Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:45
Static task
static1
Behavioral task
behavioral1
Sample
8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe
Resource
win10v2004-20230220-en
General
-
Target
8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe
-
Size
700KB
-
MD5
4fdd00fa267dcf811f8b75f325581766
-
SHA1
e8419921c732ab949c1f96f09cf4bb4d66599d7e
-
SHA256
8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b
-
SHA512
afd7ffb4a1693f427bef0141ecec1faa5c131b69b8107881989c4a78f66efa97c17d0537974ab4b362e3e79548a949abb27a6d782947ff9a32359fc8cf33fe62
-
SSDEEP
12288:gMrNy90CbHdDJuO6SOB1P9DG3cAqtt8F3+gEPWUBgCquhLtoBRPf1U:dydJ6SI1iqtt8VKDg/uhL4U
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3337.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3337.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3648-191-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-194-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-192-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-196-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-198-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-200-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-202-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-204-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-206-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-208-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-210-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-212-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-214-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-216-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-218-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-220-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-222-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-226-0x0000000004E60000-0x0000000004E70000-memory.dmp family_redline behavioral1/memory/3648-225-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/3648-227-0x0000000004E60000-0x0000000004E70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1164 un801179.exe 1320 pro3337.exe 3648 qu3806.exe 4896 si432354.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3337.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un801179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un801179.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3076 1320 WerFault.exe 84 2928 3648 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1320 pro3337.exe 1320 pro3337.exe 3648 qu3806.exe 3648 qu3806.exe 4896 si432354.exe 4896 si432354.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1320 pro3337.exe Token: SeDebugPrivilege 3648 qu3806.exe Token: SeDebugPrivilege 4896 si432354.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 932 wrote to memory of 1164 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 83 PID 932 wrote to memory of 1164 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 83 PID 932 wrote to memory of 1164 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 83 PID 1164 wrote to memory of 1320 1164 un801179.exe 84 PID 1164 wrote to memory of 1320 1164 un801179.exe 84 PID 1164 wrote to memory of 1320 1164 un801179.exe 84 PID 1164 wrote to memory of 3648 1164 un801179.exe 94 PID 1164 wrote to memory of 3648 1164 un801179.exe 94 PID 1164 wrote to memory of 3648 1164 un801179.exe 94 PID 932 wrote to memory of 4896 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 99 PID 932 wrote to memory of 4896 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 99 PID 932 wrote to memory of 4896 932 8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe"C:\Users\Admin\AppData\Local\Temp\8e42ee48dc00bcb6ca2e03ca155146c58b2b52496a1c465b600f10bf908bab3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801179.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3337.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 10644⤵
- Program crash
PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3806.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 15444⤵
- Program crash
PID:2928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432354.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1320 -ip 13201⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3648 -ip 36481⤵PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51579f262b609cc3a91f156ed759bb26b
SHA1a817bcfde062dc08b0696e4fbe09339b5533bd34
SHA256997a7599e43efe07376fbcbd3df84ec8105400c698edfdda72cea8b8c6e03bda
SHA51298a187bdff243ec27855ff804f53735d988ad49bc9a018f540d006d069ffdaa4dd40c04a3a7825a157278a6a8f3c80c93c35fb813fd0138e7a18b72683f62eb2
-
Filesize
175KB
MD51579f262b609cc3a91f156ed759bb26b
SHA1a817bcfde062dc08b0696e4fbe09339b5533bd34
SHA256997a7599e43efe07376fbcbd3df84ec8105400c698edfdda72cea8b8c6e03bda
SHA51298a187bdff243ec27855ff804f53735d988ad49bc9a018f540d006d069ffdaa4dd40c04a3a7825a157278a6a8f3c80c93c35fb813fd0138e7a18b72683f62eb2
-
Filesize
558KB
MD54f488c528c9a14902b38d3498cff3aad
SHA1ca1cafa4788b27163d375c39c5fd8bda642147b4
SHA2567270e4839ef8d3e8efef34987536ba50fc541f048f8608b2953164fe2feed941
SHA5127215a2b143aebecc354618f39bb32fcd03ab1e2e708a4d3c601bbe78908b742f419766123f38d7e299241016452effa3bbcda4de9c842e8380f82c47efc69573
-
Filesize
558KB
MD54f488c528c9a14902b38d3498cff3aad
SHA1ca1cafa4788b27163d375c39c5fd8bda642147b4
SHA2567270e4839ef8d3e8efef34987536ba50fc541f048f8608b2953164fe2feed941
SHA5127215a2b143aebecc354618f39bb32fcd03ab1e2e708a4d3c601bbe78908b742f419766123f38d7e299241016452effa3bbcda4de9c842e8380f82c47efc69573
-
Filesize
307KB
MD58ff780c14379fa2cf718e66e7609845e
SHA1cb44442e485a530c72c5442d64dde648acd53452
SHA25631a75fdae103be9ad0fcefb309dd90726af95ee5edfaa711e8006117de5b2d9a
SHA512526ad7ff5454a7ee8be07ba41c4519da1ff3d06cdc4841cd92f564f500a640e37fbf06bf417215b62c9b16fa298c156fc2ad1b2bd088dee885c474438f350e34
-
Filesize
307KB
MD58ff780c14379fa2cf718e66e7609845e
SHA1cb44442e485a530c72c5442d64dde648acd53452
SHA25631a75fdae103be9ad0fcefb309dd90726af95ee5edfaa711e8006117de5b2d9a
SHA512526ad7ff5454a7ee8be07ba41c4519da1ff3d06cdc4841cd92f564f500a640e37fbf06bf417215b62c9b16fa298c156fc2ad1b2bd088dee885c474438f350e34
-
Filesize
365KB
MD5b28fcab8a84c6d69f08ab5393bda64ed
SHA1e55e66ce73ecf0f86be59ddca5db356c7e961583
SHA2562277be6e77c1cbc76fb1dc6df014d6fa34b4f3aefe8887ed36bbb17e5534c3c6
SHA51203130a41757fabe84615f0c56dd3b8e15520437f6eed242fdea23475c8b18d358561771a3c3abc582490ab1ef1572420b890e019ee7e501c2650d7ce72f9e0f7
-
Filesize
365KB
MD5b28fcab8a84c6d69f08ab5393bda64ed
SHA1e55e66ce73ecf0f86be59ddca5db356c7e961583
SHA2562277be6e77c1cbc76fb1dc6df014d6fa34b4f3aefe8887ed36bbb17e5534c3c6
SHA51203130a41757fabe84615f0c56dd3b8e15520437f6eed242fdea23475c8b18d358561771a3c3abc582490ab1ef1572420b890e019ee7e501c2650d7ce72f9e0f7