Analysis
-
max time kernel
72s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe
Resource
win10v2004-20230220-en
General
-
Target
7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe
-
Size
700KB
-
MD5
1faaaf51623d2543905df8590be8ce46
-
SHA1
a9c03f03347cab3b1c7c51574b71902f86afd0cc
-
SHA256
7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8
-
SHA512
1f48596a3f4687f60bda63eb537112811bcdd0f7260e0dc6d9d0d7ccf991a8547028fb3b293749ab25d135998f624027ece219761f5bb2ee2766f6adaa93c2c2
-
SSDEEP
12288:zMrJy90uEP1ybkAF99D/UcAUNTqGETQZCD5tu60qO4rDunpo:aycsmqqRnD5UGuO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8968.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8968.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1648-193-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-194-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-196-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-198-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-200-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-202-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-204-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-206-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-208-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-210-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-212-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-214-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-216-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-218-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-220-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-222-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-224-0x0000000005330000-0x000000000536F000-memory.dmp family_redline behavioral1/memory/1648-226-0x0000000005330000-0x000000000536F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4044 un581735.exe 1508 pro8968.exe 1648 qu0970.exe 3500 si541270.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8968.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un581735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un581735.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4956 1508 WerFault.exe 85 1240 1648 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1508 pro8968.exe 1508 pro8968.exe 1648 qu0970.exe 1648 qu0970.exe 3500 si541270.exe 3500 si541270.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1508 pro8968.exe Token: SeDebugPrivilege 1648 qu0970.exe Token: SeDebugPrivilege 3500 si541270.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4044 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 84 PID 3344 wrote to memory of 4044 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 84 PID 3344 wrote to memory of 4044 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 84 PID 4044 wrote to memory of 1508 4044 un581735.exe 85 PID 4044 wrote to memory of 1508 4044 un581735.exe 85 PID 4044 wrote to memory of 1508 4044 un581735.exe 85 PID 4044 wrote to memory of 1648 4044 un581735.exe 93 PID 4044 wrote to memory of 1648 4044 un581735.exe 93 PID 4044 wrote to memory of 1648 4044 un581735.exe 93 PID 3344 wrote to memory of 3500 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 96 PID 3344 wrote to memory of 3500 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 96 PID 3344 wrote to memory of 3500 3344 7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe"C:\Users\Admin\AppData\Local\Temp\7db6b2de8e97607c8f734379ae5af4a043438c55374be0946af22d3e07f0d9c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581735.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 10884⤵
- Program crash
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 13484⤵
- Program crash
PID:1240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si541270.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si541270.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1508 -ip 15081⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 16481⤵PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ae2eb4772858650b116d024354d93b91
SHA1c2487f1708432bf5a852b0ab0327ea6c53af0b16
SHA256d10f5cd9f29df73a393e29aff9d11a4bc25e386e56be3500ee3de353f6d536ca
SHA5126c0f2904eca0eab44a24b8781b4ebf1c7c7b9aed8e7c72a1503fdfa74346e7d8ac4e9c3c131d2f537f18037aaf74782f1683b634fc41cd7bdda0312c9464d3e4
-
Filesize
175KB
MD5ae2eb4772858650b116d024354d93b91
SHA1c2487f1708432bf5a852b0ab0327ea6c53af0b16
SHA256d10f5cd9f29df73a393e29aff9d11a4bc25e386e56be3500ee3de353f6d536ca
SHA5126c0f2904eca0eab44a24b8781b4ebf1c7c7b9aed8e7c72a1503fdfa74346e7d8ac4e9c3c131d2f537f18037aaf74782f1683b634fc41cd7bdda0312c9464d3e4
-
Filesize
558KB
MD54786f9a72576cf287edb0407e7638ca9
SHA176db2af20a5f6b72d5caa43b6a4f5705e0dceef1
SHA256d0922da7b742f23abe54b647300c41e57ef5dea4b0b7c02d4005fdf1d58630af
SHA512ebc2eb7cb80c1e22d1dee4cd6728df8cda2c8d584d015cd9c1aef0f653a544c558657db32b6a4c5723d2c2bc53e5c6d0bc7bc903b30cee2e6bcf41def9eb7b26
-
Filesize
558KB
MD54786f9a72576cf287edb0407e7638ca9
SHA176db2af20a5f6b72d5caa43b6a4f5705e0dceef1
SHA256d0922da7b742f23abe54b647300c41e57ef5dea4b0b7c02d4005fdf1d58630af
SHA512ebc2eb7cb80c1e22d1dee4cd6728df8cda2c8d584d015cd9c1aef0f653a544c558657db32b6a4c5723d2c2bc53e5c6d0bc7bc903b30cee2e6bcf41def9eb7b26
-
Filesize
307KB
MD5ea9a7c920dc3538c18eb675a078bc77c
SHA1dcb7dddc8f4ba7761b70b254ced205fd844feaec
SHA2569c745c41751d1c7a916c884324dab8c6bc41aa08ee92988d3bf76c0bfeb5ba4e
SHA5125bf1732c4ff406e855fd3a39fbaf7daa75ac5c190e64ffb97def8cf028eba829fa3bc13399138d473f1e2bbdb1136807303586b380482c258f1f5cd1c0e85e77
-
Filesize
307KB
MD5ea9a7c920dc3538c18eb675a078bc77c
SHA1dcb7dddc8f4ba7761b70b254ced205fd844feaec
SHA2569c745c41751d1c7a916c884324dab8c6bc41aa08ee92988d3bf76c0bfeb5ba4e
SHA5125bf1732c4ff406e855fd3a39fbaf7daa75ac5c190e64ffb97def8cf028eba829fa3bc13399138d473f1e2bbdb1136807303586b380482c258f1f5cd1c0e85e77
-
Filesize
365KB
MD5b53868405b51f3629fb1253a27dc9fd6
SHA17641d55d04bc6f52626c11178d21f4f40d0a7b94
SHA256763d58fe2a1378c542883e34fd776d7605bafd81a060d7371575cffb47539f5b
SHA5126e7e9a37c6bf2b1a7518a697425dd4a1af9dddcf356e1ace48101db44cde92d5086f18dd958e865a186a63e6697cf3e082bbcad63520e770c966536f501f7d9f
-
Filesize
365KB
MD5b53868405b51f3629fb1253a27dc9fd6
SHA17641d55d04bc6f52626c11178d21f4f40d0a7b94
SHA256763d58fe2a1378c542883e34fd776d7605bafd81a060d7371575cffb47539f5b
SHA5126e7e9a37c6bf2b1a7518a697425dd4a1af9dddcf356e1ace48101db44cde92d5086f18dd958e865a186a63e6697cf3e082bbcad63520e770c966536f501f7d9f