Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:55
Static task
static1
Behavioral task
behavioral1
Sample
5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe
Resource
win10v2004-20230220-en
General
-
Target
5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe
-
Size
700KB
-
MD5
32afaa768831764c2cac7697429adb56
-
SHA1
9e5f9621af61d6503e8c8855802faf57a778613b
-
SHA256
5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502
-
SHA512
8da41ac558a7e18d4658a820a0314ec950a16987a2a2c64ad49c39c13af785e1fd678b69b663505da219085178da051f990ca6093b185c49863d445f13b6bf93
-
SSDEEP
12288:hMrry90TN44Xybf7X+A816FN+j5nZi9XFO7Nj7u8gZiDzXtd:eyw5ybfj+AW5nUOJHulZiDzXn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8838.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8838.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4320-189-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-190-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-192-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-194-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-196-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-198-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-200-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-202-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-204-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-206-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-208-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-210-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-212-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-214-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-216-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-218-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-220-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-222-0x00000000027E0000-0x000000000281F000-memory.dmp family_redline behavioral1/memory/4320-259-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2472 un782526.exe 1812 pro8838.exe 4320 qu0591.exe 484 si697061.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8838.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un782526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un782526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2480 1812 WerFault.exe 83 3800 4320 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1812 pro8838.exe 1812 pro8838.exe 4320 qu0591.exe 4320 qu0591.exe 484 si697061.exe 484 si697061.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1812 pro8838.exe Token: SeDebugPrivilege 4320 qu0591.exe Token: SeDebugPrivilege 484 si697061.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2472 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 82 PID 1400 wrote to memory of 2472 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 82 PID 1400 wrote to memory of 2472 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 82 PID 2472 wrote to memory of 1812 2472 un782526.exe 83 PID 2472 wrote to memory of 1812 2472 un782526.exe 83 PID 2472 wrote to memory of 1812 2472 un782526.exe 83 PID 2472 wrote to memory of 4320 2472 un782526.exe 90 PID 2472 wrote to memory of 4320 2472 un782526.exe 90 PID 2472 wrote to memory of 4320 2472 un782526.exe 90 PID 1400 wrote to memory of 484 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 94 PID 1400 wrote to memory of 484 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 94 PID 1400 wrote to memory of 484 1400 5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe"C:\Users\Admin\AppData\Local\Temp\5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 10804⤵
- Program crash
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 13444⤵
- Program crash
PID:3800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1812 -ip 18121⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4320 -ip 43201⤵PID:1672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD578d0a55c01248b59f6d74abdc624f152
SHA1ab84638a9083cc9e2b3a5d7b933f66896d0ae293
SHA2568cbbf6824af13d3ab5dd0987c7f403dfb29d17f1b8cf12c41e277c45c5ce9843
SHA512c4217ba61ffa60da5cd8d0f24f040f23f432ba626b42c48844e8c84bf0c55d71c9212cc88607d72e69ee4a8e669f6ea6f4b0903f9d6d54715f3b6e9eba9ca2c5
-
Filesize
175KB
MD578d0a55c01248b59f6d74abdc624f152
SHA1ab84638a9083cc9e2b3a5d7b933f66896d0ae293
SHA2568cbbf6824af13d3ab5dd0987c7f403dfb29d17f1b8cf12c41e277c45c5ce9843
SHA512c4217ba61ffa60da5cd8d0f24f040f23f432ba626b42c48844e8c84bf0c55d71c9212cc88607d72e69ee4a8e669f6ea6f4b0903f9d6d54715f3b6e9eba9ca2c5
-
Filesize
558KB
MD5c0e51222e262263933f32a0c00dad77f
SHA1c940a7075a16eaee9f1bcc4823b5908940413549
SHA256ca0a791e2c135e26ee492267b0c5c3096147e48007c10e5e4ade15d27f371a9e
SHA512227c68ec18b9537e1c552ae8bc3608dc1bc6330a059d096b0c0f51701b8a21376499f63db069996bfbf5bdbcc32ddd8f5f1a059c08faf1272963c26c559f82d4
-
Filesize
558KB
MD5c0e51222e262263933f32a0c00dad77f
SHA1c940a7075a16eaee9f1bcc4823b5908940413549
SHA256ca0a791e2c135e26ee492267b0c5c3096147e48007c10e5e4ade15d27f371a9e
SHA512227c68ec18b9537e1c552ae8bc3608dc1bc6330a059d096b0c0f51701b8a21376499f63db069996bfbf5bdbcc32ddd8f5f1a059c08faf1272963c26c559f82d4
-
Filesize
307KB
MD572b746ad1dae9fb986426f9d3d085b10
SHA142a2f584b4e591c73a78ae0e915e1c60a102b916
SHA256d4691c37c50ca06b07680a0a197310c4deee052268493ce421bc0466a2c6d2fb
SHA512e7e8e410c1d010d0f0a651b1f9d60e16fcdbba48c1ea10ebb34719306f26ec72773f2a170c656d04a79a35b1d2f1392c7b825fee68aa6c80a20cd3755904a218
-
Filesize
307KB
MD572b746ad1dae9fb986426f9d3d085b10
SHA142a2f584b4e591c73a78ae0e915e1c60a102b916
SHA256d4691c37c50ca06b07680a0a197310c4deee052268493ce421bc0466a2c6d2fb
SHA512e7e8e410c1d010d0f0a651b1f9d60e16fcdbba48c1ea10ebb34719306f26ec72773f2a170c656d04a79a35b1d2f1392c7b825fee68aa6c80a20cd3755904a218
-
Filesize
365KB
MD5336da6bf0929f19436b41cfc71fea7f1
SHA1943d219e2a58a73346661a31b6d944e63dd63eb4
SHA256fd3fa3f4865e05c32d6deeb48c60f2a89d8dda50566f1f4c2beb3e2d10807d8a
SHA51286c03b31040476cfd8918cc8e6810931fbd2d196befe968603013c7dbddf15478f4337deaa6dba7d5c953d1696a862756cf49dab3f1bf283cb29bcef91d07bf9
-
Filesize
365KB
MD5336da6bf0929f19436b41cfc71fea7f1
SHA1943d219e2a58a73346661a31b6d944e63dd63eb4
SHA256fd3fa3f4865e05c32d6deeb48c60f2a89d8dda50566f1f4c2beb3e2d10807d8a
SHA51286c03b31040476cfd8918cc8e6810931fbd2d196befe968603013c7dbddf15478f4337deaa6dba7d5c953d1696a862756cf49dab3f1bf283cb29bcef91d07bf9