Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:24
Static task
static1
Behavioral task
behavioral1
Sample
644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe
Resource
win10v2004-20230221-en
General
-
Target
644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe
-
Size
701KB
-
MD5
214d113f313941dddc10a1f078f8cf3c
-
SHA1
689006644698d4cf4645b9a0ee2996d41ed663c8
-
SHA256
644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd
-
SHA512
278cf9b091c541b73e5f6e6c902a3450aa6bf2272d85b1b2b203eb0efa12091e6ebea71c302a8d3f535c62151b8d38535b4d3db352e0daead65516cac2dcf94f
-
SSDEEP
12288:zMrjy90Me0MUq8jTrid0H115BSPCuF4dC2Sw/coUy7WMnpgBPi:UyfezUrfHBBPBd1SuUySkpCi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8974.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8974.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1828-192-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-191-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-194-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-196-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-198-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-200-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-202-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-204-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-206-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-208-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-210-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-212-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-214-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-216-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-218-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-220-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-222-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-224-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/1828-229-0x0000000002530000-0x0000000002540000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4700 un179224.exe 4304 pro8974.exe 1828 qu4346.exe 3224 si805970.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8974.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un179224.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un179224.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4344 4304 WerFault.exe 83 3216 1828 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4304 pro8974.exe 4304 pro8974.exe 1828 qu4346.exe 1828 qu4346.exe 3224 si805970.exe 3224 si805970.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4304 pro8974.exe Token: SeDebugPrivilege 1828 qu4346.exe Token: SeDebugPrivilege 3224 si805970.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4700 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 82 PID 2348 wrote to memory of 4700 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 82 PID 2348 wrote to memory of 4700 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 82 PID 4700 wrote to memory of 4304 4700 un179224.exe 83 PID 4700 wrote to memory of 4304 4700 un179224.exe 83 PID 4700 wrote to memory of 4304 4700 un179224.exe 83 PID 4700 wrote to memory of 1828 4700 un179224.exe 89 PID 4700 wrote to memory of 1828 4700 un179224.exe 89 PID 4700 wrote to memory of 1828 4700 un179224.exe 89 PID 2348 wrote to memory of 3224 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 93 PID 2348 wrote to memory of 3224 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 93 PID 2348 wrote to memory of 3224 2348 644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe"C:\Users\Admin\AppData\Local\Temp\644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 10844⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 13524⤵
- Program crash
PID:3216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4304 -ip 43041⤵PID:264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1828 -ip 18281⤵PID:3472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD503d7fdb12cb9de8a80ee12ffc99c0dde
SHA17b793de771a81f7a9f9c4b0877f5ec2c73645646
SHA2566336686757d115eceb0377e6fa6ef849d4254d1f704a9b53a8bb32f6b38a6a86
SHA512a3a443610c405eb2f1c9084577b4711d4caf3d63b4e2b7233ffaabdfdbcd00cbc29cdfdc262267fc92f6145f28a9e68aa4ae7657a8f18f893ff18e7fb030d141
-
Filesize
175KB
MD503d7fdb12cb9de8a80ee12ffc99c0dde
SHA17b793de771a81f7a9f9c4b0877f5ec2c73645646
SHA2566336686757d115eceb0377e6fa6ef849d4254d1f704a9b53a8bb32f6b38a6a86
SHA512a3a443610c405eb2f1c9084577b4711d4caf3d63b4e2b7233ffaabdfdbcd00cbc29cdfdc262267fc92f6145f28a9e68aa4ae7657a8f18f893ff18e7fb030d141
-
Filesize
558KB
MD528d829ab6dc089e045e05dd24a464eee
SHA11e2fd267038a30b35154f93647e34c61f7fdae53
SHA2566fbd753d0a1ca02165aa2f559539b8b34693c9a05b8b8a9a885839b43e96bb3f
SHA51258c72141448193261b8e85092202eb7b2babea3ad581264035f21b04efdc9652c6711275d9a915674e44827db6b69e91f2dd571723a3d97531fd772424760183
-
Filesize
558KB
MD528d829ab6dc089e045e05dd24a464eee
SHA11e2fd267038a30b35154f93647e34c61f7fdae53
SHA2566fbd753d0a1ca02165aa2f559539b8b34693c9a05b8b8a9a885839b43e96bb3f
SHA51258c72141448193261b8e85092202eb7b2babea3ad581264035f21b04efdc9652c6711275d9a915674e44827db6b69e91f2dd571723a3d97531fd772424760183
-
Filesize
307KB
MD54eccf34ea8636960d2ae5ac757d24699
SHA1853fcd20f3e9c60c0dce5c7365455f49038fbd5e
SHA2562862c4118ecd56b4a02a8426a23abe79279d0070ac7c1cdd90f8c11a31464ace
SHA51280c559ae7b804e6e66abc1df897873fe474088d3c802558bd0c3709ed0ffaf27e495d8dc71a2bc907cbc3012e63ecb59c0f5bd0edd5b0bbd503107fd44b3340f
-
Filesize
307KB
MD54eccf34ea8636960d2ae5ac757d24699
SHA1853fcd20f3e9c60c0dce5c7365455f49038fbd5e
SHA2562862c4118ecd56b4a02a8426a23abe79279d0070ac7c1cdd90f8c11a31464ace
SHA51280c559ae7b804e6e66abc1df897873fe474088d3c802558bd0c3709ed0ffaf27e495d8dc71a2bc907cbc3012e63ecb59c0f5bd0edd5b0bbd503107fd44b3340f
-
Filesize
365KB
MD5aa6133b0fd4eefc62fca29a995c18815
SHA12ffb4bef5e7f1059c7594dc29e7c9efcc818e3ad
SHA256cbdeeaa2a94b477e5153bec76dd1f35149e99959c79e55d55855d72b9f6c033f
SHA512f493db98be6bc291bf520a82eb794a26ea8fb476e21f02f3bfec1b4dc1593180e0105c2915e85be87033b1063351c8ccbbbcec76df701edaa01c8a45c058af77
-
Filesize
365KB
MD5aa6133b0fd4eefc62fca29a995c18815
SHA12ffb4bef5e7f1059c7594dc29e7c9efcc818e3ad
SHA256cbdeeaa2a94b477e5153bec76dd1f35149e99959c79e55d55855d72b9f6c033f
SHA512f493db98be6bc291bf520a82eb794a26ea8fb476e21f02f3bfec1b4dc1593180e0105c2915e85be87033b1063351c8ccbbbcec76df701edaa01c8a45c058af77