Analysis
-
max time kernel
52s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:59
Static task
static1
Behavioral task
behavioral1
Sample
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe
Resource
win10v2004-20230220-en
General
-
Target
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe
-
Size
700KB
-
MD5
0fa69235664dc018f0fb9de085fccfe8
-
SHA1
b611020e7d63b9d62092e30a6384ea312b7be335
-
SHA256
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a
-
SHA512
426cf0239c706a5dec336002f8103a646c912c794662c4122d8926d12a27bfa656e53179801bdb5cd486206502c93701d60f71e8c550e712afda7c57970dd781
-
SSDEEP
12288:XMrZy903RhyBsV6rS3kPC9DMVcAmPurcOF4Bu/fB97OiVs+WsCyRPtyFAd:yywsBm6rS3cPmPurcOqyfBls+WsCl2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1584.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3544-190-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-191-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-193-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-195-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-197-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-199-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-201-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-203-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-205-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-207-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-209-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-211-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-213-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-215-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-217-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-219-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-221-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-223-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3544-414-0x0000000004DD0000-0x0000000004DE0000-memory.dmp family_redline behavioral1/memory/3544-1111-0x0000000004DD0000-0x0000000004DE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un846457.exepro1584.exequ8593.exesi873859.exepid process 4712 un846457.exe 4668 pro1584.exe 3544 qu8593.exe 4640 si873859.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1584.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1584.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exeun846457.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un846457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un846457.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 412 4668 WerFault.exe pro1584.exe 1120 3544 WerFault.exe qu8593.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1584.exequ8593.exesi873859.exepid process 4668 pro1584.exe 4668 pro1584.exe 3544 qu8593.exe 3544 qu8593.exe 4640 si873859.exe 4640 si873859.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1584.exequ8593.exesi873859.exedescription pid process Token: SeDebugPrivilege 4668 pro1584.exe Token: SeDebugPrivilege 3544 qu8593.exe Token: SeDebugPrivilege 4640 si873859.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exeun846457.exedescription pid process target process PID 5044 wrote to memory of 4712 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe un846457.exe PID 5044 wrote to memory of 4712 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe un846457.exe PID 5044 wrote to memory of 4712 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe un846457.exe PID 4712 wrote to memory of 4668 4712 un846457.exe pro1584.exe PID 4712 wrote to memory of 4668 4712 un846457.exe pro1584.exe PID 4712 wrote to memory of 4668 4712 un846457.exe pro1584.exe PID 4712 wrote to memory of 3544 4712 un846457.exe qu8593.exe PID 4712 wrote to memory of 3544 4712 un846457.exe qu8593.exe PID 4712 wrote to memory of 3544 4712 un846457.exe qu8593.exe PID 5044 wrote to memory of 4640 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe si873859.exe PID 5044 wrote to memory of 4640 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe si873859.exe PID 5044 wrote to memory of 4640 5044 65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe si873859.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe"C:\Users\Admin\AppData\Local\Temp\65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 10804⤵
- Program crash
PID:412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 13284⤵
- Program crash
PID:1120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4668 -ip 46681⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3544 -ip 35441⤵PID:1156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5549589c884c90615cfc723f0684a3d70
SHA122afb7d064646f51b91d6c5b055ab4868725aa79
SHA256af28804ba078053c5360a95c5b3e653a967193c634524fcaa0688139bebd0d89
SHA512bb2fbe0158d3880b508d8e3fc464d68c78a95ac96a83242f79c5d5b1d493acb3b380bedb6762e15dca361987d8c26c2d2e4b604febc476bd82e549201b270a18
-
Filesize
175KB
MD5549589c884c90615cfc723f0684a3d70
SHA122afb7d064646f51b91d6c5b055ab4868725aa79
SHA256af28804ba078053c5360a95c5b3e653a967193c634524fcaa0688139bebd0d89
SHA512bb2fbe0158d3880b508d8e3fc464d68c78a95ac96a83242f79c5d5b1d493acb3b380bedb6762e15dca361987d8c26c2d2e4b604febc476bd82e549201b270a18
-
Filesize
558KB
MD57b4345f3b4af6dd3a8c9c222831b795a
SHA1d99d081c6ceaeea086687dbc6a95b7aabdea43f9
SHA2560dd72dd64f539eff1d6210a32e03e35f78c1902a397dd571c3dfb1f205e33d3d
SHA5126060b298b01fcee0599908a4e04b78755826e7c8e9e8e8ca204ef6418c41c8969b75472b6346b6aa3e62b38bad5aee790e8d002bf3f5bb5c1f816e23a41d6f02
-
Filesize
558KB
MD57b4345f3b4af6dd3a8c9c222831b795a
SHA1d99d081c6ceaeea086687dbc6a95b7aabdea43f9
SHA2560dd72dd64f539eff1d6210a32e03e35f78c1902a397dd571c3dfb1f205e33d3d
SHA5126060b298b01fcee0599908a4e04b78755826e7c8e9e8e8ca204ef6418c41c8969b75472b6346b6aa3e62b38bad5aee790e8d002bf3f5bb5c1f816e23a41d6f02
-
Filesize
307KB
MD5df512ea43191b08e4113893eadee4084
SHA14d1a60f7ced20338940fa5bbf7123b88f9c3f1bb
SHA25651886fd383be05d2327d0201d389ecf342842e8d2cf829859eabee4f03b12bc6
SHA51283c9be78a628ec84305546a45352f9e7b1eb98b7e7887c4cbc95330a197851a16dcb297bdc759b90b36c1d8af9f4a15ebefa1a4a20219e9028bf8d765bc797f1
-
Filesize
307KB
MD5df512ea43191b08e4113893eadee4084
SHA14d1a60f7ced20338940fa5bbf7123b88f9c3f1bb
SHA25651886fd383be05d2327d0201d389ecf342842e8d2cf829859eabee4f03b12bc6
SHA51283c9be78a628ec84305546a45352f9e7b1eb98b7e7887c4cbc95330a197851a16dcb297bdc759b90b36c1d8af9f4a15ebefa1a4a20219e9028bf8d765bc797f1
-
Filesize
365KB
MD532e37c440937d09d8bbb1856e1a2693a
SHA121d8fa7c66aa8163d341364139af813791eb95bf
SHA2566d121ffa0f4b6f654676f2eac689ac2f80fdb77c00591d6ff37908196da17791
SHA5126097811e84f45f17841247e17d582c17671c9e050fe9145c35bbea776ad6fb2de1254748cb43fefda2d4883d58b138d1917630788b045a044b6d01767db6581b
-
Filesize
365KB
MD532e37c440937d09d8bbb1856e1a2693a
SHA121d8fa7c66aa8163d341364139af813791eb95bf
SHA2566d121ffa0f4b6f654676f2eac689ac2f80fdb77c00591d6ff37908196da17791
SHA5126097811e84f45f17841247e17d582c17671c9e050fe9145c35bbea776ad6fb2de1254748cb43fefda2d4883d58b138d1917630788b045a044b6d01767db6581b