Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:57
Static task
static1
Behavioral task
behavioral1
Sample
274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe
Resource
win10v2004-20230220-en
General
-
Target
274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe
-
Size
700KB
-
MD5
9fa21a8ab0f2008b2fb9c4d5792b02f0
-
SHA1
df14be01d38356da48dd79acc2edd6dd8902ec0b
-
SHA256
274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e
-
SHA512
e947838016310e3690bbe54e66e3eb165ec21e8087de8756984fc90ab06f8e7544f57af98af4cd79bf071eea1a3671e6b11a8f98e895dab2790e125f5e9cbfb9
-
SSDEEP
12288:0Mr6y90gSCRMNRtD9D/gcAFDCzN+qOdH6DkkX9bshrwd:uyBR0R+FPq7jJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0429.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0429.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/180-190-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-189-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/180-1111-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1592 un275945.exe 1324 pro0429.exe 180 qu2254.exe 3732 si092113.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0429.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un275945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un275945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4776 1324 WerFault.exe 85 2032 180 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1324 pro0429.exe 1324 pro0429.exe 180 qu2254.exe 180 qu2254.exe 3732 si092113.exe 3732 si092113.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 pro0429.exe Token: SeDebugPrivilege 180 qu2254.exe Token: SeDebugPrivilege 3732 si092113.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1592 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 84 PID 3388 wrote to memory of 1592 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 84 PID 3388 wrote to memory of 1592 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 84 PID 1592 wrote to memory of 1324 1592 un275945.exe 85 PID 1592 wrote to memory of 1324 1592 un275945.exe 85 PID 1592 wrote to memory of 1324 1592 un275945.exe 85 PID 1592 wrote to memory of 180 1592 un275945.exe 88 PID 1592 wrote to memory of 180 1592 un275945.exe 88 PID 1592 wrote to memory of 180 1592 un275945.exe 88 PID 3388 wrote to memory of 3732 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 91 PID 3388 wrote to memory of 3732 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 91 PID 3388 wrote to memory of 3732 3388 274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe"C:\Users\Admin\AppData\Local\Temp\274e2e823a31a4dd443626b329ebc33e1320583e4443a046625729955eaf415e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0429.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 10844⤵
- Program crash
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2254.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 180 -s 14124⤵
- Program crash
PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092113.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si092113.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1324 -ip 13241⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 180 -ip 1801⤵PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59a2d884891c703799b098aa213febab3
SHA1103e1a7d9ac273eab06a02894648e460dc6dda7d
SHA2564ed17c475e77cbf112a4d8cd2781e96d5ede7ae82cbbd3e35d4272ef69922816
SHA512f477a7178f211ba22fcaf1fc6f148d8ff52131d660c7c01a1440d0fe42c8a4c6c4dce69be4fc909b048c296b587c75583e75a08d832ba9a1e1ed27e84a53af7b
-
Filesize
175KB
MD59a2d884891c703799b098aa213febab3
SHA1103e1a7d9ac273eab06a02894648e460dc6dda7d
SHA2564ed17c475e77cbf112a4d8cd2781e96d5ede7ae82cbbd3e35d4272ef69922816
SHA512f477a7178f211ba22fcaf1fc6f148d8ff52131d660c7c01a1440d0fe42c8a4c6c4dce69be4fc909b048c296b587c75583e75a08d832ba9a1e1ed27e84a53af7b
-
Filesize
558KB
MD53c4641cdd3ded5692e5599ccd31c8280
SHA103c9f6d0b8b7c85016d54bbdd9db72c37d80739b
SHA256d32441e50488d31359b1876545d725a6c949d6758a9b0041519fefeb54b1f27f
SHA512d412760edda5f8669990e29eaf001624dd0e41378f91eb194bfa6b90b3c4e4284edb79abbb77e25d57ac7776e7ca5ea99d241607f2eb79903d5d42002e173d4d
-
Filesize
558KB
MD53c4641cdd3ded5692e5599ccd31c8280
SHA103c9f6d0b8b7c85016d54bbdd9db72c37d80739b
SHA256d32441e50488d31359b1876545d725a6c949d6758a9b0041519fefeb54b1f27f
SHA512d412760edda5f8669990e29eaf001624dd0e41378f91eb194bfa6b90b3c4e4284edb79abbb77e25d57ac7776e7ca5ea99d241607f2eb79903d5d42002e173d4d
-
Filesize
307KB
MD5538b89317af58a797173959af2fe73bb
SHA191b0ebb59009b50618e622eeda7227086848041e
SHA25666f0f2845daef825594f273caca4f5f6e11b0a43d5c4822ab8ef6f9ba7fb6b7f
SHA512dc0d15d95903e0a1bae0c81db2f541c6c65c26d1bf29952d442a79e6b2f5d1ec1c60c9cb75139549ab3012b704a811d8041179087efee30d9c0ed00284dc0037
-
Filesize
307KB
MD5538b89317af58a797173959af2fe73bb
SHA191b0ebb59009b50618e622eeda7227086848041e
SHA25666f0f2845daef825594f273caca4f5f6e11b0a43d5c4822ab8ef6f9ba7fb6b7f
SHA512dc0d15d95903e0a1bae0c81db2f541c6c65c26d1bf29952d442a79e6b2f5d1ec1c60c9cb75139549ab3012b704a811d8041179087efee30d9c0ed00284dc0037
-
Filesize
365KB
MD5376fd0e180ae8e32ff38ff1d428fb789
SHA15489b9f2fcde0f900230dab9c39d93d0615f08bd
SHA2566997a1616aab2de67ad7d3432132bab85b4596ef0ebcad53f91dbb0779cf3859
SHA5127f507a08a88237100be0f64d7ece2943b5dfea51a0f356c86c4013488ffc34fa03cae8fb602c22ba9aa39e7d18ae5e8f5c90aef5077a126abb79a0bcaabcd0ce
-
Filesize
365KB
MD5376fd0e180ae8e32ff38ff1d428fb789
SHA15489b9f2fcde0f900230dab9c39d93d0615f08bd
SHA2566997a1616aab2de67ad7d3432132bab85b4596ef0ebcad53f91dbb0779cf3859
SHA5127f507a08a88237100be0f64d7ece2943b5dfea51a0f356c86c4013488ffc34fa03cae8fb602c22ba9aa39e7d18ae5e8f5c90aef5077a126abb79a0bcaabcd0ce