Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:29
Static task
static1
Behavioral task
behavioral1
Sample
9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe
Resource
win10v2004-20230220-en
General
-
Target
9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe
-
Size
700KB
-
MD5
29bb58d97963d6019d177e68632f1443
-
SHA1
1b2abf6df20f270d0d14b3b2269ca6e1de4079fd
-
SHA256
9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e
-
SHA512
08946f0aefb19cc52c37afd8269ffa9edec372e790d6333723e0c7bb97bef4096e332fb9cfce88392b355fcd0a98cbff6828b238261cdb5b778ae75740a11f28
-
SSDEEP
12288:UMrBy90J1vl1S41Y3O9DNYcAy8F/FoErq6UuoAPAo5Ex5FAlyekCFB:NyU1Fyy8hFoEW6Uuao5ExvAAek6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1154.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1154.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1096-190-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-191-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-193-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-195-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-197-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-199-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-201-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-203-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-205-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-207-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-209-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-211-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-213-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-215-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-217-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-219-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-221-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-223-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/1096-1111-0x0000000004D80000-0x0000000004D90000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3812 un045724.exe 1536 pro1154.exe 1096 qu6753.exe 388 si773192.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1154.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un045724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un045724.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2116 1536 WerFault.exe 84 4020 1096 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1536 pro1154.exe 1536 pro1154.exe 1096 qu6753.exe 1096 qu6753.exe 388 si773192.exe 388 si773192.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1536 pro1154.exe Token: SeDebugPrivilege 1096 qu6753.exe Token: SeDebugPrivilege 388 si773192.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3812 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 83 PID 4400 wrote to memory of 3812 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 83 PID 4400 wrote to memory of 3812 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 83 PID 3812 wrote to memory of 1536 3812 un045724.exe 84 PID 3812 wrote to memory of 1536 3812 un045724.exe 84 PID 3812 wrote to memory of 1536 3812 un045724.exe 84 PID 3812 wrote to memory of 1096 3812 un045724.exe 91 PID 3812 wrote to memory of 1096 3812 un045724.exe 91 PID 3812 wrote to memory of 1096 3812 un045724.exe 91 PID 4400 wrote to memory of 388 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 95 PID 4400 wrote to memory of 388 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 95 PID 4400 wrote to memory of 388 4400 9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe"C:\Users\Admin\AppData\Local\Temp\9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 10804⤵
- Program crash
PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 13444⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1536 -ip 15361⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1096 -ip 10961⤵PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5010f8c63ec763b022dfb64f20ef41768
SHA16fd2248ad2aa286de68e22f6cf74421c88885e1b
SHA256289589f89e4fae2fc414589f2769d83a3a561f777daedb30b5ece8f58df4e849
SHA512e64ef8a017a817ed305380314d37ceb31f799f32e0028842abc7cac3ab1cbed3634dad69b67959319ac903fa4513974e331b3ca6ca33c2277733d086099b8b5e
-
Filesize
175KB
MD5010f8c63ec763b022dfb64f20ef41768
SHA16fd2248ad2aa286de68e22f6cf74421c88885e1b
SHA256289589f89e4fae2fc414589f2769d83a3a561f777daedb30b5ece8f58df4e849
SHA512e64ef8a017a817ed305380314d37ceb31f799f32e0028842abc7cac3ab1cbed3634dad69b67959319ac903fa4513974e331b3ca6ca33c2277733d086099b8b5e
-
Filesize
558KB
MD551e7849c3c96025a8894bfcd0182576e
SHA1e3c4bf4101da4892607ebc2e985ac9b6a282c0ec
SHA256f055c483c34194c6fc94f778bbd4d694f78cc436ac49c310df87582849eae54e
SHA5126a249a74af414e7e86b7231508d21273eca1a9998da58c8caff2e1279876a73bb76e14ab1a6bc962881f592de00eea5ae0a5fdb114dffb37c275144a2adf8f0d
-
Filesize
558KB
MD551e7849c3c96025a8894bfcd0182576e
SHA1e3c4bf4101da4892607ebc2e985ac9b6a282c0ec
SHA256f055c483c34194c6fc94f778bbd4d694f78cc436ac49c310df87582849eae54e
SHA5126a249a74af414e7e86b7231508d21273eca1a9998da58c8caff2e1279876a73bb76e14ab1a6bc962881f592de00eea5ae0a5fdb114dffb37c275144a2adf8f0d
-
Filesize
307KB
MD5bb21cb211e5f8cb83a135952cce5a6d1
SHA1675ba50e932dad16ba014f22fea5e09be487dad4
SHA256f3126f10b73463c848b42ceab1c4b854249b1029d172eb6f2a6f530e9a85d4f1
SHA512abd4c308a8bcf1fc34e9e8bd729b2d2ef75cdd2d230949ff3042dda9999f89c40b2454ff34fd07f0b27064b4662583c231ae65be27b45778c35bab643f879460
-
Filesize
307KB
MD5bb21cb211e5f8cb83a135952cce5a6d1
SHA1675ba50e932dad16ba014f22fea5e09be487dad4
SHA256f3126f10b73463c848b42ceab1c4b854249b1029d172eb6f2a6f530e9a85d4f1
SHA512abd4c308a8bcf1fc34e9e8bd729b2d2ef75cdd2d230949ff3042dda9999f89c40b2454ff34fd07f0b27064b4662583c231ae65be27b45778c35bab643f879460
-
Filesize
365KB
MD56942fb0a76abcdb3388f3a55a7d20e39
SHA1c4b2fd23277af578b2e31686b7016f95f428626c
SHA25654e0806fe81dc350dc81ca595e1744d5c5c4b01803f4e40506e541c3b795e90b
SHA51261024f1f8f1fde45f26e82e38d18936a872947fa6ca427a87837eb3301bcf012b8ee259ea270b8e9d302b6f97099a5168bdf9bbf8afe6d51da13a41c2300a021
-
Filesize
365KB
MD56942fb0a76abcdb3388f3a55a7d20e39
SHA1c4b2fd23277af578b2e31686b7016f95f428626c
SHA25654e0806fe81dc350dc81ca595e1744d5c5c4b01803f4e40506e541c3b795e90b
SHA51261024f1f8f1fde45f26e82e38d18936a872947fa6ca427a87837eb3301bcf012b8ee259ea270b8e9d302b6f97099a5168bdf9bbf8afe6d51da13a41c2300a021