Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:15
Static task
static1
Behavioral task
behavioral1
Sample
7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe
Resource
win10v2004-20230220-en
General
-
Target
7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe
-
Size
701KB
-
MD5
c68a3ca58d194074f0053b1bc1a2bf64
-
SHA1
761c73ae9ca726ebfba64522db88539b27696375
-
SHA256
7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447
-
SHA512
3e66cc09feeb3bfd38b322d0301d901686013c11fc0e4c553c14eedbce9aee3589b56462729a80b9d79a0ecb029cf2a23961f90a3c115290270e1cc6ca7bf08b
-
SSDEEP
12288:LMrey90TcR0URlEa/HyYr9DMbcANFcPpqNPqaoaTQcHVu60OOjYMyS:RyXHlEWsNFcPpMq4n8nx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9733.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/840-193-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-194-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-196-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-198-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-200-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-202-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-204-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-206-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-208-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-210-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-212-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-214-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-216-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-218-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-220-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-222-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-224-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-226-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/840-1111-0x00000000023F0000-0x0000000002400000-memory.dmp family_redline behavioral1/memory/840-1112-0x00000000023F0000-0x0000000002400000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1768 un838924.exe 2672 pro9733.exe 840 qu1137.exe 3688 si570623.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9733.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9733.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un838924.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un838924.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4936 2672 WerFault.exe 86 4900 840 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2672 pro9733.exe 2672 pro9733.exe 840 qu1137.exe 840 qu1137.exe 3688 si570623.exe 3688 si570623.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 pro9733.exe Token: SeDebugPrivilege 840 qu1137.exe Token: SeDebugPrivilege 3688 si570623.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1768 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 85 PID 1484 wrote to memory of 1768 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 85 PID 1484 wrote to memory of 1768 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 85 PID 1768 wrote to memory of 2672 1768 un838924.exe 86 PID 1768 wrote to memory of 2672 1768 un838924.exe 86 PID 1768 wrote to memory of 2672 1768 un838924.exe 86 PID 1768 wrote to memory of 840 1768 un838924.exe 96 PID 1768 wrote to memory of 840 1768 un838924.exe 96 PID 1768 wrote to memory of 840 1768 un838924.exe 96 PID 1484 wrote to memory of 3688 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 100 PID 1484 wrote to memory of 3688 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 100 PID 1484 wrote to memory of 3688 1484 7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe"C:\Users\Admin\AppData\Local\Temp\7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 10844⤵
- Program crash
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 9804⤵
- Program crash
PID:4900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2672 -ip 26721⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 840 -ip 8401⤵PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52f5576f21e2194d0f11c4a54ac48cd54
SHA117831013defd6b922ed87d569558d98f5bf9a1b7
SHA256fa4bc938da3cb6fe130b8d085d270d9410abb14ecb7a2ba0727728712ea65afb
SHA512efb495c2bc99c23205cc70f71b637e12fc05efa9be824820dc84b4ace41d79cd57c9c0c25634548e6e8756357279d382083c2cb5e107e9b7ee75dcec8f0cb8a5
-
Filesize
175KB
MD52f5576f21e2194d0f11c4a54ac48cd54
SHA117831013defd6b922ed87d569558d98f5bf9a1b7
SHA256fa4bc938da3cb6fe130b8d085d270d9410abb14ecb7a2ba0727728712ea65afb
SHA512efb495c2bc99c23205cc70f71b637e12fc05efa9be824820dc84b4ace41d79cd57c9c0c25634548e6e8756357279d382083c2cb5e107e9b7ee75dcec8f0cb8a5
-
Filesize
558KB
MD5d8676120f232936804d242613125a2a8
SHA12a506f14872817f9be4f118834197b7ef60f59f6
SHA256d7d1a24153590820062c7aa68069bfef58b36b5b3fcddd71254cfeff5e041019
SHA51226dc0af7b4188ddb35309bdc2ccb2785de4871e20252bec60bc10bc82c512ec15b7acddba19ef84ed37bbe6a178aa96a228a6cbb9ef372349c1734cea530b258
-
Filesize
558KB
MD5d8676120f232936804d242613125a2a8
SHA12a506f14872817f9be4f118834197b7ef60f59f6
SHA256d7d1a24153590820062c7aa68069bfef58b36b5b3fcddd71254cfeff5e041019
SHA51226dc0af7b4188ddb35309bdc2ccb2785de4871e20252bec60bc10bc82c512ec15b7acddba19ef84ed37bbe6a178aa96a228a6cbb9ef372349c1734cea530b258
-
Filesize
307KB
MD583993a0dbca81a3b2c1967453eff4322
SHA1643c0e8b6eed58a2663baeea55ed6a0155db62ce
SHA2565abb4926ec27b998a7d87c38a2762d76281a2c2f8aa5af6e15fa86165c3ccfbe
SHA512142e0151caa2e1cfbc361f3be750d5a443c0aeeaacb2976fd279688efed9cd3c1b65b6fb14af53fb0091fb082e0af5170b99d6ba21364b6329685ff74520621a
-
Filesize
307KB
MD583993a0dbca81a3b2c1967453eff4322
SHA1643c0e8b6eed58a2663baeea55ed6a0155db62ce
SHA2565abb4926ec27b998a7d87c38a2762d76281a2c2f8aa5af6e15fa86165c3ccfbe
SHA512142e0151caa2e1cfbc361f3be750d5a443c0aeeaacb2976fd279688efed9cd3c1b65b6fb14af53fb0091fb082e0af5170b99d6ba21364b6329685ff74520621a
-
Filesize
365KB
MD5223ac58592aabda6ed265bcfecaa55ef
SHA1c4e79816a47531af458b917635a7ca05c9b944ae
SHA256bba2aeba6ac359424e26627e59ab8489fd009a089eec87dc1520d1a72cf89c7e
SHA512b571c5fe081124fcc3bff01a38c2bfcd2d7bbd5dc4bc12d5eee3d411f81dbc02732d50c3e97b344329014e8940a8987e22c3e94629f000331d2ed29c74c11cf7
-
Filesize
365KB
MD5223ac58592aabda6ed265bcfecaa55ef
SHA1c4e79816a47531af458b917635a7ca05c9b944ae
SHA256bba2aeba6ac359424e26627e59ab8489fd009a089eec87dc1520d1a72cf89c7e
SHA512b571c5fe081124fcc3bff01a38c2bfcd2d7bbd5dc4bc12d5eee3d411f81dbc02732d50c3e97b344329014e8940a8987e22c3e94629f000331d2ed29c74c11cf7