Analysis
-
max time kernel
93s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:42
Static task
static1
Behavioral task
behavioral1
Sample
d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe
Resource
win10v2004-20230220-en
General
-
Target
d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe
-
Size
700KB
-
MD5
2ebd2884c9469457bda795909c9f04e2
-
SHA1
de041e88502b3947b171a90c5faa7ef36e59c1ac
-
SHA256
d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186
-
SHA512
8b80a8bff7d0f1612d8810413acb47c41960991569457c3b1302fe9fdc217dfb689eb1bcddf74c1e8005b32bd2d10034e6a0835c2d5486ae21d90f4e590243b3
-
SSDEEP
12288:aMrpy90gd47BTMF3FfjJp9D7tcAZ8F5pZ/cchf0p0fvm0JDNd:by+arLNZ8zpZPhMp0fe0JD/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4672.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4948-191-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-192-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-194-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-196-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-198-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-200-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-202-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-204-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-206-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-210-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-214-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-213-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_redline behavioral1/memory/4948-216-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-218-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-220-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-222-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-224-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-226-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-228-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4948-1111-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 972 un945295.exe 1492 pro4672.exe 4948 qu7310.exe 4468 si052564.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4672.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4672.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un945295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un945295.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4988 1492 WerFault.exe 84 3892 4948 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1492 pro4672.exe 1492 pro4672.exe 4948 qu7310.exe 4948 qu7310.exe 4468 si052564.exe 4468 si052564.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1492 pro4672.exe Token: SeDebugPrivilege 4948 qu7310.exe Token: SeDebugPrivilege 4468 si052564.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1312 wrote to memory of 972 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 83 PID 1312 wrote to memory of 972 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 83 PID 1312 wrote to memory of 972 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 83 PID 972 wrote to memory of 1492 972 un945295.exe 84 PID 972 wrote to memory of 1492 972 un945295.exe 84 PID 972 wrote to memory of 1492 972 un945295.exe 84 PID 972 wrote to memory of 4948 972 un945295.exe 90 PID 972 wrote to memory of 4948 972 un945295.exe 90 PID 972 wrote to memory of 4948 972 un945295.exe 90 PID 1312 wrote to memory of 4468 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 94 PID 1312 wrote to memory of 4468 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 94 PID 1312 wrote to memory of 4468 1312 d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe"C:\Users\Admin\AppData\Local\Temp\d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 10844⤵
- Program crash
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 19084⤵
- Program crash
PID:3892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1492 -ip 14921⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4948 -ip 49481⤵PID:1852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55fc0b6aff80dcab82a0282cefc435943
SHA11f0e28a0dfa015243f8f76de8f67c9acca3c94fb
SHA256b5ac9b2df6af69af1b3e7ae5993f5d88506d59a48c3946e3d389ce38829e6eaf
SHA512d7f1eb99636d323c66591efc091ad341b67899256514d80e243566395296bb6c22670ff990942e83e080503b6cf20c9158e82d4174e308bceda0cfdc4aea40ec
-
Filesize
175KB
MD55fc0b6aff80dcab82a0282cefc435943
SHA11f0e28a0dfa015243f8f76de8f67c9acca3c94fb
SHA256b5ac9b2df6af69af1b3e7ae5993f5d88506d59a48c3946e3d389ce38829e6eaf
SHA512d7f1eb99636d323c66591efc091ad341b67899256514d80e243566395296bb6c22670ff990942e83e080503b6cf20c9158e82d4174e308bceda0cfdc4aea40ec
-
Filesize
558KB
MD59b4aaabc4903909495aad31ea48c7c48
SHA1c4771a68f8cdbc0ffdfeab255fec91b5bd9ebad3
SHA2560e5a43488dd415dd175c54dcb8aebd9f408ba361beb746da1707f084c2326753
SHA512f5cc73655f7c4a475cefa3390b4e486ed9d2f801168dcb94d1a0a65cfaf438e2f58da7045641d8492526421d01b8b7e2990445dd15024c3dcb2c91250fbb54eb
-
Filesize
558KB
MD59b4aaabc4903909495aad31ea48c7c48
SHA1c4771a68f8cdbc0ffdfeab255fec91b5bd9ebad3
SHA2560e5a43488dd415dd175c54dcb8aebd9f408ba361beb746da1707f084c2326753
SHA512f5cc73655f7c4a475cefa3390b4e486ed9d2f801168dcb94d1a0a65cfaf438e2f58da7045641d8492526421d01b8b7e2990445dd15024c3dcb2c91250fbb54eb
-
Filesize
307KB
MD5e710c8d29f03a97b2ff5ad204bed778c
SHA1da5148e8446b4503c6fffce206a710962e923d35
SHA25605eea50a3f75c7ffa3a69515762adbee199cc21bc321691705765673d34d8cda
SHA512915de5830041f8c8639d1fab6f82929fc1e48b7435e31807c3193e740b497a8bc9a4e23a223202e88af1f75762436543de83178f23106b44e00d9474e8a721a0
-
Filesize
307KB
MD5e710c8d29f03a97b2ff5ad204bed778c
SHA1da5148e8446b4503c6fffce206a710962e923d35
SHA25605eea50a3f75c7ffa3a69515762adbee199cc21bc321691705765673d34d8cda
SHA512915de5830041f8c8639d1fab6f82929fc1e48b7435e31807c3193e740b497a8bc9a4e23a223202e88af1f75762436543de83178f23106b44e00d9474e8a721a0
-
Filesize
365KB
MD558c508f50d076aafaa099c01497431a2
SHA141ead3349a94c88bc37034d30d55f9bea34c34b6
SHA256c35d6765b947b0b5debe587255d06773af612cd7464fb68fe2dc64e740c0460a
SHA51216d0709577bd403b41ad79c867278338d90d62c590e390e5b056e85dadcf17f20a3a57dd1a7079ea450ae88fbb29f97b85012a6186a12ba4c20f11f5b9f667a4
-
Filesize
365KB
MD558c508f50d076aafaa099c01497431a2
SHA141ead3349a94c88bc37034d30d55f9bea34c34b6
SHA256c35d6765b947b0b5debe587255d06773af612cd7464fb68fe2dc64e740c0460a
SHA51216d0709577bd403b41ad79c867278338d90d62c590e390e5b056e85dadcf17f20a3a57dd1a7079ea450ae88fbb29f97b85012a6186a12ba4c20f11f5b9f667a4