Analysis
-
max time kernel
98s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:40
Static task
static1
Behavioral task
behavioral1
Sample
7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe
Resource
win10v2004-20230220-en
General
-
Target
7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe
-
Size
700KB
-
MD5
ab7f5435838496f6b4eb82ab1035054d
-
SHA1
df8898604351d3584ca692ed185bc18d64c0f1bb
-
SHA256
7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab
-
SHA512
b507708494deff72ab3e5f58e374eca2bd81563a926cfa5072e5f5370c6cc3a1f11766a3cafa315521b0060f5aff5bffc5a58ab3c51f06cb8ce457de612d997a
-
SSDEEP
12288:fMrry90NhpB3Tyz9DzPcA/mN7fYO/lFVvvhTmrx54T:QyclI/QfYOHVXIre
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4981.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2136-193-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-195-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-198-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-200-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-202-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-204-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-206-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-208-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-210-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-212-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-214-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-216-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-218-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-220-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-222-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-224-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-226-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/2136-228-0x0000000005300000-0x000000000533F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4276 un301800.exe 2520 pro4981.exe 2136 qu4884.exe 2128 si515407.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4981.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4981.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un301800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un301800.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2584 2520 WerFault.exe 84 4932 2136 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2520 pro4981.exe 2520 pro4981.exe 2136 qu4884.exe 2136 qu4884.exe 2128 si515407.exe 2128 si515407.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2520 pro4981.exe Token: SeDebugPrivilege 2136 qu4884.exe Token: SeDebugPrivilege 2128 si515407.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4276 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 83 PID 4256 wrote to memory of 4276 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 83 PID 4256 wrote to memory of 4276 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 83 PID 4276 wrote to memory of 2520 4276 un301800.exe 84 PID 4276 wrote to memory of 2520 4276 un301800.exe 84 PID 4276 wrote to memory of 2520 4276 un301800.exe 84 PID 4276 wrote to memory of 2136 4276 un301800.exe 90 PID 4276 wrote to memory of 2136 4276 un301800.exe 90 PID 4276 wrote to memory of 2136 4276 un301800.exe 90 PID 4256 wrote to memory of 2128 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 94 PID 4256 wrote to memory of 2128 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 94 PID 4256 wrote to memory of 2128 4256 7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe"C:\Users\Admin\AppData\Local\Temp\7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 10804⤵
- Program crash
PID:2584
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 17204⤵
- Program crash
PID:4932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2520 -ip 25201⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2136 -ip 21361⤵PID:3284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5768155808f7a913f7b5c4464f5932ddf
SHA1d9e39d8b2b9f921a552716f99ca82d35815b71ed
SHA25615a2819f1044f460f93500269ff87e9e2bad99aaed7b4a76a7e174ef35cdbad9
SHA512568754dd767ee7245d51b7bf1499dae6eea17232c88510e2e60be27115d79386543a15b96f379617b8f7ff3dc97716b54d4a19a52684fe48a82c3e441cb82249
-
Filesize
175KB
MD5768155808f7a913f7b5c4464f5932ddf
SHA1d9e39d8b2b9f921a552716f99ca82d35815b71ed
SHA25615a2819f1044f460f93500269ff87e9e2bad99aaed7b4a76a7e174ef35cdbad9
SHA512568754dd767ee7245d51b7bf1499dae6eea17232c88510e2e60be27115d79386543a15b96f379617b8f7ff3dc97716b54d4a19a52684fe48a82c3e441cb82249
-
Filesize
558KB
MD5749ce5c2236df71b4b00d9e50fd70a85
SHA18f0ff0a49151ecfb6a578695da27eebfb036a147
SHA256681f59538bc1f1f7aaa59d117a7cc2b62e9d8f8d85aab6757e378ebed558c6ec
SHA51278494049ad0846a73877860d4c614bbb68c2e0ab8c4ffc77294150701db6ea73d77dbdfdfbb8c45a3623eeb851e6df3e73b8c2409a9c3a5dc0ae8c8b4bea35c6
-
Filesize
558KB
MD5749ce5c2236df71b4b00d9e50fd70a85
SHA18f0ff0a49151ecfb6a578695da27eebfb036a147
SHA256681f59538bc1f1f7aaa59d117a7cc2b62e9d8f8d85aab6757e378ebed558c6ec
SHA51278494049ad0846a73877860d4c614bbb68c2e0ab8c4ffc77294150701db6ea73d77dbdfdfbb8c45a3623eeb851e6df3e73b8c2409a9c3a5dc0ae8c8b4bea35c6
-
Filesize
307KB
MD5ba1858118ef899bd7b54477f39d555d2
SHA18e8c3dbf602d3759132f1693a74561b417d59f54
SHA256e9c9caf23b25488ab8e8a2382fa18e001b10ade0db53a245b4185560e2dca5b4
SHA5127b849377b2addc3cd4816105b0da99a4453f5b57d4ee6c98cdfedb8685c099d741c50caa455ac32abcaf60dad51d4514c19efa196afe327b8377751adcfca7ba
-
Filesize
307KB
MD5ba1858118ef899bd7b54477f39d555d2
SHA18e8c3dbf602d3759132f1693a74561b417d59f54
SHA256e9c9caf23b25488ab8e8a2382fa18e001b10ade0db53a245b4185560e2dca5b4
SHA5127b849377b2addc3cd4816105b0da99a4453f5b57d4ee6c98cdfedb8685c099d741c50caa455ac32abcaf60dad51d4514c19efa196afe327b8377751adcfca7ba
-
Filesize
365KB
MD5d326eaa9e14c4d324419d6bf82897614
SHA1daed4c5b520afa0404e34d0398afc0421c9b4d2e
SHA2561a715dcadb85592503a3a7a27087cea23161f7bfcc7f05f377626b5086e0cbd1
SHA512a10fd3261c00f60c95e20c3581b2f660d9d281ad3086b363b9e2b8054e077ff98787781bff57e2fc03167983702e6d33a31996cf095443611b4d876cbd3b665e
-
Filesize
365KB
MD5d326eaa9e14c4d324419d6bf82897614
SHA1daed4c5b520afa0404e34d0398afc0421c9b4d2e
SHA2561a715dcadb85592503a3a7a27087cea23161f7bfcc7f05f377626b5086e0cbd1
SHA512a10fd3261c00f60c95e20c3581b2f660d9d281ad3086b363b9e2b8054e077ff98787781bff57e2fc03167983702e6d33a31996cf095443611b4d876cbd3b665e