226bba1e8ce86169c34
SHA15231ef8a0773d627d41177c6ccb632b1d1e01f1d
SHA2568050e50f650e0f28c7902885f11535e36ccd969c6362d2864234e538feda591d
SHA5127abd7028964aa4f1180ab5bbceb2646984a2774f657468d02034ece13d74a7ef38953d166dafdd039c8a9c8dfbb9c9e9941786b6eb66a7304a6d37866adcfd4e
-
Filesize
558KB
MD58d70e12683ffc7efe2ca97e5fba57f42
SHA194c2d6f3ff774dc966cf623b6dd672e51220e76d
SHA256f64356c61dd09a82d6d77494278e68bf473a4ed0fdbde4c84d1dcbf344f6fea4
SHA5125605b44c210418ec32658206101bda487bfa1c1bca7dea4ebca73b30654f61ed8e15642c127b4c721c9904ddf347b1b7cec70c994f219e6fecff399f73669f4d
-
Filesize
558KB
MD58d70e12683ffc7efe2ca97e5fba57f42
SHA194c2d6f3ff774dc966cf623b6dd672e51220e76d
SHA256f64356c61dd09a82d6d77494278e68bf473a4ed0fdbde4c84d1dcbf344f6fea4
SHA5125605b44c210418ec32658206101bda487bfa1c1bca7dea4ebca73b30654f61ed8e15642c127b4c721c9904ddf347b1b7cec70c994f219e6fecff399f73669f4d
-
Filesize
307KB
MD5233d511507dfda9f0e2640e13e6f5a49
SHA168d379f26e2ebfbcc36240bf6072c56c573acbf2
SHA25698df1fd858485e6be566350ba50d4bfcb70cd0c145bbd84e8c7c3ce6a3745525
SHA51288099a83454051267e8a232e89dcf6976409b472652c438071244fe85c1aeb89b704092f85e47957d2df73dcd1e346417d2dd6ef9f980d480056722210bc3989
-
Filesize
307KB
MD5233d511507dfda9f0e2640e13e6f5a49
SHA168d379f26e2ebfbcc36240bf6072c56c573acbf2
SHA25698df1fd858485e6be566350ba50d4bfcb70cd0c145bbd84e8c7c3ce6a3745525
SHA51288099a83454051267e8a232e89dcf6976409b472652c438071244fe85c1aeb89b704092f85e47957d2df73dcd1e346417d2dd6ef9f980d480056722210bc3989
-
Filesize
365KB
MD516e8abbd4934510368607b8129627cad
SHA1f3c0f2cd826a1eb69443aa55c0a033f091b9e054
SHA256b49053533cdeffa84adcd763751c68254b2d14f7d99b954d39aa668471ddb7b2
SHA512a477c5cc95e7679c97e4bdc5dc5462427232b73baccdfe35e2f40e33b4eeee8a62f0179b3dbd330ae684a2d3abef8633bfc24df1e606cb245e0a3a7ec196fd78
-
Filesize
365KB
MD516e8abbd4934510368607b8129627cad
SHA1f3c0f2cd826a1eb69443aa55c0a033f091b9e054
SHA256b49053533cdeffa84adcd763751c68254b2d14f7d99b954d39aa668471ddb7b2
SHA512a477c5cc95e7679c97e4bdc5dc5462427232b73baccdfe35e2f40e33b4eeee8a62f0179b3dbd330ae684a2d3abef8633bfc24df1e606cb245e0a3a7ec196fd78