Analysis
-
max time kernel
58s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:49
Static task
static1
Behavioral task
behavioral1
Sample
df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe
Resource
win10v2004-20230220-en
General
-
Target
df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe
-
Size
700KB
-
MD5
f18baa9d0cd6b50d6cf8661efb4c5fc3
-
SHA1
8bee6602b4aad25250a68959bb22242aa97a6c6d
-
SHA256
df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6
-
SHA512
dfc186fd9392ccae90b3feb5dbb1df10cf95b8e49a0990b7998f25189ade8a4a1f92350b0628435236959505e2d1467fcb8d31babdaaf8e712950aed5e190ca9
-
SSDEEP
12288:4Mrgy90Ayz7JFbsIcUIk+9DSbcAz8F3q86HZs0zMgIR3M6VihlpHunr:IyNy3jNIkHz8V8/zMpFph
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0027.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0027.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3924-193-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-195-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-197-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-199-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-201-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-203-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-205-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-207-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-209-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-211-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-213-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-215-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-217-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-219-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-221-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-223-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-225-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3924-227-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1416 un244693.exe 3336 pro0027.exe 3924 qu8075.exe 4376 si351470.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0027.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0027.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un244693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un244693.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4516 3336 WerFault.exe 86 4396 3924 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3336 pro0027.exe 3336 pro0027.exe 3924 qu8075.exe 3924 qu8075.exe 4376 si351470.exe 4376 si351470.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3336 pro0027.exe Token: SeDebugPrivilege 3924 qu8075.exe Token: SeDebugPrivilege 4376 si351470.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4164 wrote to memory of 1416 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 85 PID 4164 wrote to memory of 1416 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 85 PID 4164 wrote to memory of 1416 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 85 PID 1416 wrote to memory of 3336 1416 un244693.exe 86 PID 1416 wrote to memory of 3336 1416 un244693.exe 86 PID 1416 wrote to memory of 3336 1416 un244693.exe 86 PID 1416 wrote to memory of 3924 1416 un244693.exe 92 PID 1416 wrote to memory of 3924 1416 un244693.exe 92 PID 1416 wrote to memory of 3924 1416 un244693.exe 92 PID 4164 wrote to memory of 4376 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 96 PID 4164 wrote to memory of 4376 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 96 PID 4164 wrote to memory of 4376 4164 df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe"C:\Users\Admin\AppData\Local\Temp\df3a960f89924333d26c673cca543cdd090b6f33adfff09741cee45ee65070b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un244693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un244693.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0027.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 10044⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8075.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 11924⤵
- Program crash
PID:4396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si351470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si351470.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3336 -ip 33361⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3924 -ip 39241⤵PID:3912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5721024ce8f551de53ccb331fe881cc37
SHA1ffbd3beee99ffc4de639d4a35f232b39df1083ac
SHA256289d1f030b111fd6f93d37c531e46d25a53fe085f5a946b5c74667978beb9601
SHA512be006e6386c8b6455dc77c2bd7e2339569b47c34c180b7814a268c3235fd77c0fd2fac0de9e56343982cc1ecc22441c8be5f604100bcc07c930777c826c8eacb
-
Filesize
175KB
MD5721024ce8f551de53ccb331fe881cc37
SHA1ffbd3beee99ffc4de639d4a35f232b39df1083ac
SHA256289d1f030b111fd6f93d37c531e46d25a53fe085f5a946b5c74667978beb9601
SHA512be006e6386c8b6455dc77c2bd7e2339569b47c34c180b7814a268c3235fd77c0fd2fac0de9e56343982cc1ecc22441c8be5f604100bcc07c930777c826c8eacb
-
Filesize
558KB
MD5047a03983bacd77278510d3ad734dea3
SHA185a6429e9903ded1df87b53fc768f28706228108
SHA256298dba634fbf6b169d0b18dedae0177b7990e8f7aa797e21aad84e285b174a65
SHA512c2e176fc1e5889551230d7334ea073fe6aa6ca255d9d5d9a85a45171769072ee14d29d3b89d26eb22b327663c9e06ee02891a7ccce7093ac5206f669a7bef246
-
Filesize
558KB
MD5047a03983bacd77278510d3ad734dea3
SHA185a6429e9903ded1df87b53fc768f28706228108
SHA256298dba634fbf6b169d0b18dedae0177b7990e8f7aa797e21aad84e285b174a65
SHA512c2e176fc1e5889551230d7334ea073fe6aa6ca255d9d5d9a85a45171769072ee14d29d3b89d26eb22b327663c9e06ee02891a7ccce7093ac5206f669a7bef246
-
Filesize
307KB
MD535862b58ad091f3f00009fa92eea8eb9
SHA1efa9945ffb6518c50dab019f7b140af873de0d82
SHA256903d199338f1d027ded36772cd8892f338a5a2137d194afba01ad55e53ace62e
SHA5124d725def45962ea7f959e3bdda1608c06f65dc2ba30026ed2e1c01d727272ac0daafcf787e805ca16c1748f5b3325df93aeddbf3d00cd6744da4a57b0b26a56a
-
Filesize
307KB
MD535862b58ad091f3f00009fa92eea8eb9
SHA1efa9945ffb6518c50dab019f7b140af873de0d82
SHA256903d199338f1d027ded36772cd8892f338a5a2137d194afba01ad55e53ace62e
SHA5124d725def45962ea7f959e3bdda1608c06f65dc2ba30026ed2e1c01d727272ac0daafcf787e805ca16c1748f5b3325df93aeddbf3d00cd6744da4a57b0b26a56a
-
Filesize
365KB
MD51fbd9aacd93d5960b4cfe706b9f10578
SHA110c1a950ae17aa929aacbeb38e7234ffd8873c6b
SHA25643e5af23e53c5d65fbfbe8a9cd26973b013ee960767ced6aaac923e7cb27d94a
SHA512b797ba2e7539d95f44012cc4fd9b806521ef97c4cba2622d6970dfd06b752090283902b4ca93bd8a80b5000973afd59c15fafb507fe3c29d268b64d0acae4d97
-
Filesize
365KB
MD51fbd9aacd93d5960b4cfe706b9f10578
SHA110c1a950ae17aa929aacbeb38e7234ffd8873c6b
SHA25643e5af23e53c5d65fbfbe8a9cd26973b013ee960767ced6aaac923e7cb27d94a
SHA512b797ba2e7539d95f44012cc4fd9b806521ef97c4cba2622d6970dfd06b752090283902b4ca93bd8a80b5000973afd59c15fafb507fe3c29d268b64d0acae4d97