Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:48
Static task
static1
Behavioral task
behavioral1
Sample
7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe
Resource
win10v2004-20230220-en
General
-
Target
7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe
-
Size
700KB
-
MD5
484dce48d39d1ddfd78f73754377d66d
-
SHA1
7e5ee498b0e2915c6a43bce3a7eebbd93ef06d8f
-
SHA256
7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7
-
SHA512
26fdcc0cb4bcb28ed57c4974e6c08d76b5b1fe0dca7d6940cd97f4a1963768d52ea74d9a8392a2617140f3c0a1564a628d59a6ef6fdadde6f5c17cb81f5b1b4b
-
SSDEEP
12288:jMrhy90YteX9Kd2Hv12o9DMacA1GIgPhNU2JjCD8tQdf:Ky5etEMv12W1GICh+ujltQdf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7160.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7160.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4196-194-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-195-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-197-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-199-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-201-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-203-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-205-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-207-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-209-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-211-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-215-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-213-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-217-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-219-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-221-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-223-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-225-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/4196-227-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4028 un327991.exe 1972 pro7160.exe 4196 qu4453.exe 2784 si891767.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7160.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un327991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un327991.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4088 1972 WerFault.exe 84 1420 4196 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1972 pro7160.exe 1972 pro7160.exe 4196 qu4453.exe 4196 qu4453.exe 2784 si891767.exe 2784 si891767.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1972 pro7160.exe Token: SeDebugPrivilege 4196 qu4453.exe Token: SeDebugPrivilege 2784 si891767.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4028 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 83 PID 1880 wrote to memory of 4028 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 83 PID 1880 wrote to memory of 4028 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 83 PID 4028 wrote to memory of 1972 4028 un327991.exe 84 PID 4028 wrote to memory of 1972 4028 un327991.exe 84 PID 4028 wrote to memory of 1972 4028 un327991.exe 84 PID 4028 wrote to memory of 4196 4028 un327991.exe 90 PID 4028 wrote to memory of 4196 4028 un327991.exe 90 PID 4028 wrote to memory of 4196 4028 un327991.exe 90 PID 1880 wrote to memory of 2784 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 94 PID 1880 wrote to memory of 2784 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 94 PID 1880 wrote to memory of 2784 1880 7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe"C:\Users\Admin\AppData\Local\Temp\7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 10844⤵
- Program crash
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 15324⤵
- Program crash
PID:1420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1972 -ip 19721⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4196 -ip 41961⤵PID:3760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b4b9f5ee9e4363c77f717c8cf06af9c6
SHA17e3062abe8919ebaf17a9eb8456f7de96ade20d4
SHA2561b7ca2b68af4f88e939f5a374c02ea6c7e699453c1a13723c5981ea7a03a002e
SHA5120f510f213e61d7af7a5195e5f2fb17ee6eeca411bf7d60bb914b965ab920537553357c70be4e69705f8df414a76c349fb57243bc8f1b8ea1d8c3fc319303a6f6
-
Filesize
175KB
MD5b4b9f5ee9e4363c77f717c8cf06af9c6
SHA17e3062abe8919ebaf17a9eb8456f7de96ade20d4
SHA2561b7ca2b68af4f88e939f5a374c02ea6c7e699453c1a13723c5981ea7a03a002e
SHA5120f510f213e61d7af7a5195e5f2fb17ee6eeca411bf7d60bb914b965ab920537553357c70be4e69705f8df414a76c349fb57243bc8f1b8ea1d8c3fc319303a6f6
-
Filesize
558KB
MD5cb8da298d3480a38c239d8404d544637
SHA1531e8a76da56af618ff0103d1d6966bdbd26dc34
SHA256fefa7cb2ccf21b54cf1aa0a8d55f0c2fed251e39f1a172d58f012a1e0198685b
SHA512ea87bcb86aa0efba0934fa6efc9aee015f78ee7a5e076e1596095bae542d67a829865529b5b630b0cc4a724fa6df6e0e192b8ec3795b25f8954c7025de02e247
-
Filesize
558KB
MD5cb8da298d3480a38c239d8404d544637
SHA1531e8a76da56af618ff0103d1d6966bdbd26dc34
SHA256fefa7cb2ccf21b54cf1aa0a8d55f0c2fed251e39f1a172d58f012a1e0198685b
SHA512ea87bcb86aa0efba0934fa6efc9aee015f78ee7a5e076e1596095bae542d67a829865529b5b630b0cc4a724fa6df6e0e192b8ec3795b25f8954c7025de02e247
-
Filesize
307KB
MD50a4f16c4267073511e956d83a16d2be8
SHA1358fd1f06e43792d2b3456481533879f80e55260
SHA2560cf508466422d8fcace43b1ae2298396a9860febfa38f983fba7737b2dee0ac5
SHA512601676f1e40e44f6a76f6c501a803d0006c9130370dda4e0af400038ef17853ab6f72b0586ca8de8682da9db0ad001fa2057aa63df56de307e7c7890a14c27a5
-
Filesize
307KB
MD50a4f16c4267073511e956d83a16d2be8
SHA1358fd1f06e43792d2b3456481533879f80e55260
SHA2560cf508466422d8fcace43b1ae2298396a9860febfa38f983fba7737b2dee0ac5
SHA512601676f1e40e44f6a76f6c501a803d0006c9130370dda4e0af400038ef17853ab6f72b0586ca8de8682da9db0ad001fa2057aa63df56de307e7c7890a14c27a5
-
Filesize
365KB
MD59b01feef7f83e1f49d76dc2389b08a7b
SHA181383189e6576bb98fcc080e941e296ad3634acc
SHA256f1b79792199a5f8605196a99b457a2039e48634c6b2ec283c39cc26f6b0a6fc6
SHA5126b3213b93f56ed3678655024af25a842da8b8cdccacc55b860a3b2cc8fa8c6c6e12f4daadb1c1e27e245cc795ce993aed55877a02969ffecbcb8bc91a2c86c1f
-
Filesize
365KB
MD59b01feef7f83e1f49d76dc2389b08a7b
SHA181383189e6576bb98fcc080e941e296ad3634acc
SHA256f1b79792199a5f8605196a99b457a2039e48634c6b2ec283c39cc26f6b0a6fc6
SHA5126b3213b93f56ed3678655024af25a842da8b8cdccacc55b860a3b2cc8fa8c6c6e12f4daadb1c1e27e245cc795ce993aed55877a02969ffecbcb8bc91a2c86c1f