Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe
Resource
win10v2004-20230220-en
General
-
Target
81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe
-
Size
699KB
-
MD5
8cb616153801b02533026948d03ae7e2
-
SHA1
d8c4701e944eae8aa110ee5a274b7157bd55f855
-
SHA256
81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b
-
SHA512
c10e6a5d60f716ba77011a57d17274938950cd9e6b54657a9996321f3ee4856b492a9c1596ba88423a7252888bad7d9ce765575d62055f1b4fbaa93dec7b7469
-
SSDEEP
12288:SMrpy909WxBesMgJgklaNYDVxw9DMscA3+RjHtj74BpGLLs:jynlhZDw3+xNH46k
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0503.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0503.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0503.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4884-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4884-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un677036.exepro0503.exequ7113.exesi968885.exepid process 2292 un677036.exe 3480 pro0503.exe 4884 qu7113.exe 4408 si968885.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0503.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0503.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0503.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un677036.exe81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un677036.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un677036.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4024 3480 WerFault.exe pro0503.exe 4316 4884 WerFault.exe qu7113.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0503.exequ7113.exesi968885.exepid process 3480 pro0503.exe 3480 pro0503.exe 4884 qu7113.exe 4884 qu7113.exe 4408 si968885.exe 4408 si968885.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0503.exequ7113.exesi968885.exedescription pid process Token: SeDebugPrivilege 3480 pro0503.exe Token: SeDebugPrivilege 4884 qu7113.exe Token: SeDebugPrivilege 4408 si968885.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exeun677036.exedescription pid process target process PID 2276 wrote to memory of 2292 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe un677036.exe PID 2276 wrote to memory of 2292 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe un677036.exe PID 2276 wrote to memory of 2292 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe un677036.exe PID 2292 wrote to memory of 3480 2292 un677036.exe pro0503.exe PID 2292 wrote to memory of 3480 2292 un677036.exe pro0503.exe PID 2292 wrote to memory of 3480 2292 un677036.exe pro0503.exe PID 2292 wrote to memory of 4884 2292 un677036.exe qu7113.exe PID 2292 wrote to memory of 4884 2292 un677036.exe qu7113.exe PID 2292 wrote to memory of 4884 2292 un677036.exe qu7113.exe PID 2276 wrote to memory of 4408 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe si968885.exe PID 2276 wrote to memory of 4408 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe si968885.exe PID 2276 wrote to memory of 4408 2276 81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe si968885.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe"C:\Users\Admin\AppData\Local\Temp\81a0a99f635ea0cb41341533c6048a7a7bf63e23c73b4a7252f27476d7cc234b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un677036.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un677036.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0503.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 10844⤵
- Program crash
PID:4024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 13364⤵
- Program crash
PID:4316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si968885.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si968885.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3480 -ip 34801⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4884 -ip 48841⤵PID:2368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ead4cb18b2196149429a8b39c829665e
SHA12a13ee470cf4597757449c4884bb41400d9c0847
SHA2567238a32b204f684c18e7bbc81aaa59bb4ec130da005fd987f44c7dbfee1f0bc9
SHA512db096ee8169a2f4c296718327830e5cac3bb668042b1b84c51ed5fec2df9257dd724a8006b2f9837f1a8d98a5092364ea2064f355e335be919130b2774ecdd80
-
Filesize
175KB
MD5ead4cb18b2196149429a8b39c829665e
SHA12a13ee470cf4597757449c4884bb41400d9c0847
SHA2567238a32b204f684c18e7bbc81aaa59bb4ec130da005fd987f44c7dbfee1f0bc9
SHA512db096ee8169a2f4c296718327830e5cac3bb668042b1b84c51ed5fec2df9257dd724a8006b2f9837f1a8d98a5092364ea2064f355e335be919130b2774ecdd80
-
Filesize
557KB
MD5039fc82029823c620ffd2a8311da1791
SHA1285cd414648b13f06403f90423c7491532b4dd65
SHA2567d4a770e8ff9e7dd47ec69609cb298b7640b0c7efc29034e042a5e01de64c68c
SHA512128ae9139766283524c42f6666f3f461c5e00a05d31c0f934a1c2c2a80f4a909f6be37456aa5efff7508918797e3b7fe823cc5d54fff5d19319962da6297ce2e
-
Filesize
557KB
MD5039fc82029823c620ffd2a8311da1791
SHA1285cd414648b13f06403f90423c7491532b4dd65
SHA2567d4a770e8ff9e7dd47ec69609cb298b7640b0c7efc29034e042a5e01de64c68c
SHA512128ae9139766283524c42f6666f3f461c5e00a05d31c0f934a1c2c2a80f4a909f6be37456aa5efff7508918797e3b7fe823cc5d54fff5d19319962da6297ce2e
-
Filesize
307KB
MD5bca761f78dee74aef5c2026ada11a3b3
SHA196cb806f7d8cae19f9fbc1018fbccfa9614d2ac6
SHA2569a75580c1414f325469dd17d35b032244d9ff7da194884b1077e0f9d7bc7f242
SHA5129414850c03cd27f1168dc0e4130493119a565c51b09f04050b85554fa73d6b216920512d96cd176926a3246c432452be0da0b935e517b636c1ef39a592a65f99
-
Filesize
307KB
MD5bca761f78dee74aef5c2026ada11a3b3
SHA196cb806f7d8cae19f9fbc1018fbccfa9614d2ac6
SHA2569a75580c1414f325469dd17d35b032244d9ff7da194884b1077e0f9d7bc7f242
SHA5129414850c03cd27f1168dc0e4130493119a565c51b09f04050b85554fa73d6b216920512d96cd176926a3246c432452be0da0b935e517b636c1ef39a592a65f99
-
Filesize
365KB
MD5dda916815874373989bbd2bb58aca9cc
SHA13a21ec7767dfd8f3d5513efa68c152dbbfd28ef6
SHA2569a2f1362462cdd9de938802c2bb18fc57b2203eacaab684d5b58bfec7bb10b74
SHA512dfe3750276b6efe84e5fed2bea0eaf416688f2ab8324e74061a25bc081c3c8205d07523d295c0de92b35dcdc418464f16fe92bde98009322826deb83689b8e48
-
Filesize
365KB
MD5dda916815874373989bbd2bb58aca9cc
SHA13a21ec7767dfd8f3d5513efa68c152dbbfd28ef6
SHA2569a2f1362462cdd9de938802c2bb18fc57b2203eacaab684d5b58bfec7bb10b74
SHA512dfe3750276b6efe84e5fed2bea0eaf416688f2ab8324e74061a25bc081c3c8205d07523d295c0de92b35dcdc418464f16fe92bde98009322826deb83689b8e48