Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:48
Static task
static1
Behavioral task
behavioral1
Sample
c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe
Resource
win10v2004-20230221-en
General
-
Target
c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe
-
Size
700KB
-
MD5
9186474d288e94e19db82d309c7d4fc9
-
SHA1
a984ae6b36af0d371faceb895fd6452f08414896
-
SHA256
c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f
-
SHA512
02c7ae2685019480bd9599c511fc9f3df23d684fcc3ef00d2b380c7ddc75afab7eaab551d29b819e0534a2dd1c38e2540e8dbc6e1053555c5093f39461bea0dd
-
SSDEEP
12288:ZMrby90BIDzt/qeCaKh9Do1cA6j8FgX0aLrPKfjBRmcVocLDJNH:CyrtnpKc6j8WX0WsjBnBNH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1684.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3684-191-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-192-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-194-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-196-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-198-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-202-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-205-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-210-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-208-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-212-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-214-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-216-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-218-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-220-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-222-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-224-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-226-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-228-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/3684-1112-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline behavioral1/memory/3684-1113-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4532 un374368.exe 2000 pro1684.exe 3684 qu5742.exe 3380 si824525.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1684.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un374368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un374368.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 864 2000 WerFault.exe 88 2924 3684 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2000 pro1684.exe 2000 pro1684.exe 3684 qu5742.exe 3684 qu5742.exe 3380 si824525.exe 3380 si824525.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2000 pro1684.exe Token: SeDebugPrivilege 3684 qu5742.exe Token: SeDebugPrivilege 3380 si824525.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4532 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 87 PID 1760 wrote to memory of 4532 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 87 PID 1760 wrote to memory of 4532 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 87 PID 4532 wrote to memory of 2000 4532 un374368.exe 88 PID 4532 wrote to memory of 2000 4532 un374368.exe 88 PID 4532 wrote to memory of 2000 4532 un374368.exe 88 PID 4532 wrote to memory of 3684 4532 un374368.exe 97 PID 4532 wrote to memory of 3684 4532 un374368.exe 97 PID 4532 wrote to memory of 3684 4532 un374368.exe 97 PID 1760 wrote to memory of 3380 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 101 PID 1760 wrote to memory of 3380 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 101 PID 1760 wrote to memory of 3380 1760 c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe"C:\Users\Admin\AppData\Local\Temp\c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 10844⤵
- Program crash
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 13604⤵
- Program crash
PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2000 -ip 20001⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3684 -ip 36841⤵PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53e5f1669652a44498479869cc4654f70
SHA10f0ad0a31feba8bb58cc1869f4f2d10c83a48e0f
SHA256042c25e657a89825eeb90d396f02bb7572987f009f1175d8c7e00754d3c643b7
SHA51227e399ce7ede3559036ef79119bf3d55e5e61954e1a943f18081b5867e88ed5ea836c323cd49f587543de5d350d2d8d3f4fc56178db9c712856aeda992b5eb2f
-
Filesize
175KB
MD53e5f1669652a44498479869cc4654f70
SHA10f0ad0a31feba8bb58cc1869f4f2d10c83a48e0f
SHA256042c25e657a89825eeb90d396f02bb7572987f009f1175d8c7e00754d3c643b7
SHA51227e399ce7ede3559036ef79119bf3d55e5e61954e1a943f18081b5867e88ed5ea836c323cd49f587543de5d350d2d8d3f4fc56178db9c712856aeda992b5eb2f
-
Filesize
558KB
MD5174f2d6318a6ae792987a2210a3928d9
SHA13c7cfb5c05897bb56f4734aec8a643567e948e83
SHA25692164a92dc0fe8d92fdc462335ac595aa9df68c2b0aef65b429da18300bedffe
SHA5125d4913c2c1966eb3605dc7e94bd60ccec5b7fd1b3bb6782f1dd0224ee3c59a7789fd898740878c1538ffdd8c504361f46bea5d74da6b3bd72e542d1b3bc5d714
-
Filesize
558KB
MD5174f2d6318a6ae792987a2210a3928d9
SHA13c7cfb5c05897bb56f4734aec8a643567e948e83
SHA25692164a92dc0fe8d92fdc462335ac595aa9df68c2b0aef65b429da18300bedffe
SHA5125d4913c2c1966eb3605dc7e94bd60ccec5b7fd1b3bb6782f1dd0224ee3c59a7789fd898740878c1538ffdd8c504361f46bea5d74da6b3bd72e542d1b3bc5d714
-
Filesize
307KB
MD5e0975014f3c18e095b89dbf76bf36ea9
SHA1b2f3ce3fb366b9e18b22860dab14f70916b77107
SHA25694ff8b5dc77ccb1bdd38f905d8d7f7e937ac7649027bb3d3ddfb8ff5afeb4ef9
SHA51249a748f78014c44d183eea637fa64bc73fe46d72ca5e7cad4b0e9cf3a94024d1dec3641391638a55ecfd9d2fa78e28669b9e3ad762704dc37bfb9bf7b9ce3ea1
-
Filesize
307KB
MD5e0975014f3c18e095b89dbf76bf36ea9
SHA1b2f3ce3fb366b9e18b22860dab14f70916b77107
SHA25694ff8b5dc77ccb1bdd38f905d8d7f7e937ac7649027bb3d3ddfb8ff5afeb4ef9
SHA51249a748f78014c44d183eea637fa64bc73fe46d72ca5e7cad4b0e9cf3a94024d1dec3641391638a55ecfd9d2fa78e28669b9e3ad762704dc37bfb9bf7b9ce3ea1
-
Filesize
365KB
MD5673c381373ea38866653e9fba7f081b1
SHA197c77d0c5e3383904190c3b67ff7b7e51e774678
SHA25672bfa271e2985d76fed0097366a3a4ea351344eeea0627b7f8d3f472425b1b51
SHA5122d07372eac30a21accb979fc21a6c8d1d01b5b1a1839b0d0d433d33900e4cadab3bf8f9318fdeb2cca9356d490c1420898302607c82283940c94c56bc1f46caa
-
Filesize
365KB
MD5673c381373ea38866653e9fba7f081b1
SHA197c77d0c5e3383904190c3b67ff7b7e51e774678
SHA25672bfa271e2985d76fed0097366a3a4ea351344eeea0627b7f8d3f472425b1b51
SHA5122d07372eac30a21accb979fc21a6c8d1d01b5b1a1839b0d0d433d33900e4cadab3bf8f9318fdeb2cca9356d490c1420898302607c82283940c94c56bc1f46caa