Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:26
Static task
static1
Behavioral task
behavioral1
Sample
4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe
Resource
win10v2004-20230220-en
General
-
Target
4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe
-
Size
700KB
-
MD5
7dde5a9f7261047cac1598432342f80e
-
SHA1
599e8c22e04d6d7d27753f39235575d8b9a99803
-
SHA256
4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6
-
SHA512
c6e4e7ecef75663dba84217c7e3af3e76a9990bac46a9de2f3785f4a8f2d3b8949a8b38b19b14bec1916dd7c8b5d94049bee932b40741547619a6243ded79c19
-
SSDEEP
12288:1Mrhy90hMWlL/ugP1AZimSKElVK9D5YcANlTFkX5xckUWW/eYVJvwN:AyzsLTtAjeDNlTIU7mYVlu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6558.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/460-192-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-191-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-196-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-198-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-214-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-216-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-218-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-220-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-222-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/460-224-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1036 un863497.exe 1524 pro6558.exe 460 qu0826.exe 3368 si653855.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6558.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un863497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un863497.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4144 1524 WerFault.exe 83 1124 460 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1524 pro6558.exe 1524 pro6558.exe 460 qu0826.exe 460 qu0826.exe 3368 si653855.exe 3368 si653855.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1524 pro6558.exe Token: SeDebugPrivilege 460 qu0826.exe Token: SeDebugPrivilege 3368 si653855.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1036 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 82 PID 3240 wrote to memory of 1036 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 82 PID 3240 wrote to memory of 1036 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 82 PID 1036 wrote to memory of 1524 1036 un863497.exe 83 PID 1036 wrote to memory of 1524 1036 un863497.exe 83 PID 1036 wrote to memory of 1524 1036 un863497.exe 83 PID 1036 wrote to memory of 460 1036 un863497.exe 89 PID 1036 wrote to memory of 460 1036 un863497.exe 89 PID 1036 wrote to memory of 460 1036 un863497.exe 89 PID 3240 wrote to memory of 3368 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 93 PID 3240 wrote to memory of 3368 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 93 PID 3240 wrote to memory of 3368 3240 4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe"C:\Users\Admin\AppData\Local\Temp\4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 10844⤵
- Program crash
PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 20204⤵
- Program crash
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1524 -ip 15241⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 460 -ip 4601⤵PID:2140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5187aa7e264bbe92702088b8a354c0714
SHA1cd2e30c05e1a811a11c64b6a9608ce31be376457
SHA256e21b7634e89750c83e268b30392ebc99048c03d6a189c46e5cad670510b7791f
SHA512005dc635ecc8a05a056594a0898861d388d6499b72be37dabf819a799d1813715803b4299b1896ce276ece960568c97d266b05ce94b1e2542d715db81d845838
-
Filesize
175KB
MD5187aa7e264bbe92702088b8a354c0714
SHA1cd2e30c05e1a811a11c64b6a9608ce31be376457
SHA256e21b7634e89750c83e268b30392ebc99048c03d6a189c46e5cad670510b7791f
SHA512005dc635ecc8a05a056594a0898861d388d6499b72be37dabf819a799d1813715803b4299b1896ce276ece960568c97d266b05ce94b1e2542d715db81d845838
-
Filesize
558KB
MD52c40416b24d9265cfc524587ccbb89e0
SHA1c39afe72498a56c5cdee49f7af6390151d3b3a19
SHA2567dc810cab324927f115201d9e45dac47601efb51583c398acdbbc30cdb7f2ca9
SHA5126af193e20caa995c513b694241ec241d9496134a8efe143ba3ad06cda78bb80c6f2983dd1648150ec311854d37fb2bf717dfad819daf1a0ba493270da292428e
-
Filesize
558KB
MD52c40416b24d9265cfc524587ccbb89e0
SHA1c39afe72498a56c5cdee49f7af6390151d3b3a19
SHA2567dc810cab324927f115201d9e45dac47601efb51583c398acdbbc30cdb7f2ca9
SHA5126af193e20caa995c513b694241ec241d9496134a8efe143ba3ad06cda78bb80c6f2983dd1648150ec311854d37fb2bf717dfad819daf1a0ba493270da292428e
-
Filesize
307KB
MD5dc3497ab25cd7664ddf868097c07e184
SHA171a6a3c0b3489be0465a3c0c5f288b299b6a1dd9
SHA256146d4e215da21e4e58f99c4fbf25e41069b291f61474ebb68d04110c73743cf5
SHA51265254093869e021ef985d493e1d605639178cd1be882a8331c835cfbec9c1c0fef5b6ad0a547aeb338235ac9b4d462d66404a03d92ffcb6f843bfdda4d56f072
-
Filesize
307KB
MD5dc3497ab25cd7664ddf868097c07e184
SHA171a6a3c0b3489be0465a3c0c5f288b299b6a1dd9
SHA256146d4e215da21e4e58f99c4fbf25e41069b291f61474ebb68d04110c73743cf5
SHA51265254093869e021ef985d493e1d605639178cd1be882a8331c835cfbec9c1c0fef5b6ad0a547aeb338235ac9b4d462d66404a03d92ffcb6f843bfdda4d56f072
-
Filesize
365KB
MD58061e297e0f1da0842e3ef7d60a5b4ff
SHA1369a4f28968ee9acc3403bee0b95ce5c35202df7
SHA25668cd47eadddfd24a707d6d18daf3a5611428354a6cc56739b778122c7d7e022a
SHA512f0d75e4656e483edfad3341cbd15107a1d696f9458e3b65f1c7c7e304d874d698caa81229d2f81a96ffdbedbe67abc57834aa6b01cd3090ce0583579da818a9b
-
Filesize
365KB
MD58061e297e0f1da0842e3ef7d60a5b4ff
SHA1369a4f28968ee9acc3403bee0b95ce5c35202df7
SHA25668cd47eadddfd24a707d6d18daf3a5611428354a6cc56739b778122c7d7e022a
SHA512f0d75e4656e483edfad3341cbd15107a1d696f9458e3b65f1c7c7e304d874d698caa81229d2f81a96ffdbedbe67abc57834aa6b01cd3090ce0583579da818a9b