Analysis
-
max time kernel
99s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:36
Static task
static1
Behavioral task
behavioral1
Sample
772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe
Resource
win10v2004-20230220-en
General
-
Target
772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe
-
Size
700KB
-
MD5
fd32f6fcd25df2b717cf029c3a46c75f
-
SHA1
1d2fe4ee702827b4635749e1ea42553328e5c5ef
-
SHA256
772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4
-
SHA512
06b795858ac3120f95d7f872cd009bb59d641ee75e42b12c8a3b6eb034eecfa0860bf2c7ab82629ec1df963abca77ecafe7d6ecb2b37c83b82c209e6220c18e7
-
SSDEEP
12288:rMrVy90P+WusIRTXuyFLkXpseGu+4tGFrmFpUfBr5R1nzyxXdKY:Oy05MLAGGYFrmrU5VQXdr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6001.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2264-193-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-195-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-226-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2264-228-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 840 un484079.exe 2556 pro6001.exe 2264 qu0176.exe 4440 si881964.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6001.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un484079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un484079.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4604 2556 WerFault.exe 84 4856 2264 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2556 pro6001.exe 2556 pro6001.exe 2264 qu0176.exe 2264 qu0176.exe 4440 si881964.exe 4440 si881964.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2556 pro6001.exe Token: SeDebugPrivilege 2264 qu0176.exe Token: SeDebugPrivilege 4440 si881964.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4552 wrote to memory of 840 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 83 PID 4552 wrote to memory of 840 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 83 PID 4552 wrote to memory of 840 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 83 PID 840 wrote to memory of 2556 840 un484079.exe 84 PID 840 wrote to memory of 2556 840 un484079.exe 84 PID 840 wrote to memory of 2556 840 un484079.exe 84 PID 840 wrote to memory of 2264 840 un484079.exe 90 PID 840 wrote to memory of 2264 840 un484079.exe 90 PID 840 wrote to memory of 2264 840 un484079.exe 90 PID 4552 wrote to memory of 4440 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 94 PID 4552 wrote to memory of 4440 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 94 PID 4552 wrote to memory of 4440 4552 772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe"C:\Users\Admin\AppData\Local\Temp\772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 10844⤵
- Program crash
PID:4604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 13524⤵
- Program crash
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2556 -ip 25561⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2264 -ip 22641⤵PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD581b921aa13f5a6645ed72a28a66f3ed6
SHA1ec70cad459e9e70c9531385131128f903241d30a
SHA256892a3bc18bd1a0f97ae91c8ba2bc847e856a59c45761fb76040fe751dc86966d
SHA5124207ca1495f81820b392af4f3fd9a805b3b746be4991fa3f9701a08939665c4cb03db1e55b8802d35f703d273fca68c70a235b5e84461e10cb357790abc5afeb
-
Filesize
175KB
MD581b921aa13f5a6645ed72a28a66f3ed6
SHA1ec70cad459e9e70c9531385131128f903241d30a
SHA256892a3bc18bd1a0f97ae91c8ba2bc847e856a59c45761fb76040fe751dc86966d
SHA5124207ca1495f81820b392af4f3fd9a805b3b746be4991fa3f9701a08939665c4cb03db1e55b8802d35f703d273fca68c70a235b5e84461e10cb357790abc5afeb
-
Filesize
558KB
MD53eea37d654331d7cc63322994c7dca4b
SHA1e06988245c43e181489bcc0d7f6bdb415c7ae222
SHA256ab82fff063d51ad055e05a852c3d1b463153a4193de4a46b19b5fd451e087715
SHA5123852fa010112d4f8b515c070799c6824cc71100583718cadbf7b2509844e34c835f8a31827f93428388c19f6b4d0a0b764948b09effa937b1186ccffbdb8a769
-
Filesize
558KB
MD53eea37d654331d7cc63322994c7dca4b
SHA1e06988245c43e181489bcc0d7f6bdb415c7ae222
SHA256ab82fff063d51ad055e05a852c3d1b463153a4193de4a46b19b5fd451e087715
SHA5123852fa010112d4f8b515c070799c6824cc71100583718cadbf7b2509844e34c835f8a31827f93428388c19f6b4d0a0b764948b09effa937b1186ccffbdb8a769
-
Filesize
307KB
MD5c8479db68cbc247b8bf5fb304bee2738
SHA10f734ee5e98a1054286cd77fb5fdbd6c6ed19b11
SHA256b51e966c1b1e603b139d9f99d9afc523bdf013411d0ebebb7ace7c6db3fb9b7e
SHA512637cd9824fe2bc7bb5870670fd275e4b2ff79dc7c78b199e8bfb505f6797a4c045fded96277eade4c0c638511b918aea28665454e769c15236fdc612cfeca9c7
-
Filesize
307KB
MD5c8479db68cbc247b8bf5fb304bee2738
SHA10f734ee5e98a1054286cd77fb5fdbd6c6ed19b11
SHA256b51e966c1b1e603b139d9f99d9afc523bdf013411d0ebebb7ace7c6db3fb9b7e
SHA512637cd9824fe2bc7bb5870670fd275e4b2ff79dc7c78b199e8bfb505f6797a4c045fded96277eade4c0c638511b918aea28665454e769c15236fdc612cfeca9c7
-
Filesize
365KB
MD59a47126eb35aea5ecb86cf1e6aa92cb9
SHA190b3144a059b976d46885099876af1b55a6e4a24
SHA25694f9b430a35532c8c221d5b499ce57bf98fc43b2d396f3ec4602e7bf319b86c3
SHA5122a64057a503f6d65d87465c4520c5b17f6fd72a9fc7bf407501c4e04cabdc5ce1ab1224e16ae46ebdb2fb3db3a8df72d12f5aa8461406e3ecbd33376ec39f090
-
Filesize
365KB
MD59a47126eb35aea5ecb86cf1e6aa92cb9
SHA190b3144a059b976d46885099876af1b55a6e4a24
SHA25694f9b430a35532c8c221d5b499ce57bf98fc43b2d396f3ec4602e7bf319b86c3
SHA5122a64057a503f6d65d87465c4520c5b17f6fd72a9fc7bf407501c4e04cabdc5ce1ab1224e16ae46ebdb2fb3db3a8df72d12f5aa8461406e3ecbd33376ec39f090