Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:37
Static task
static1
Behavioral task
behavioral1
Sample
d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe
Resource
win10v2004-20230220-en
General
-
Target
d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe
-
Size
700KB
-
MD5
dda3a43a4fa7b5ff44f41ea1510f7b19
-
SHA1
2344a676b01ed0eddebe8c89998a520c1084606c
-
SHA256
d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180
-
SHA512
ece3a1249ea5b456666e45a6a72e388e55aebd2c3d9f97f7f6adb3351a2c8060288e461eb88a2b1236e868ed2214c6f0aebc36064e0db50fda24aa1f7f20a5b5
-
SSDEEP
12288:yMrxy90/3Zs/2SY9/k/1N1D4uzpGPKJfXVCLK7BwhC:7yas/g9sNR46cPKJfYL0n
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1836-194-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-195-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-197-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-199-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-201-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-203-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-205-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-207-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-209-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-211-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-213-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-215-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-217-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-219-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-221-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-223-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-225-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-227-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/1836-1111-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1500 un932900.exe 1936 pro5366.exe 1836 qu0578.exe 4272 si874201.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un932900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un932900.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4964 1936 WerFault.exe 85 660 1836 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 pro5366.exe 1936 pro5366.exe 1836 qu0578.exe 1836 qu0578.exe 4272 si874201.exe 4272 si874201.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 pro5366.exe Token: SeDebugPrivilege 1836 qu0578.exe Token: SeDebugPrivilege 4272 si874201.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1500 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 84 PID 4500 wrote to memory of 1500 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 84 PID 4500 wrote to memory of 1500 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 84 PID 1500 wrote to memory of 1936 1500 un932900.exe 85 PID 1500 wrote to memory of 1936 1500 un932900.exe 85 PID 1500 wrote to memory of 1936 1500 un932900.exe 85 PID 1500 wrote to memory of 1836 1500 un932900.exe 91 PID 1500 wrote to memory of 1836 1500 un932900.exe 91 PID 1500 wrote to memory of 1836 1500 un932900.exe 91 PID 4500 wrote to memory of 4272 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 95 PID 4500 wrote to memory of 4272 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 95 PID 4500 wrote to memory of 4272 4500 d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe"C:\Users\Admin\AppData\Local\Temp\d71615a8e608be1eef90757be4c5507eb45d4cf9c6d59885683652d12046a180.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932900.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932900.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 10804⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0578.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 11764⤵
- Program crash
PID:660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874201.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1936 -ip 19361⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1836 -ip 18361⤵PID:4680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56f811403b2f8242ca79123009818990a
SHA1712e103d84de2269d2f61ef9904299dca06f4d71
SHA2565ac981ba781a1e8d52029469741a1265a1306d899fea1bac289ff042a02055a1
SHA5121819eee7a69deaeb2d5ad18c610a23629ae425370879e7500ebaaca3e60e239b2cdd1ce8fd621795dd447a296a94b57731d01c18ab03f2c1ebb8ca44f7b68bc0
-
Filesize
175KB
MD56f811403b2f8242ca79123009818990a
SHA1712e103d84de2269d2f61ef9904299dca06f4d71
SHA2565ac981ba781a1e8d52029469741a1265a1306d899fea1bac289ff042a02055a1
SHA5121819eee7a69deaeb2d5ad18c610a23629ae425370879e7500ebaaca3e60e239b2cdd1ce8fd621795dd447a296a94b57731d01c18ab03f2c1ebb8ca44f7b68bc0
-
Filesize
558KB
MD52207e4e9d8e81a67babb7f0907f6d25a
SHA135ca11f31c7ecb5b2521e0fcaa3805621d6d1721
SHA256baaa3a1e938c6e2665b6c9122909ae2b35529cb1b4a1f48b2303df2b9fa8eab9
SHA5121ad2c3080f4a87abc242affcd41867292bb250ffb306c2a3f656bf66e301eaa27d652c984f225780d2bf07d949c3f30b77ef4d40c4bf2b2dc435dcd1b3408b9b
-
Filesize
558KB
MD52207e4e9d8e81a67babb7f0907f6d25a
SHA135ca11f31c7ecb5b2521e0fcaa3805621d6d1721
SHA256baaa3a1e938c6e2665b6c9122909ae2b35529cb1b4a1f48b2303df2b9fa8eab9
SHA5121ad2c3080f4a87abc242affcd41867292bb250ffb306c2a3f656bf66e301eaa27d652c984f225780d2bf07d949c3f30b77ef4d40c4bf2b2dc435dcd1b3408b9b
-
Filesize
307KB
MD5af997943dcdd0249f5e43d7211dab39a
SHA1659d9d94dfd2545372b779082a04aaa9271ffaf6
SHA25662a110ebf4daafd2ad093958f6deb09701f8647d6977d3565171c9deb6207394
SHA512650469434faa934640e77d9169e3fb3b7ab779b8569a995667fe10cfca82a05c2976d9a73db7a31850b29702e0287ce52c41518c3b586cc31aef678c79345046
-
Filesize
307KB
MD5af997943dcdd0249f5e43d7211dab39a
SHA1659d9d94dfd2545372b779082a04aaa9271ffaf6
SHA25662a110ebf4daafd2ad093958f6deb09701f8647d6977d3565171c9deb6207394
SHA512650469434faa934640e77d9169e3fb3b7ab779b8569a995667fe10cfca82a05c2976d9a73db7a31850b29702e0287ce52c41518c3b586cc31aef678c79345046
-
Filesize
365KB
MD5f05432743074395e05dacc600f0f45f6
SHA15c6fd3ebad838b34aaf8938e37110c84053e8ffe
SHA2569c0360324bcf733f39d334648cae9eba9ff3e69f3d5b90c433ab0d06a2b04f66
SHA512ad7672bb6b748611d099a4f3dbb70b310aa283744e9079f6839780122365b371b4ef0fbc6dfe4c43311f023c883b6c12797dca381b9aae810f6e1bf97e626f86
-
Filesize
365KB
MD5f05432743074395e05dacc600f0f45f6
SHA15c6fd3ebad838b34aaf8938e37110c84053e8ffe
SHA2569c0360324bcf733f39d334648cae9eba9ff3e69f3d5b90c433ab0d06a2b04f66
SHA512ad7672bb6b748611d099a4f3dbb70b310aa283744e9079f6839780122365b371b4ef0fbc6dfe4c43311f023c883b6c12797dca381b9aae810f6e1bf97e626f86