Analysis
-
max time kernel
87s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:31
Static task
static1
Behavioral task
behavioral1
Sample
8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe
Resource
win10v2004-20230220-en
General
-
Target
8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe
-
Size
700KB
-
MD5
f4d85b07f79140f66b1a3a32c3f7c0e8
-
SHA1
3f06bd05e0b6b903c5ad96cd0bac9999561852de
-
SHA256
8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82
-
SHA512
99a01073b5b62c9b0c89ea7b88a10ae7bd415ac1cb45c2f47b2862392caa4159b7ac4d6c8131ff378e28a6f7bc9a8e8ecf1d4e29954ea67c0737c91168e4e571
-
SSDEEP
12288:OMrdy90OC4+Z/eaJQ4T5c9DSycA8NqwlMY7aupJ2HrEOagd:jyQ4+Nef1bwl/aupJdOagd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7633.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7633.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/460-191-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-192-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-194-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-196-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-198-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-200-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-202-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-204-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-206-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-208-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-210-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-212-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-214-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-216-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-218-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-220-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-222-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-224-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/460-1111-0x0000000002700000-0x0000000002710000-memory.dmp family_redline behavioral1/memory/460-1112-0x0000000002700000-0x0000000002710000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 316 un679682.exe 448 pro7633.exe 460 qu3521.exe 452 si036017.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7633.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un679682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un679682.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 528 448 WerFault.exe 83 4416 460 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 448 pro7633.exe 448 pro7633.exe 460 qu3521.exe 460 qu3521.exe 452 si036017.exe 452 si036017.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 448 pro7633.exe Token: SeDebugPrivilege 460 qu3521.exe Token: SeDebugPrivilege 452 si036017.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 316 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 82 PID 1716 wrote to memory of 316 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 82 PID 1716 wrote to memory of 316 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 82 PID 316 wrote to memory of 448 316 un679682.exe 83 PID 316 wrote to memory of 448 316 un679682.exe 83 PID 316 wrote to memory of 448 316 un679682.exe 83 PID 316 wrote to memory of 460 316 un679682.exe 90 PID 316 wrote to memory of 460 316 un679682.exe 90 PID 316 wrote to memory of 460 316 un679682.exe 90 PID 1716 wrote to memory of 452 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 94 PID 1716 wrote to memory of 452 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 94 PID 1716 wrote to memory of 452 1716 8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe"C:\Users\Admin\AppData\Local\Temp\8966b0a0551a3b48178974ecf5adc962eb8c966b8eab85ed967df7b1be6f9d82.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679682.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7633.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 10804⤵
- Program crash
PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3521.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3521.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 20004⤵
- Program crash
PID:4416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si036017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si036017.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 448 -ip 4481⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 460 -ip 4601⤵PID:2308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d4bc8fd2dddbb245465b760b394221e
SHA1b62f0bacb79c7afa2b747eaf93e304593dcc7a59
SHA25645f25c6ef47018f980d99d64fc3582968aaa4890d0d76b0a5a71b72b310d7b41
SHA51272b1042e09aa96162125d9f0b99281a5854202846d4a16c7d6c73a9c2abd74a0bf0bc59fb8f11943e5d2f20f5a711fe994eb33a65ecf37cdc4f45bb3a878cf1f
-
Filesize
175KB
MD50d4bc8fd2dddbb245465b760b394221e
SHA1b62f0bacb79c7afa2b747eaf93e304593dcc7a59
SHA25645f25c6ef47018f980d99d64fc3582968aaa4890d0d76b0a5a71b72b310d7b41
SHA51272b1042e09aa96162125d9f0b99281a5854202846d4a16c7d6c73a9c2abd74a0bf0bc59fb8f11943e5d2f20f5a711fe994eb33a65ecf37cdc4f45bb3a878cf1f
-
Filesize
558KB
MD51ebc494e375f89d03941f4da53c67385
SHA1eeb82c2ce79392464efb544813fb3aae32e8267c
SHA2564e5fe090a81ded1a174f9387497cfe557d7cc47f86953f355beb6537458ea5cc
SHA512558e53e4ace85780b4629082a6ee1d3a082b1bac8c1ddbc7ec46d92e249b905e16819fbd9f44b982a3740dde9e6d1d9a9900ad9bbd0c7a549e70bae020f59f75
-
Filesize
558KB
MD51ebc494e375f89d03941f4da53c67385
SHA1eeb82c2ce79392464efb544813fb3aae32e8267c
SHA2564e5fe090a81ded1a174f9387497cfe557d7cc47f86953f355beb6537458ea5cc
SHA512558e53e4ace85780b4629082a6ee1d3a082b1bac8c1ddbc7ec46d92e249b905e16819fbd9f44b982a3740dde9e6d1d9a9900ad9bbd0c7a549e70bae020f59f75
-
Filesize
307KB
MD5e4050dcb2864e64638010ddf3c0feb9a
SHA124f86174af726ac7798d86b2e353e8340aea8eab
SHA256a47cd4455c6652b33b831a758aa5236f75602579436dc1f237c36cba78625563
SHA51289c76259e2bf580f8dde9d1c50a8aa6369e6c0e195aa9182715e2f9cb00422ba160e0f8b55376a6b1c5a635fdc4eadc7493eb1d0e43e8dcac64cb414811d2f50
-
Filesize
307KB
MD5e4050dcb2864e64638010ddf3c0feb9a
SHA124f86174af726ac7798d86b2e353e8340aea8eab
SHA256a47cd4455c6652b33b831a758aa5236f75602579436dc1f237c36cba78625563
SHA51289c76259e2bf580f8dde9d1c50a8aa6369e6c0e195aa9182715e2f9cb00422ba160e0f8b55376a6b1c5a635fdc4eadc7493eb1d0e43e8dcac64cb414811d2f50
-
Filesize
365KB
MD5437bc1a1e9c8b3cea9a82ef16d75ed73
SHA1cfdb795d8471f85020f50f17569bdf350e5d3724
SHA2568e75a913543903401613f0f1524a398bf18bd04ce793fc6655e3e04545c699cc
SHA5122fb04dc80a9382a86fc7c045fe33f034405eadf1918caefd5ad16983269ce963f3bc61bbebc1e6cc082514c4f6682c2c4f964141e060b381bbfa68be51e3aa9f
-
Filesize
365KB
MD5437bc1a1e9c8b3cea9a82ef16d75ed73
SHA1cfdb795d8471f85020f50f17569bdf350e5d3724
SHA2568e75a913543903401613f0f1524a398bf18bd04ce793fc6655e3e04545c699cc
SHA5122fb04dc80a9382a86fc7c045fe33f034405eadf1918caefd5ad16983269ce963f3bc61bbebc1e6cc082514c4f6682c2c4f964141e060b381bbfa68be51e3aa9f