Analysis
-
max time kernel
90s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:08
Static task
static1
Behavioral task
behavioral1
Sample
ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe
Resource
win10v2004-20230220-en
General
-
Target
ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe
-
Size
699KB
-
MD5
86bdae3c1649572aa6ad1a4975b4b89a
-
SHA1
2c4f511d4708900b857b91f83683b308e8f725ea
-
SHA256
ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac
-
SHA512
9633d3c128f8b6ddeace8cae2221c72ce088751d9b8d98841db366db4aa7747ed5293879db5d81f0bfc9e81432e699b3d00023cda97f0cb14d02ff74bb750309
-
SSDEEP
12288:0Mr4y90RGOpp46GHom5bmGgJA9DSpcAmn3dKORj7CB/AZnr39G:UyAGZ6GHoCJgJMKGHCBC39G
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3445.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2424-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-214-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-216-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-218-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-220-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-222-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-224-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-226-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2424-228-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3248 un619617.exe 3516 pro3445.exe 2424 qu1394.exe 2116 si670217.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3445.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un619617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un619617.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4808 3516 WerFault.exe 80 4332 2424 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3516 pro3445.exe 3516 pro3445.exe 2424 qu1394.exe 2424 qu1394.exe 2116 si670217.exe 2116 si670217.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3516 pro3445.exe Token: SeDebugPrivilege 2424 qu1394.exe Token: SeDebugPrivilege 2116 si670217.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3248 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 79 PID 3820 wrote to memory of 3248 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 79 PID 3820 wrote to memory of 3248 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 79 PID 3248 wrote to memory of 3516 3248 un619617.exe 80 PID 3248 wrote to memory of 3516 3248 un619617.exe 80 PID 3248 wrote to memory of 3516 3248 un619617.exe 80 PID 3248 wrote to memory of 2424 3248 un619617.exe 92 PID 3248 wrote to memory of 2424 3248 un619617.exe 92 PID 3248 wrote to memory of 2424 3248 un619617.exe 92 PID 3820 wrote to memory of 2116 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 97 PID 3820 wrote to memory of 2116 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 97 PID 3820 wrote to memory of 2116 3820 ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe"C:\Users\Admin\AppData\Local\Temp\ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 11004⤵
- Program crash
PID:4808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 15924⤵
- Program crash
PID:4332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3516 -ip 35161⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2424 -ip 24241⤵PID:4244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54afe90d9f62a90eb2d9734bb5fc0e556
SHA1a2469cde82905a62e073b0ec86a87854841b6088
SHA256da183eefc4cc0a7dcabf5f977baa5214488119e5f706eed19ff1422c35c5e250
SHA51252f19fd83a9fcbce79e64358716c894d0fd58800ec23ee560c9b2f26f4e43d00cd7996484eb193d97d0db047c659442643c528c53d83b8eabd0147e18fd6d0b1
-
Filesize
175KB
MD54afe90d9f62a90eb2d9734bb5fc0e556
SHA1a2469cde82905a62e073b0ec86a87854841b6088
SHA256da183eefc4cc0a7dcabf5f977baa5214488119e5f706eed19ff1422c35c5e250
SHA51252f19fd83a9fcbce79e64358716c894d0fd58800ec23ee560c9b2f26f4e43d00cd7996484eb193d97d0db047c659442643c528c53d83b8eabd0147e18fd6d0b1
-
Filesize
557KB
MD54b62f95103c90b577b75a1d2193d781b
SHA1d6a7bde6b2e3c27ec14f2348233129a7f0583bda
SHA256f7ca8a1744c32e835096f04809f48d79f601607b6ee7e16973eeb3774ef9e075
SHA51231f3b493e4b20aab45e1a4916196a1e186a88a54c7dbb6fa4cdfd8a89e8d79355168b5a2aa1e3d13144f4023f6a8ac10234fda9f5f704f9f6f2dbdbbb33f8519
-
Filesize
557KB
MD54b62f95103c90b577b75a1d2193d781b
SHA1d6a7bde6b2e3c27ec14f2348233129a7f0583bda
SHA256f7ca8a1744c32e835096f04809f48d79f601607b6ee7e16973eeb3774ef9e075
SHA51231f3b493e4b20aab45e1a4916196a1e186a88a54c7dbb6fa4cdfd8a89e8d79355168b5a2aa1e3d13144f4023f6a8ac10234fda9f5f704f9f6f2dbdbbb33f8519
-
Filesize
307KB
MD5e2f51f6756e39b406ea445bc8599781f
SHA124a53d9bba526c363ef2d785c864c9fe46b74c04
SHA256e7ec40cf138c55ab0a4808721f6078d55bde9286b4065a9fb0c9659a9dba54fe
SHA512ec40b294efcef01a62574bfbcfb90066cad3adab8fe2078e505e1439311849eeb21984f137d3f947a690d4374680e38d0d12ef14c4237e38a669b8de9cf0ed4e
-
Filesize
307KB
MD5e2f51f6756e39b406ea445bc8599781f
SHA124a53d9bba526c363ef2d785c864c9fe46b74c04
SHA256e7ec40cf138c55ab0a4808721f6078d55bde9286b4065a9fb0c9659a9dba54fe
SHA512ec40b294efcef01a62574bfbcfb90066cad3adab8fe2078e505e1439311849eeb21984f137d3f947a690d4374680e38d0d12ef14c4237e38a669b8de9cf0ed4e
-
Filesize
365KB
MD50c3cfbfe3142b54fd4b7aa21a7236f28
SHA1d875845dee14f0aead0083e391918b8faf8212de
SHA256ad632b950eaee1bb7cc24999d6aa7cd530695dc6a1dd1ac6bda7e4ae6cc7fcfa
SHA512d219454f5e30656d74fb48d5fb48761f2bdc68e568a2ab7c2729da81ceae65bf7cf1ebe075ca79c94f501ab6fdac007d27df9505191a05f0848bd75db13a3b71
-
Filesize
365KB
MD50c3cfbfe3142b54fd4b7aa21a7236f28
SHA1d875845dee14f0aead0083e391918b8faf8212de
SHA256ad632b950eaee1bb7cc24999d6aa7cd530695dc6a1dd1ac6bda7e4ae6cc7fcfa
SHA512d219454f5e30656d74fb48d5fb48761f2bdc68e568a2ab7c2729da81ceae65bf7cf1ebe075ca79c94f501ab6fdac007d27df9505191a05f0848bd75db13a3b71