Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:58
Static task
static1
Behavioral task
behavioral1
Sample
66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe
Resource
win10v2004-20230220-en
General
-
Target
66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe
-
Size
700KB
-
MD5
019183d00d5ded2a8efcd2c78d51d0d4
-
SHA1
1e8fdbcddba0a3bd86763a6855da268bf2bbd604
-
SHA256
66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600
-
SHA512
6ae10b9b5b7b01ca4fb9debfcaca163e533e507c002cce1c3c18e07363521e37bcd478b9a37474779c7d063bc46ecf19cb1e6f7d2e9a51c5d31c725ed2c107aa
-
SSDEEP
12288:7Mr+y90Yxiw+7CJ9uQQCf9DGqcAHucbNgflIRaAXFUhV+IoM:5yaauQQCTHucGfC0AXFUTZoM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7259.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7259.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1336-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-195-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-197-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-199-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-201-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-203-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-205-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-207-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-209-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-211-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-213-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-215-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-217-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-219-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-221-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-223-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-225-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1336-227-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4788 un285604.exe 3000 pro7259.exe 1336 qu1074.exe 4464 si598851.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7259.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7259.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un285604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un285604.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 896 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4676 3000 WerFault.exe 85 1900 1336 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3000 pro7259.exe 3000 pro7259.exe 1336 qu1074.exe 1336 qu1074.exe 4464 si598851.exe 4464 si598851.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3000 pro7259.exe Token: SeDebugPrivilege 1336 qu1074.exe Token: SeDebugPrivilege 4464 si598851.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4788 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 84 PID 2320 wrote to memory of 4788 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 84 PID 2320 wrote to memory of 4788 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 84 PID 4788 wrote to memory of 3000 4788 un285604.exe 85 PID 4788 wrote to memory of 3000 4788 un285604.exe 85 PID 4788 wrote to memory of 3000 4788 un285604.exe 85 PID 4788 wrote to memory of 1336 4788 un285604.exe 93 PID 4788 wrote to memory of 1336 4788 un285604.exe 93 PID 4788 wrote to memory of 1336 4788 un285604.exe 93 PID 2320 wrote to memory of 4464 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 97 PID 2320 wrote to memory of 4464 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 97 PID 2320 wrote to memory of 4464 2320 66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe"C:\Users\Admin\AppData\Local\Temp\66a71698ab8455fe424345c33cd9f9c2c0f1b93a5fb7f65f11f0da0fe4506600.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7259.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 10284⤵
- Program crash
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 13284⤵
- Program crash
PID:1900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si598851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si598851.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3000 -ip 30001⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1336 -ip 13361⤵PID:1620
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5c90ba8bb641ad252a59c4c75c4c2ad
SHA1941e7b7561dc28d52c72036069b87949934f6e90
SHA256b2fb8c2cba891eb0a56e5fdacf61b25c3f96885de5a65392f26041a68b2aad3b
SHA5123255fff24746109341d3d7c7953ae78cc99cf8dfff5583980c6cbebc291f6fa760fcbbb8c6486c569a9ac72b2922f1357af538aa5bb8f147471770b021eb07f5
-
Filesize
175KB
MD5a5c90ba8bb641ad252a59c4c75c4c2ad
SHA1941e7b7561dc28d52c72036069b87949934f6e90
SHA256b2fb8c2cba891eb0a56e5fdacf61b25c3f96885de5a65392f26041a68b2aad3b
SHA5123255fff24746109341d3d7c7953ae78cc99cf8dfff5583980c6cbebc291f6fa760fcbbb8c6486c569a9ac72b2922f1357af538aa5bb8f147471770b021eb07f5
-
Filesize
558KB
MD58f13fde7df4630656739531648146e7f
SHA1a7f49cccfd0f37f33bb34909366a545a87fd5d61
SHA256daebec228f9dfe6a2e0ed8888f25afaaf79c45695a1faceb3b5e72de0a966102
SHA512b563f32d4d83ecda86b18bbc436b35d76d04f48a434388f0bafe65d7a56deb04a9fa4b0b080f67fde9788edda6756daf2ee5344cd8064e03d11582f21b762087
-
Filesize
558KB
MD58f13fde7df4630656739531648146e7f
SHA1a7f49cccfd0f37f33bb34909366a545a87fd5d61
SHA256daebec228f9dfe6a2e0ed8888f25afaaf79c45695a1faceb3b5e72de0a966102
SHA512b563f32d4d83ecda86b18bbc436b35d76d04f48a434388f0bafe65d7a56deb04a9fa4b0b080f67fde9788edda6756daf2ee5344cd8064e03d11582f21b762087
-
Filesize
307KB
MD50b5fa7f05ce219cbab177262ffb9b1e0
SHA15b69aa066ab61214ef1288206376d529812188a0
SHA256b90c3dbe2858e4188162ad8ee2c75b4e11764881c948d78e89070ebfc4dd0fed
SHA512e56cdf5cc51e92934e5d6539c6284d57c44a0756b7236acfe507d8f6546867103fd67f83e1bf022f2779be2e040222f8ae5f161f5ff34cdf640503d6482793f9
-
Filesize
307KB
MD50b5fa7f05ce219cbab177262ffb9b1e0
SHA15b69aa066ab61214ef1288206376d529812188a0
SHA256b90c3dbe2858e4188162ad8ee2c75b4e11764881c948d78e89070ebfc4dd0fed
SHA512e56cdf5cc51e92934e5d6539c6284d57c44a0756b7236acfe507d8f6546867103fd67f83e1bf022f2779be2e040222f8ae5f161f5ff34cdf640503d6482793f9
-
Filesize
365KB
MD55d2b0a714b755974fbbd4ba8ceaf2730
SHA185a33379b67baa218f4784b61071246d6d78d1c4
SHA256f83d3a98f8a3295b0dc03033982d14d45ae36aa1241fbb7fefe63b2fec942249
SHA51279ae7723f6586a5a6365bdeea3ff2163e1f0d22e2181725634bd2d7ec838bb41581f865b9e30838f5be8c4ff5ed65325196d7655bd4d2608860c836e61f90141
-
Filesize
365KB
MD55d2b0a714b755974fbbd4ba8ceaf2730
SHA185a33379b67baa218f4784b61071246d6d78d1c4
SHA256f83d3a98f8a3295b0dc03033982d14d45ae36aa1241fbb7fefe63b2fec942249
SHA51279ae7723f6586a5a6365bdeea3ff2163e1f0d22e2181725634bd2d7ec838bb41581f865b9e30838f5be8c4ff5ed65325196d7655bd4d2608860c836e61f90141