Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe
Resource
win10v2004-20230220-en
General
-
Target
ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe
-
Size
700KB
-
MD5
0b0c40c6da661981f11e4522b83e3c4e
-
SHA1
1d3e6737114cd7e4ec987b0f724fc3b9e915f05b
-
SHA256
ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333
-
SHA512
e3b9f50ac80d2e50e6f752028637f8047beef9c549d65ab7cf28f7bd32d9ca436162cd57f94f7f9bc7f64c2adb691e52d3bc530588f4d88c459e704be364dfd4
-
SSDEEP
12288:CMrJy90+nVBHNUBJ9D5wcAlqN+fLs26acCqNb/5qVwLk:DyjXfLs2rcpb5qVd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0132.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0132.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1520-191-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-194-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-192-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-196-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-198-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-200-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-202-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-204-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-206-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-208-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-210-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-212-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-214-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-217-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-221-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-223-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-225-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/1520-227-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3176 un358864.exe 3236 pro0132.exe 1520 qu1777.exe 5048 si290884.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0132.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un358864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un358864.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4068 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1328 3236 WerFault.exe 80 2420 1520 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3236 pro0132.exe 3236 pro0132.exe 1520 qu1777.exe 1520 qu1777.exe 5048 si290884.exe 5048 si290884.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3236 pro0132.exe Token: SeDebugPrivilege 1520 qu1777.exe Token: SeDebugPrivilege 5048 si290884.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1168 wrote to memory of 3176 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 79 PID 1168 wrote to memory of 3176 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 79 PID 1168 wrote to memory of 3176 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 79 PID 3176 wrote to memory of 3236 3176 un358864.exe 80 PID 3176 wrote to memory of 3236 3176 un358864.exe 80 PID 3176 wrote to memory of 3236 3176 un358864.exe 80 PID 3176 wrote to memory of 1520 3176 un358864.exe 89 PID 3176 wrote to memory of 1520 3176 un358864.exe 89 PID 3176 wrote to memory of 1520 3176 un358864.exe 89 PID 1168 wrote to memory of 5048 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 93 PID 1168 wrote to memory of 5048 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 93 PID 1168 wrote to memory of 5048 1168 ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe"C:\Users\Admin\AppData\Local\Temp\ca3f55e19c40d5c8a4e3c7bc4a43f1f9998901539dcd988bd34bb9dd586b9333.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358864.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358864.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0132.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10804⤵
- Program crash
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1777.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1777.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 13484⤵
- Program crash
PID:2420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si290884.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si290884.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3236 -ip 32361⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1520 -ip 15201⤵PID:5096
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5253c26a8e539760c64709e9f85fc7002
SHA104db9b53039a403d445bb11fcc253e25a9aa0669
SHA25602edace832f8a96f63c79531f8e5c30a919def0902f8662ec78b9fd01b11428c
SHA5121167b1308cdb353d4edced816493b18bd54c1316cb71ee3a895b13505927b3409bd0adc00181eb228f3b235ce23a7f659895ce7eb4a00a8839be8309a225921d
-
Filesize
175KB
MD5253c26a8e539760c64709e9f85fc7002
SHA104db9b53039a403d445bb11fcc253e25a9aa0669
SHA25602edace832f8a96f63c79531f8e5c30a919def0902f8662ec78b9fd01b11428c
SHA5121167b1308cdb353d4edced816493b18bd54c1316cb71ee3a895b13505927b3409bd0adc00181eb228f3b235ce23a7f659895ce7eb4a00a8839be8309a225921d
-
Filesize
558KB
MD508d880845202c79e3200330cef8be0a9
SHA1c4ec96e0a7923e2b3351a788e0bd81819c2a80f4
SHA256c9c2ad398aebe43cc777ec59fd4745fc84bf592de330815c285fde847a49fbe0
SHA5124be2fb3a8f1bd23949d74c99ed14da2ecf63f96637f600649eae76955040dfa10b9dbf4a092b2876c875888fade0c3d8bad591c84ab64bc8f0fc69c8c04feeb8
-
Filesize
558KB
MD508d880845202c79e3200330cef8be0a9
SHA1c4ec96e0a7923e2b3351a788e0bd81819c2a80f4
SHA256c9c2ad398aebe43cc777ec59fd4745fc84bf592de330815c285fde847a49fbe0
SHA5124be2fb3a8f1bd23949d74c99ed14da2ecf63f96637f600649eae76955040dfa10b9dbf4a092b2876c875888fade0c3d8bad591c84ab64bc8f0fc69c8c04feeb8
-
Filesize
307KB
MD513a78e704741c9a7e5415f04b615118a
SHA156d9f43cea648543b1c7987e25a3be319b6be0d3
SHA256b5adc089c507e1c8f8dfe98cedb9642d54dd73c9b2abe69b32c470a90129b5ef
SHA512bf70cdb943fa27a13597532028c0447d22544ae4f23ebb4a6fcca3153c0fe1a37c26f2b5f993cecd34fbc9dfee1bd1501c6f846464c276498864741171431db9
-
Filesize
307KB
MD513a78e704741c9a7e5415f04b615118a
SHA156d9f43cea648543b1c7987e25a3be319b6be0d3
SHA256b5adc089c507e1c8f8dfe98cedb9642d54dd73c9b2abe69b32c470a90129b5ef
SHA512bf70cdb943fa27a13597532028c0447d22544ae4f23ebb4a6fcca3153c0fe1a37c26f2b5f993cecd34fbc9dfee1bd1501c6f846464c276498864741171431db9
-
Filesize
365KB
MD549b8c485254e98da19f941ea56a9958f
SHA1742edd64fcc25d62088c01dd29ebbd67921f8bfc
SHA256af8b2b44ff0c76b63eb180f2864d41541f1d1b5f74786615a72dac39f81df29f
SHA512559cd873b96cb96aae073d14b72807507d6c75f86fe1c117e64608b583e5e843300204c2964d643145680ce534f6bb990c77e0ab040fb0e8f8becec40fc9c188
-
Filesize
365KB
MD549b8c485254e98da19f941ea56a9958f
SHA1742edd64fcc25d62088c01dd29ebbd67921f8bfc
SHA256af8b2b44ff0c76b63eb180f2864d41541f1d1b5f74786615a72dac39f81df29f
SHA512559cd873b96cb96aae073d14b72807507d6c75f86fe1c117e64608b583e5e843300204c2964d643145680ce534f6bb990c77e0ab040fb0e8f8becec40fc9c188