Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:59
Static task
static1
Behavioral task
behavioral1
Sample
0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe
Resource
win10v2004-20230220-en
General
-
Target
0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe
-
Size
699KB
-
MD5
72f662e99029495da4fcffaf869297ab
-
SHA1
4212846b0ab979c40fa414b8625e34ec6a2f38e0
-
SHA256
0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426
-
SHA512
f522319985e3e02a583638246b2a47ec7a867be07fc0d77c584b6cf4d8264bde8902a82e35ad9d8a971a0d951d953552e1591c29a8d37632f3cbbb9c6d6c4a4a
-
SSDEEP
12288:wMrjy90aJIzLo0yCy2EYuVI4N7huajp8Ggaj70Tc087v5:DyVJIg0yCkpuajptgaH0V87x
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2250.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2250.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3284-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-199-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-216-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-214-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-219-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-222-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-226-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-228-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-230-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-232-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-234-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3284-236-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4696 un576299.exe 4608 pro2250.exe 3284 qu4617.exe 1948 si779815.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2250.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un576299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un576299.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{CE7699FA-598C-402C-851B-B27091454E04}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D34D381A-8D07-4FD7-8A0A-B95C6DB44CA6}.catalogItem svchost.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3464 4608 WerFault.exe 83 4356 3284 WerFault.exe 90 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 pro2250.exe 4608 pro2250.exe 3284 qu4617.exe 3284 qu4617.exe 1948 si779815.exe 1948 si779815.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4608 pro2250.exe Token: SeDebugPrivilege 3284 qu4617.exe Token: SeDebugPrivilege 1948 si779815.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4696 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 82 PID 1860 wrote to memory of 4696 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 82 PID 1860 wrote to memory of 4696 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 82 PID 4696 wrote to memory of 4608 4696 un576299.exe 83 PID 4696 wrote to memory of 4608 4696 un576299.exe 83 PID 4696 wrote to memory of 4608 4696 un576299.exe 83 PID 4696 wrote to memory of 3284 4696 un576299.exe 90 PID 4696 wrote to memory of 3284 4696 un576299.exe 90 PID 4696 wrote to memory of 3284 4696 un576299.exe 90 PID 1860 wrote to memory of 1948 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 94 PID 1860 wrote to memory of 1948 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 94 PID 1860 wrote to memory of 1948 1860 0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe"C:\Users\Admin\AppData\Local\Temp\0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10844⤵
- Program crash
PID:3464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 13484⤵
- Program crash
PID:4356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4608 -ip 46081⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3284 -ip 32841⤵PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD531261284ed51a095b49ca0acd10cbb97
SHA124b58b5fd96aacf57afba241fa69acaddfae347a
SHA256e0e36c53e348ff60ad6b75ff246321e343859b4331e254980ae6335aca8941ed
SHA5124d9c83166c008ad0ac0af428293bc7eda882360b03cbcade227a514b271dd9eb74d093790c93348dd9a5fe0ea4ff3d721a545a410304a516a48a695601dc0f4b
-
Filesize
175KB
MD531261284ed51a095b49ca0acd10cbb97
SHA124b58b5fd96aacf57afba241fa69acaddfae347a
SHA256e0e36c53e348ff60ad6b75ff246321e343859b4331e254980ae6335aca8941ed
SHA5124d9c83166c008ad0ac0af428293bc7eda882360b03cbcade227a514b271dd9eb74d093790c93348dd9a5fe0ea4ff3d721a545a410304a516a48a695601dc0f4b
-
Filesize
557KB
MD5563609d3e43a20ddd16ec33ed212c1d8
SHA1da262e846123bb3b16453349efdcaabf8a24b42e
SHA2565f0a99a1e4de1659465e764fc81e0e16f41f2ec49e81563fd0342dc9b0d6c1b2
SHA5128fd431f9bbd0f8d4aa50c4b22af617554149127edf782696e98f4d23ac134f71c3ec75114031b09968043cee286aeea032fa01d75ea9a14724b0eab618e9dcac
-
Filesize
557KB
MD5563609d3e43a20ddd16ec33ed212c1d8
SHA1da262e846123bb3b16453349efdcaabf8a24b42e
SHA2565f0a99a1e4de1659465e764fc81e0e16f41f2ec49e81563fd0342dc9b0d6c1b2
SHA5128fd431f9bbd0f8d4aa50c4b22af617554149127edf782696e98f4d23ac134f71c3ec75114031b09968043cee286aeea032fa01d75ea9a14724b0eab618e9dcac
-
Filesize
307KB
MD5e548fc6b3464f90262814e2a412ad824
SHA17ed7992b9cb3755dcca7d68e96335d3be83b4c11
SHA25694ff93e117ac03c77fd613466014f53760c9962de30d192cdf1c62438ccefc9b
SHA512bc4aeed66da6516dd20ed240e50c9ebdc3214c634ce821a2267a575522c43aa36ab15701ae98d16ba9b995c9c0377b01b8811523c23de4a7a9a8cbf9e7c78eff
-
Filesize
307KB
MD5e548fc6b3464f90262814e2a412ad824
SHA17ed7992b9cb3755dcca7d68e96335d3be83b4c11
SHA25694ff93e117ac03c77fd613466014f53760c9962de30d192cdf1c62438ccefc9b
SHA512bc4aeed66da6516dd20ed240e50c9ebdc3214c634ce821a2267a575522c43aa36ab15701ae98d16ba9b995c9c0377b01b8811523c23de4a7a9a8cbf9e7c78eff
-
Filesize
365KB
MD5ef93d74ba47a1f6df4d889841454da58
SHA13dcafc154866eb589929eacf739a50a86c62ac57
SHA25679131adbd4a7b0bdb60541b4de6aefbcbfe25bc2fefb3f703b9e6f1838498af0
SHA512975de3a3e2f9a258f34c9f444d71b7da703f5e3b0315ee2e89fa874c782a714508488b127c8bbbdefed8579e457f8301287956f7ccee0ec560144af5171e12d2
-
Filesize
365KB
MD5ef93d74ba47a1f6df4d889841454da58
SHA13dcafc154866eb589929eacf739a50a86c62ac57
SHA25679131adbd4a7b0bdb60541b4de6aefbcbfe25bc2fefb3f703b9e6f1838498af0
SHA512975de3a3e2f9a258f34c9f444d71b7da703f5e3b0315ee2e89fa874c782a714508488b127c8bbbdefed8579e457f8301287956f7ccee0ec560144af5171e12d2