Analysis
-
max time kernel
73s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:43
Static task
static1
Behavioral task
behavioral1
Sample
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe
Resource
win10v2004-20230220-en
General
-
Target
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe
-
Size
700KB
-
MD5
564ef4f33e292db523ee73745cd639f3
-
SHA1
5c0743cdfa73b2ed2a5ff1a6a1fed63ec915aca4
-
SHA256
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016
-
SHA512
2280131677d0afc2bcbff6a7a927ab2250b9f80a6f2302a29cc3a2e23e414e95201ddaa5049b29fbbc86d360e6f063478b015be272b1c970a2cd3302bbd5cb0b
-
SSDEEP
12288:4MrJy90U/NYYGumU79D/pcA38F5OMhkkhqV4TALXGyG98kD6mp6:ByfYLe38zOMhk7dRG9vDz6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6346.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6346.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2840-191-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-192-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-194-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-196-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-198-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-200-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-202-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-204-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-206-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-208-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-210-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-212-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-214-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-216-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-218-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-220-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-222-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-224-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/2840-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1156 un028378.exe 1120 pro6346.exe 2840 qu5770.exe 4668 si367086.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6346.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un028378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un028378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1364 1120 WerFault.exe 84 3052 2840 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1120 pro6346.exe 1120 pro6346.exe 2840 qu5770.exe 2840 qu5770.exe 4668 si367086.exe 4668 si367086.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1120 pro6346.exe Token: SeDebugPrivilege 2840 qu5770.exe Token: SeDebugPrivilege 4668 si367086.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3900 wrote to memory of 1156 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 83 PID 3900 wrote to memory of 1156 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 83 PID 3900 wrote to memory of 1156 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 83 PID 1156 wrote to memory of 1120 1156 un028378.exe 84 PID 1156 wrote to memory of 1120 1156 un028378.exe 84 PID 1156 wrote to memory of 1120 1156 un028378.exe 84 PID 1156 wrote to memory of 2840 1156 un028378.exe 92 PID 1156 wrote to memory of 2840 1156 un028378.exe 92 PID 1156 wrote to memory of 2840 1156 un028378.exe 92 PID 3900 wrote to memory of 4668 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 96 PID 3900 wrote to memory of 4668 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 96 PID 3900 wrote to memory of 4668 3900 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe"C:\Users\Admin\AppData\Local\Temp\38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 10844⤵
- Program crash
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5770.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 13564⤵
- Program crash
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367086.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1120 -ip 11201⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2840 -ip 28401⤵PID:3428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD557c589f172dd537b690ee29d0b1a8ce7
SHA146487c7e665a5bac56a26627fe8c94ef56f931f8
SHA256a1c570c70d09bd306c3cf1f921c62219225511426cec2690b90ba219988098ec
SHA512729f2f6580e097def4038be95403b998dc004e0233a0c9756fefe85f30edd72102db338bbce8fae290582960c46f2561ddbd42c22fdf24e6f3fcb2ca7ad5ae0a
-
Filesize
175KB
MD557c589f172dd537b690ee29d0b1a8ce7
SHA146487c7e665a5bac56a26627fe8c94ef56f931f8
SHA256a1c570c70d09bd306c3cf1f921c62219225511426cec2690b90ba219988098ec
SHA512729f2f6580e097def4038be95403b998dc004e0233a0c9756fefe85f30edd72102db338bbce8fae290582960c46f2561ddbd42c22fdf24e6f3fcb2ca7ad5ae0a
-
Filesize
558KB
MD5cb62255625332a59801da17f68f3e092
SHA1e1e93b39b60b000af91633f534814e73f286a63a
SHA256c3c8b9f6cadd1d2ba5d6bb96f9b5d87397da842364a4244095cb1b6346fcfb00
SHA512bec02b6eae5abb977073a0a58ece689d38d1a7c76c4acf284efe6b6bc20f246fe42890924498e440f9565d0fa78330abc3d74f2159b0d84c535d39c6052eac0f
-
Filesize
558KB
MD5cb62255625332a59801da17f68f3e092
SHA1e1e93b39b60b000af91633f534814e73f286a63a
SHA256c3c8b9f6cadd1d2ba5d6bb96f9b5d87397da842364a4244095cb1b6346fcfb00
SHA512bec02b6eae5abb977073a0a58ece689d38d1a7c76c4acf284efe6b6bc20f246fe42890924498e440f9565d0fa78330abc3d74f2159b0d84c535d39c6052eac0f
-
Filesize
307KB
MD5208a34f309752a32db9ca5509d6bb56e
SHA10f87befd20d49af851177c826dc883cdd46ffa7e
SHA2561c28b89501d1feb3ed1514bf495f3cd09f4adf18db51b1364579600152e4be03
SHA512de3699d51d2f4c5cb3fa81e2420f9aca3eda517da21cf1c0d30f0e709901e248a48f85360f14bf2a3ade96a54efb54b258cd0d880f60a72490f6b2ff89d1b49e
-
Filesize
307KB
MD5208a34f309752a32db9ca5509d6bb56e
SHA10f87befd20d49af851177c826dc883cdd46ffa7e
SHA2561c28b89501d1feb3ed1514bf495f3cd09f4adf18db51b1364579600152e4be03
SHA512de3699d51d2f4c5cb3fa81e2420f9aca3eda517da21cf1c0d30f0e709901e248a48f85360f14bf2a3ade96a54efb54b258cd0d880f60a72490f6b2ff89d1b49e
-
Filesize
365KB
MD5bc4c6235747d3c89d4d1fb7717887886
SHA152eefe44bb2d2b16cf3aae41119a4021b6fa0ea1
SHA2565de81f9d1f5ed871d7f523226b8eeb6363c1be39b722a18ea012d1460b7d9e21
SHA512fc3c9d7c5b87f778d1a1770d8d39313a5e49254eef344a6450bf5569d13b64a29b8cd65f5e8f6125fe4bf5e85175a517ed12348d3e02faf7c6911f08b8af1842
-
Filesize
365KB
MD5bc4c6235747d3c89d4d1fb7717887886
SHA152eefe44bb2d2b16cf3aae41119a4021b6fa0ea1
SHA2565de81f9d1f5ed871d7f523226b8eeb6363c1be39b722a18ea012d1460b7d9e21
SHA512fc3c9d7c5b87f778d1a1770d8d39313a5e49254eef344a6450bf5569d13b64a29b8cd65f5e8f6125fe4bf5e85175a517ed12348d3e02faf7c6911f08b8af1842