Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:05
Static task
static1
Behavioral task
behavioral1
Sample
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe
Resource
win10v2004-20230220-en
General
-
Target
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe
-
Size
701KB
-
MD5
0d17143e6351fcc3836467c0f7712da1
-
SHA1
f41eb3d0d29e7345cfbbf49a287d5e1be7c38624
-
SHA256
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe
-
SHA512
51d803d58cf126dbf8d4629e3286833a0b6e24736a90db88556784a10e8b2edd000550a65553a6e32a85c4667d790ca17b9ecc3241e3f86ae347082a4b1140bf
-
SSDEEP
12288:qMr9y90DUCLLXPOe1d87r0NEhlTFluMCUv8GWK:HyE7nXPNMdhl5lSQ8zK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0780.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4284-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-198-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-202-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-214-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-216-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-218-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-220-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-222-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-224-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/4284-243-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline behavioral1/memory/4284-1112-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3452 un177774.exe 4816 pro0780.exe 4284 qu9173.exe 2480 si280498.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0780.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un177774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un177774.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1984 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1960 4816 WerFault.exe 86 3312 4284 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4816 pro0780.exe 4816 pro0780.exe 4284 qu9173.exe 4284 qu9173.exe 2480 si280498.exe 2480 si280498.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4816 pro0780.exe Token: SeDebugPrivilege 4284 qu9173.exe Token: SeDebugPrivilege 2480 si280498.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3452 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 85 PID 3480 wrote to memory of 3452 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 85 PID 3480 wrote to memory of 3452 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 85 PID 3452 wrote to memory of 4816 3452 un177774.exe 86 PID 3452 wrote to memory of 4816 3452 un177774.exe 86 PID 3452 wrote to memory of 4816 3452 un177774.exe 86 PID 3452 wrote to memory of 4284 3452 un177774.exe 92 PID 3452 wrote to memory of 4284 3452 un177774.exe 92 PID 3452 wrote to memory of 4284 3452 un177774.exe 92 PID 3480 wrote to memory of 2480 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 96 PID 3480 wrote to memory of 2480 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 96 PID 3480 wrote to memory of 2480 3480 db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe"C:\Users\Admin\AppData\Local\Temp\db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un177774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un177774.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0780.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0780.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 10844⤵
- Program crash
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9173.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 19524⤵
- Program crash
PID:3312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280498.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4816 -ip 48161⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4284 -ip 42841⤵PID:3460
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD504a86c37eb16f8cb6a41395a64cc5f30
SHA1ce9634423381119a3bce3ceae09083a4c618e643
SHA2565dde47354b8e8de30533eb2517ed11164489026fc235915cf5670d321700e5c1
SHA5128e6eb031fe9fd480fc38d1a0c11e8601e3a0bd43022e21deade9f3e5f686019d335b4d6d8f2a2f95ac748b59206e31e3c0f4bfcccc90c96f10e7bbd7745dcad2
-
Filesize
175KB
MD504a86c37eb16f8cb6a41395a64cc5f30
SHA1ce9634423381119a3bce3ceae09083a4c618e643
SHA2565dde47354b8e8de30533eb2517ed11164489026fc235915cf5670d321700e5c1
SHA5128e6eb031fe9fd480fc38d1a0c11e8601e3a0bd43022e21deade9f3e5f686019d335b4d6d8f2a2f95ac748b59206e31e3c0f4bfcccc90c96f10e7bbd7745dcad2
-
Filesize
558KB
MD5e6b5c0f693c579468225dfc63083679e
SHA1bb5f534c19e44cb39fd6328e7de3c5917b08f3b0
SHA2560158616901f896061667fd60d46037e15995fd230d1bc621229280c326140ea0
SHA512b237e656abca08b0579304b15e2042dcead862da921368b5515f1aa6d220c495e7a8d250df2cedf8ed0a171a8c962d6b6a9811e00950e6eeed15dfc9f5c74550
-
Filesize
558KB
MD5e6b5c0f693c579468225dfc63083679e
SHA1bb5f534c19e44cb39fd6328e7de3c5917b08f3b0
SHA2560158616901f896061667fd60d46037e15995fd230d1bc621229280c326140ea0
SHA512b237e656abca08b0579304b15e2042dcead862da921368b5515f1aa6d220c495e7a8d250df2cedf8ed0a171a8c962d6b6a9811e00950e6eeed15dfc9f5c74550
-
Filesize
307KB
MD57bd21de43aaf90399c39d2a0de7b3ad5
SHA1a82c052600d917c8bb9771778f8ba2f07aa6c188
SHA256c95b01f60f82de1db9e76aa39bc6526544fcfc8cefca45b29eda22270775b1a1
SHA512e199832f49e9451fe5534479bb89e9d8f86fe79ebc0377dab81edcc41c6a7c2b8b0a2e4a0583cf3c1b655ef706e4a3d87fde0cf66d202e79cb85a6f5671da94f
-
Filesize
307KB
MD57bd21de43aaf90399c39d2a0de7b3ad5
SHA1a82c052600d917c8bb9771778f8ba2f07aa6c188
SHA256c95b01f60f82de1db9e76aa39bc6526544fcfc8cefca45b29eda22270775b1a1
SHA512e199832f49e9451fe5534479bb89e9d8f86fe79ebc0377dab81edcc41c6a7c2b8b0a2e4a0583cf3c1b655ef706e4a3d87fde0cf66d202e79cb85a6f5671da94f
-
Filesize
365KB
MD5f21dd7b51e2c3deed66002a508f9333e
SHA172f5e3a2117134117966d92178d0c1f4b517fd36
SHA256fecf11ee99100fb8155322ebe62fb38b630cfd75d93637ef20fca123aeb14c8f
SHA5129b74cb52f18279d21389339e7b23aecc8f1c02b8fef7541e35354f977ebeaa07862bfb5994ef74adb84ec7d82c471ed078aada75e1d119821ff136f1e1ae2f15
-
Filesize
365KB
MD5f21dd7b51e2c3deed66002a508f9333e
SHA172f5e3a2117134117966d92178d0c1f4b517fd36
SHA256fecf11ee99100fb8155322ebe62fb38b630cfd75d93637ef20fca123aeb14c8f
SHA5129b74cb52f18279d21389339e7b23aecc8f1c02b8fef7541e35354f977ebeaa07862bfb5994ef74adb84ec7d82c471ed078aada75e1d119821ff136f1e1ae2f15