Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe
Resource
win10v2004-20230220-en
General
-
Target
04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe
-
Size
700KB
-
MD5
717514ae15efcee981b46931e0052845
-
SHA1
b4bb3b60e8cd8d00eaf9efe980f2a29cf2eb657e
-
SHA256
04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd
-
SHA512
5d1f9b64d636008c4e321300921f7e1080535c038a1b0b391e910f4932462ad05b2c05d1315e1c9ec26ebdc4ba3b13e2ecd5ac5c226b69b222590acb942da0d5
-
SSDEEP
12288:yMrEy90KqRrQUKwSYNQo7vE0uQxx0qH1ojIBH5f1Dlqv3:2ydqRrRKwXndFx0qHUSZDq/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8408.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2436-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-225-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/2436-227-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1544 un356544.exe 1800 pro8408.exe 2436 qu6888.exe 4204 si024128.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8408.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un356544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un356544.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4176 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3336 1800 WerFault.exe 84 2220 2436 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1800 pro8408.exe 1800 pro8408.exe 2436 qu6888.exe 2436 qu6888.exe 4204 si024128.exe 4204 si024128.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1800 pro8408.exe Token: SeDebugPrivilege 2436 qu6888.exe Token: SeDebugPrivilege 4204 si024128.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1544 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 83 PID 3524 wrote to memory of 1544 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 83 PID 3524 wrote to memory of 1544 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 83 PID 1544 wrote to memory of 1800 1544 un356544.exe 84 PID 1544 wrote to memory of 1800 1544 un356544.exe 84 PID 1544 wrote to memory of 1800 1544 un356544.exe 84 PID 1544 wrote to memory of 2436 1544 un356544.exe 91 PID 1544 wrote to memory of 2436 1544 un356544.exe 91 PID 1544 wrote to memory of 2436 1544 un356544.exe 91 PID 3524 wrote to memory of 4204 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 95 PID 3524 wrote to memory of 4204 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 95 PID 3524 wrote to memory of 4204 3524 04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe"C:\Users\Admin\AppData\Local\Temp\04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 10884⤵
- Program crash
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 13524⤵
- Program crash
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1800 -ip 18001⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2436 -ip 24361⤵PID:4040
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d53a8a5c4765638c8011383f2ff14309
SHA1c735f69b1640c39cb51ec40bb951032c465c22f4
SHA256a62c829832fad1462c6ba19220a8e6f20d525e7a3e3aec45fb91268f43e29a43
SHA512d2e9246bc44f2b3c4b0ae53bd1f6be5116946332a4b3d70f2b2aedbfdb03508cbcae78cc4264ee8615236f258771a734811f51ecf8650b4b1f127725219b04fe
-
Filesize
175KB
MD5d53a8a5c4765638c8011383f2ff14309
SHA1c735f69b1640c39cb51ec40bb951032c465c22f4
SHA256a62c829832fad1462c6ba19220a8e6f20d525e7a3e3aec45fb91268f43e29a43
SHA512d2e9246bc44f2b3c4b0ae53bd1f6be5116946332a4b3d70f2b2aedbfdb03508cbcae78cc4264ee8615236f258771a734811f51ecf8650b4b1f127725219b04fe
-
Filesize
558KB
MD51dcc45898b48cf89060d97065d8363d8
SHA117ebf85300714b275382f2cf1cd4e7076fa3d0b9
SHA256a027901710a6f1bd6eb084a8831a931c7823953674cc176dad2572530d39a9cb
SHA512d04d5733eb66562f137e99e486e76f4ee1044a9d9cbe5c93b1d59147e7c609937ec425023d21cb0e510ecac61c142dec170ba9efa528be9f92617a09c5b3c197
-
Filesize
558KB
MD51dcc45898b48cf89060d97065d8363d8
SHA117ebf85300714b275382f2cf1cd4e7076fa3d0b9
SHA256a027901710a6f1bd6eb084a8831a931c7823953674cc176dad2572530d39a9cb
SHA512d04d5733eb66562f137e99e486e76f4ee1044a9d9cbe5c93b1d59147e7c609937ec425023d21cb0e510ecac61c142dec170ba9efa528be9f92617a09c5b3c197
-
Filesize
307KB
MD513e8283b9040acce14124470aa5d0a9a
SHA17db803114f3350150f0d66ecea03f6c9fda19cbc
SHA256673f3a1a2c8afe694123cd9b3a86ec773bc73b1935c8f67b491c6f45a365ca1e
SHA5127014baff713be88a2b3b72e48f0ae8d00a6a401dc149cb5ec086c72f24311fe6b109b0b21f3c3d92190c061f07d590d83f50dd9a0271f0a73e3d033ec3916c10
-
Filesize
307KB
MD513e8283b9040acce14124470aa5d0a9a
SHA17db803114f3350150f0d66ecea03f6c9fda19cbc
SHA256673f3a1a2c8afe694123cd9b3a86ec773bc73b1935c8f67b491c6f45a365ca1e
SHA5127014baff713be88a2b3b72e48f0ae8d00a6a401dc149cb5ec086c72f24311fe6b109b0b21f3c3d92190c061f07d590d83f50dd9a0271f0a73e3d033ec3916c10
-
Filesize
365KB
MD5d3833045c5d223fd21f8108c9c11b4db
SHA1b754b693c02327e593a14da2aeed12dbc2f71bad
SHA2562313b9722d3974dbb740027b1e22125a86d4d1c518f427005bf67a8b62728dc8
SHA5123c1c52ef0d68726ab58c9713e532780c0da9af35264d5b87afd1f946072f8505042a18f3ca0ff9167c427bb4069d87e5f40292dd2386de1962ebdfb9621d5310
-
Filesize
365KB
MD5d3833045c5d223fd21f8108c9c11b4db
SHA1b754b693c02327e593a14da2aeed12dbc2f71bad
SHA2562313b9722d3974dbb740027b1e22125a86d4d1c518f427005bf67a8b62728dc8
SHA5123c1c52ef0d68726ab58c9713e532780c0da9af35264d5b87afd1f946072f8505042a18f3ca0ff9167c427bb4069d87e5f40292dd2386de1962ebdfb9621d5310