Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:00
Static task
static1
Behavioral task
behavioral1
Sample
c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe
Resource
win10v2004-20230220-en
General
-
Target
c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe
-
Size
699KB
-
MD5
4c7aff94bf9f153b7c9ac47311c1dff7
-
SHA1
dd1998008c019815c5f1501e6c85cc839c085162
-
SHA256
c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23
-
SHA512
0f8f46cf75db8b75549d222d3b4cbd4cb60712ac71e3ab452c572c4b486dff19573892b453d409f2122f1e9d7c176f3c67a3202bb56074a3ae52f233300a6cb5
-
SSDEEP
12288:3Mr3y90RLUAxnjODWPkctgJHKoKbbORj78dhYYu62EtTl5:QyqAAxjYctgJHKURH8dhYY2EtTl5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9507.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9507.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5084-191-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-194-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-192-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-196-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-198-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-200-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-202-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-204-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-206-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-208-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-210-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-212-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-214-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-216-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-218-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-220-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-222-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-224-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/5084-462-0x00000000024B0000-0x00000000024C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4612 un455707.exe 2984 pro9507.exe 5084 qu6683.exe 1016 si902207.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9507.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un455707.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un455707.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4600 2984 WerFault.exe 85 4628 5084 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2984 pro9507.exe 2984 pro9507.exe 5084 qu6683.exe 5084 qu6683.exe 1016 si902207.exe 1016 si902207.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2984 pro9507.exe Token: SeDebugPrivilege 5084 qu6683.exe Token: SeDebugPrivilege 1016 si902207.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4612 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 84 PID 4956 wrote to memory of 4612 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 84 PID 4956 wrote to memory of 4612 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 84 PID 4612 wrote to memory of 2984 4612 un455707.exe 85 PID 4612 wrote to memory of 2984 4612 un455707.exe 85 PID 4612 wrote to memory of 2984 4612 un455707.exe 85 PID 4612 wrote to memory of 5084 4612 un455707.exe 88 PID 4612 wrote to memory of 5084 4612 un455707.exe 88 PID 4612 wrote to memory of 5084 4612 un455707.exe 88 PID 4956 wrote to memory of 1016 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 92 PID 4956 wrote to memory of 1016 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 92 PID 4956 wrote to memory of 1016 4956 c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe"C:\Users\Admin\AppData\Local\Temp\c2f2b14c22550d99075b31e3f7f6f8e33e233abdecd1949df9d6478f26560b23.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455707.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455707.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9507.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10844⤵
- Program crash
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6683.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 13524⤵
- Program crash
PID:4628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si902207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si902207.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2984 -ip 29841⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5084 -ip 50841⤵PID:3880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c470179468e3bfb2b01712d2110fbb7
SHA126656ee181800b6079c2974b1cc7cc0361e49695
SHA256bb1af05541d62b746ee3bc399d08dac240db09c7ddd1bca85a2859cf6b67b258
SHA5125a924347c01b89d8e9716544d955e96139c59649d2ef5d6dc6d05ca297972398147e7c7e65eec698936eb021eeca1806faf91f8c013cdd10e68c9901d7b45d23
-
Filesize
175KB
MD56c470179468e3bfb2b01712d2110fbb7
SHA126656ee181800b6079c2974b1cc7cc0361e49695
SHA256bb1af05541d62b746ee3bc399d08dac240db09c7ddd1bca85a2859cf6b67b258
SHA5125a924347c01b89d8e9716544d955e96139c59649d2ef5d6dc6d05ca297972398147e7c7e65eec698936eb021eeca1806faf91f8c013cdd10e68c9901d7b45d23
-
Filesize
557KB
MD505c8d1e3cd7300d3f5c59db88e4ff0bc
SHA160f3495585716a074b8ed0ee42b5c10eb1971a69
SHA25633e5462c88cb208b2020ab4f2945f716bc05070fd21176ff95052b06655bc959
SHA51227afbe7292bf4c5df9e7d30d2ec70efaab15f07a0945ebbeed69f40f3668ec7b7fb910351a80b4ecff2006d6e1345f32cc7809e4aafa43634d49236d3910649a
-
Filesize
557KB
MD505c8d1e3cd7300d3f5c59db88e4ff0bc
SHA160f3495585716a074b8ed0ee42b5c10eb1971a69
SHA25633e5462c88cb208b2020ab4f2945f716bc05070fd21176ff95052b06655bc959
SHA51227afbe7292bf4c5df9e7d30d2ec70efaab15f07a0945ebbeed69f40f3668ec7b7fb910351a80b4ecff2006d6e1345f32cc7809e4aafa43634d49236d3910649a
-
Filesize
307KB
MD5a0a885a00930efb812073fd75dbe9bd6
SHA1ceb92b13d4afad4a81299a374a3c5a635a5051fa
SHA256e987eb4aeae6e4e9594439aca0603ae46ce86170a7e9800ed1918ae834483089
SHA5120baf83d3b56220969a5102c1ad2b73229d6ef980b5ff4d59bc5ed5480d4b6d3457f3b5ab8172c3a5dbece877b4e05881048dca737d50c215d7b1adde9d4e2b1f
-
Filesize
307KB
MD5a0a885a00930efb812073fd75dbe9bd6
SHA1ceb92b13d4afad4a81299a374a3c5a635a5051fa
SHA256e987eb4aeae6e4e9594439aca0603ae46ce86170a7e9800ed1918ae834483089
SHA5120baf83d3b56220969a5102c1ad2b73229d6ef980b5ff4d59bc5ed5480d4b6d3457f3b5ab8172c3a5dbece877b4e05881048dca737d50c215d7b1adde9d4e2b1f
-
Filesize
365KB
MD5d16314516eeb3530eac0548864d38fc4
SHA1ab652947689ce7c33f6aa455892dca4d048454cb
SHA2564447873c94c07e0687d27165cacee0edf039d1394239fc7bf47139ecafe8085a
SHA512f1a8d5daf6683c9c1b000c6b802bf39f0527f4a9d41651d47e9a915b9da202735e8944d78b93802eb08d3a345809ccee2c424586e083c2e263920e5269b0b963
-
Filesize
365KB
MD5d16314516eeb3530eac0548864d38fc4
SHA1ab652947689ce7c33f6aa455892dca4d048454cb
SHA2564447873c94c07e0687d27165cacee0edf039d1394239fc7bf47139ecafe8085a
SHA512f1a8d5daf6683c9c1b000c6b802bf39f0527f4a9d41651d47e9a915b9da202735e8944d78b93802eb08d3a345809ccee2c424586e083c2e263920e5269b0b963