Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:38
Static task
static1
Behavioral task
behavioral1
Sample
b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe
Resource
win10v2004-20230220-en
General
-
Target
b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe
-
Size
700KB
-
MD5
980ec0c2a21e095ee0952fd7675eee4b
-
SHA1
b6e1fed2864ffdfb331b9f7ce1e1c1d2988b57e6
-
SHA256
b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d
-
SHA512
563832786c002f47b0b0857bd45e12ddd048985b962089731e3a5527ffb866e23feca60d92bfff4d3d0a0c6db2a8f0d9921e55831f936859635acff635db9d94
-
SSDEEP
12288:LMrRy90dO9HibpU9DMqcA3DqzIdlMtIvFoH5R7/U:OygO9CIGzIbMtIvFYrM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9350.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9350.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1124-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-225-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-227-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1124-1111-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1328 un973798.exe 3636 pro9350.exe 1124 qu5149.exe 3908 si222624.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9350.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un973798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un973798.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2208 3636 WerFault.exe 84 3808 1124 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3636 pro9350.exe 3636 pro9350.exe 1124 qu5149.exe 1124 qu5149.exe 3908 si222624.exe 3908 si222624.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3636 pro9350.exe Token: SeDebugPrivilege 1124 qu5149.exe Token: SeDebugPrivilege 3908 si222624.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1328 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 83 PID 2960 wrote to memory of 1328 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 83 PID 2960 wrote to memory of 1328 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 83 PID 1328 wrote to memory of 3636 1328 un973798.exe 84 PID 1328 wrote to memory of 3636 1328 un973798.exe 84 PID 1328 wrote to memory of 3636 1328 un973798.exe 84 PID 1328 wrote to memory of 1124 1328 un973798.exe 93 PID 1328 wrote to memory of 1124 1328 un973798.exe 93 PID 1328 wrote to memory of 1124 1328 un973798.exe 93 PID 2960 wrote to memory of 3908 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 98 PID 2960 wrote to memory of 3908 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 98 PID 2960 wrote to memory of 3908 2960 b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe"C:\Users\Admin\AppData\Local\Temp\b45060767e1f878b50138677ea00d435923d8ae2352c5b241befefc4ccbf851d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973798.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973798.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9350.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 10284⤵
- Program crash
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5149.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 13484⤵
- Program crash
PID:3808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222624.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222624.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3636 -ip 36361⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1124 -ip 11241⤵PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5538e76df98980d4176326aa64803a0b8
SHA1611fde07754c2dd0515c9c42426d3928eaf39da0
SHA2569bb73d07c795856266c67662fa57ebd27dc2c7a3e9cf87e6d2a62126a4cfd745
SHA512ad22c72628bbdbd0ba7b2eafcac3e76c02419a715f836da3c03981f5b9bbc8dc19d0a0e006885cd81818c9d1a7d9fba775ddcb9897ab9911f1599dc734f94387
-
Filesize
175KB
MD5538e76df98980d4176326aa64803a0b8
SHA1611fde07754c2dd0515c9c42426d3928eaf39da0
SHA2569bb73d07c795856266c67662fa57ebd27dc2c7a3e9cf87e6d2a62126a4cfd745
SHA512ad22c72628bbdbd0ba7b2eafcac3e76c02419a715f836da3c03981f5b9bbc8dc19d0a0e006885cd81818c9d1a7d9fba775ddcb9897ab9911f1599dc734f94387
-
Filesize
558KB
MD5839c1cb1e2816a15212a8097f31ee236
SHA1e64b9770842a179f3b9340d1d18c2bb1b9ad203a
SHA25644960cd64c79e519ddbe6420cbe497044fa17a824a84e8b925cf8dc4285b4854
SHA512cfceb24ed55d627a49fd5629b6ff7fe19a8ff0fa51d23c6c7127b5adaaaae51a86d24e2b88f29968e520900ce0bb252cb770e4e0d8ccd235670d1d59f99684ed
-
Filesize
558KB
MD5839c1cb1e2816a15212a8097f31ee236
SHA1e64b9770842a179f3b9340d1d18c2bb1b9ad203a
SHA25644960cd64c79e519ddbe6420cbe497044fa17a824a84e8b925cf8dc4285b4854
SHA512cfceb24ed55d627a49fd5629b6ff7fe19a8ff0fa51d23c6c7127b5adaaaae51a86d24e2b88f29968e520900ce0bb252cb770e4e0d8ccd235670d1d59f99684ed
-
Filesize
307KB
MD51c76677b3287dd103cd57bb897227471
SHA1a3c2e78e8f0ab5d014a185b36cdf0328e81718a2
SHA256f496446c4d69c298d9b6d7e9ba480287e07e720a37d30f96624628a280cb82d2
SHA512296feb2299795bbdf9eda2facd11dc8f1c7fa599016c7f95c7750b954fd2cfb2ac031b9d7c56f9b539d2eadc0c2176bdb25ba99c5d50ced0eeb1f5b22024c2bc
-
Filesize
307KB
MD51c76677b3287dd103cd57bb897227471
SHA1a3c2e78e8f0ab5d014a185b36cdf0328e81718a2
SHA256f496446c4d69c298d9b6d7e9ba480287e07e720a37d30f96624628a280cb82d2
SHA512296feb2299795bbdf9eda2facd11dc8f1c7fa599016c7f95c7750b954fd2cfb2ac031b9d7c56f9b539d2eadc0c2176bdb25ba99c5d50ced0eeb1f5b22024c2bc
-
Filesize
365KB
MD563a39aba9ff2a050399f4e75613c0fb6
SHA1f38efbcb1b73255c9c92f4432d635fefa4e1fcaa
SHA256d65970b3db34a7c43716578d566f675e5ce12656e601254e237442bc77920073
SHA512e1a0437bfa74792b41648d473542b38650f17f8f1e651fc8d32bb1a4f73350029136cdfeaa562cc85ebfd5d27dd82c12364e05fc289f759ce9444f3e6f616fbe
-
Filesize
365KB
MD563a39aba9ff2a050399f4e75613c0fb6
SHA1f38efbcb1b73255c9c92f4432d635fefa4e1fcaa
SHA256d65970b3db34a7c43716578d566f675e5ce12656e601254e237442bc77920073
SHA512e1a0437bfa74792b41648d473542b38650f17f8f1e651fc8d32bb1a4f73350029136cdfeaa562cc85ebfd5d27dd82c12364e05fc289f759ce9444f3e6f616fbe