Analysis
-
max time kernel
83s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:03
Static task
static1
Behavioral task
behavioral1
Sample
329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe
Resource
win10v2004-20230220-en
General
-
Target
329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe
-
Size
700KB
-
MD5
dddfcbed91b285be083eff7fb9ca192a
-
SHA1
fe1a52dac4971628beaf625842e8ce434399d752
-
SHA256
329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e
-
SHA512
57761de9e3aceb18d91d8621184f0cfdc2040cfa38e25dcb81d4a9f55b41b44a2e7f89a7b9e44baad0a07cf485f4a4921467731352645629d8f6cf49ad782a04
-
SSDEEP
12288:IMr9y90FXGfzQy0iYW9DuTcAYNGeloatZQMC+zHHqFIiQlK:1y+WfKiiHelPtZo+HxK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6548.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4100-190-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-191-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-193-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-195-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-197-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-199-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-201-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-203-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-205-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-207-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-209-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-211-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-213-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-215-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-217-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-219-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-221-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-223-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/4100-404-0x0000000004DC0000-0x0000000004DD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un479822.exepro6548.exequ5187.exesi428938.exepid process 5060 un479822.exe 5064 pro6548.exe 4100 qu5187.exe 4812 si428938.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6548.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6548.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exeun479822.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un479822.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un479822.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1784 5064 WerFault.exe pro6548.exe 3196 4100 WerFault.exe qu5187.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6548.exequ5187.exesi428938.exepid process 5064 pro6548.exe 5064 pro6548.exe 4100 qu5187.exe 4100 qu5187.exe 4812 si428938.exe 4812 si428938.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6548.exequ5187.exesi428938.exedescription pid process Token: SeDebugPrivilege 5064 pro6548.exe Token: SeDebugPrivilege 4100 qu5187.exe Token: SeDebugPrivilege 4812 si428938.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exeun479822.exedescription pid process target process PID 4232 wrote to memory of 5060 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe un479822.exe PID 4232 wrote to memory of 5060 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe un479822.exe PID 4232 wrote to memory of 5060 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe un479822.exe PID 5060 wrote to memory of 5064 5060 un479822.exe pro6548.exe PID 5060 wrote to memory of 5064 5060 un479822.exe pro6548.exe PID 5060 wrote to memory of 5064 5060 un479822.exe pro6548.exe PID 5060 wrote to memory of 4100 5060 un479822.exe qu5187.exe PID 5060 wrote to memory of 4100 5060 un479822.exe qu5187.exe PID 5060 wrote to memory of 4100 5060 un479822.exe qu5187.exe PID 4232 wrote to memory of 4812 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe si428938.exe PID 4232 wrote to memory of 4812 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe si428938.exe PID 4232 wrote to memory of 4812 4232 329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe si428938.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe"C:\Users\Admin\AppData\Local\Temp\329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 10924⤵
- Program crash
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 13484⤵
- Program crash
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5064 -ip 50641⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4100 -ip 41001⤵PID:4972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55128ba2c442c1b12e24e27b261b602b9
SHA10478e3a20d8705421d2d8c5190d57ea4b425e472
SHA2562d2c29290880071f56dcc5d1b6443af6b4d8f1cf1950f6bc9848f34be4ec63e8
SHA512bada1ef68ae1e319c6b8af47590b048a995adf10c4c98526999508ac35de42c61310a46beac4c11c688087f8fbfea5e0110be2c43224f8aed00f8ebb1e25db81
-
Filesize
175KB
MD55128ba2c442c1b12e24e27b261b602b9
SHA10478e3a20d8705421d2d8c5190d57ea4b425e472
SHA2562d2c29290880071f56dcc5d1b6443af6b4d8f1cf1950f6bc9848f34be4ec63e8
SHA512bada1ef68ae1e319c6b8af47590b048a995adf10c4c98526999508ac35de42c61310a46beac4c11c688087f8fbfea5e0110be2c43224f8aed00f8ebb1e25db81
-
Filesize
558KB
MD5e4966c179303a62e8cb9c848cf6d93cd
SHA15dd13f8a04f0dc612a826959b309811afe571aed
SHA25665d0eb672becd4f2cbfc1f26faaeb6b863373cbf44465ad9fcaa0d939615d303
SHA512fe8f31cf593424754bc436fab24adfda397fec76ca85a9d8b1372d9c0c6910a775c44ce5649b02613a669f3c28657f63a23ef626d104b7a0e1ed473760b4b1c6
-
Filesize
558KB
MD5e4966c179303a62e8cb9c848cf6d93cd
SHA15dd13f8a04f0dc612a826959b309811afe571aed
SHA25665d0eb672becd4f2cbfc1f26faaeb6b863373cbf44465ad9fcaa0d939615d303
SHA512fe8f31cf593424754bc436fab24adfda397fec76ca85a9d8b1372d9c0c6910a775c44ce5649b02613a669f3c28657f63a23ef626d104b7a0e1ed473760b4b1c6
-
Filesize
307KB
MD5fae5a438c78d6a23db085b53a1e40537
SHA110575440059224983c1d92cd85b08a0a82c0aa41
SHA2561f4a7f79137fda57a93517dacfd14838a6f90a402bd0ac8399629f410632393a
SHA51255caccf47c437ccfbb9d867f284f121843b7aa4ed6e3084b7e84683b4c2ac3e6d8cebd4f32d88ff7b846065fb824a7171ec8849e49bcc2d6b4984a83523784f0
-
Filesize
307KB
MD5fae5a438c78d6a23db085b53a1e40537
SHA110575440059224983c1d92cd85b08a0a82c0aa41
SHA2561f4a7f79137fda57a93517dacfd14838a6f90a402bd0ac8399629f410632393a
SHA51255caccf47c437ccfbb9d867f284f121843b7aa4ed6e3084b7e84683b4c2ac3e6d8cebd4f32d88ff7b846065fb824a7171ec8849e49bcc2d6b4984a83523784f0
-
Filesize
365KB
MD50674f13c5ad63bd64e4dd70ddcc9553d
SHA17735dd1c7b43b8e129e57ce89b7bc5ef117ac319
SHA25632b5d9c8ab07c21902305d3a2b74b0a3940e64777a7b54b0df47fbfe5b6fe325
SHA512fab4766bb1ceb5c6e1817083130f83c39eafe5f032dc3f59ad24d7d2ec592d102163c02151cd01a036d78fd8ae41ca736720cba2e526f743397f64536241ed4d
-
Filesize
365KB
MD50674f13c5ad63bd64e4dd70ddcc9553d
SHA17735dd1c7b43b8e129e57ce89b7bc5ef117ac319
SHA25632b5d9c8ab07c21902305d3a2b74b0a3940e64777a7b54b0df47fbfe5b6fe325
SHA512fab4766bb1ceb5c6e1817083130f83c39eafe5f032dc3f59ad24d7d2ec592d102163c02151cd01a036d78fd8ae41ca736720cba2e526f743397f64536241ed4d