Analysis
-
max time kernel
61s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe
Resource
win10v2004-20230220-en
General
-
Target
2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe
-
Size
700KB
-
MD5
6f0442977268f455a4f55e19918ad8d8
-
SHA1
d694b7e1a658581c3ae359dcae2cf848ffb01a31
-
SHA256
2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080
-
SHA512
f6587dae87e9b5f130a5ffd235b8b323ca1c09bb7ef9fa304ac8b60e03ea98093a3aaf8210f01c4083c725db127d869bc292ae3745679d47c98503b31951df25
-
SSDEEP
12288:ZMrZy90XSrktqi+C1F9D/ucAsMoNTq3GVk0/XOlyDqju60hObcp:4ykSYX+Bsbqmh/XOMDqCbp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1967.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1967.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1967.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1432-192-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-193-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-195-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-197-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-199-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-201-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-203-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-205-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-207-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-209-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-211-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-213-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-215-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-219-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-217-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-221-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-223-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline behavioral1/memory/1432-225-0x0000000005280000-0x00000000052BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un399432.exepro1967.exequ8424.exesi311530.exepid process 3540 un399432.exe 4956 pro1967.exe 1432 qu8424.exe 4200 si311530.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1967.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1967.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exeun399432.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un399432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un399432.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3092 4956 WerFault.exe pro1967.exe 3040 1432 WerFault.exe qu8424.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1967.exequ8424.exesi311530.exepid process 4956 pro1967.exe 4956 pro1967.exe 1432 qu8424.exe 1432 qu8424.exe 4200 si311530.exe 4200 si311530.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1967.exequ8424.exesi311530.exedescription pid process Token: SeDebugPrivilege 4956 pro1967.exe Token: SeDebugPrivilege 1432 qu8424.exe Token: SeDebugPrivilege 4200 si311530.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exeun399432.exedescription pid process target process PID 948 wrote to memory of 3540 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe un399432.exe PID 948 wrote to memory of 3540 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe un399432.exe PID 948 wrote to memory of 3540 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe un399432.exe PID 3540 wrote to memory of 4956 3540 un399432.exe pro1967.exe PID 3540 wrote to memory of 4956 3540 un399432.exe pro1967.exe PID 3540 wrote to memory of 4956 3540 un399432.exe pro1967.exe PID 3540 wrote to memory of 1432 3540 un399432.exe qu8424.exe PID 3540 wrote to memory of 1432 3540 un399432.exe qu8424.exe PID 3540 wrote to memory of 1432 3540 un399432.exe qu8424.exe PID 948 wrote to memory of 4200 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe si311530.exe PID 948 wrote to memory of 4200 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe si311530.exe PID 948 wrote to memory of 4200 948 2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe si311530.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe"C:\Users\Admin\AppData\Local\Temp\2f010ac5a76a8e00d2d92cbb17e6b0f4cbb7d1dca136bd920df6c03827776080.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399432.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399432.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1967.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1967.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 10044⤵
- Program crash
PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8424.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 15644⤵
- Program crash
PID:3040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311530.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4956 -ip 49561⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1432 -ip 14321⤵PID:3116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52500c1f0d9dd75f50bbaeed2191185be
SHA1296f32e3b01c6e809ca82e3688b5a3b41e63e990
SHA256f7ff8b722a6e81e6237d6a2f1bad81164b0d8fef83968748027d36a5a9a3ab39
SHA51208d379e05e3c65915654455f5bb1ba8a95e720768b4ef1c20a1a8e8c8f71969319cccc083689633621cf15133078e413bd89c5b86f65934cbe7240939b66e145
-
Filesize
175KB
MD52500c1f0d9dd75f50bbaeed2191185be
SHA1296f32e3b01c6e809ca82e3688b5a3b41e63e990
SHA256f7ff8b722a6e81e6237d6a2f1bad81164b0d8fef83968748027d36a5a9a3ab39
SHA51208d379e05e3c65915654455f5bb1ba8a95e720768b4ef1c20a1a8e8c8f71969319cccc083689633621cf15133078e413bd89c5b86f65934cbe7240939b66e145
-
Filesize
558KB
MD5520a2881e808871a971a7a94cb2381ea
SHA1f27247a8cd335ad4710fa377c5f2a77ab282381d
SHA25674d57e3aea19fd61c3f4871d941d2d1989d2deea8d062630a4b3ca3b99b3cdc6
SHA512ff04a9465a74b491d026013d086c3d83275da80264681674e662c159a623f938c702f0796a4c83cdf978dc36829fadb303378d145dee2b8b8fdd741e3ff17c42
-
Filesize
558KB
MD5520a2881e808871a971a7a94cb2381ea
SHA1f27247a8cd335ad4710fa377c5f2a77ab282381d
SHA25674d57e3aea19fd61c3f4871d941d2d1989d2deea8d062630a4b3ca3b99b3cdc6
SHA512ff04a9465a74b491d026013d086c3d83275da80264681674e662c159a623f938c702f0796a4c83cdf978dc36829fadb303378d145dee2b8b8fdd741e3ff17c42
-
Filesize
307KB
MD57fbdf2f2aeabfbb0f63d1c21d58a75ee
SHA1a2edcd142f1f1bd22b0e480b7b4866f2033ddd65
SHA256483f4bd6470f49f7a6d0a087fd1965a1b152c17c4ba9552a65f2c2f4bc510324
SHA5129af499c76a93a841921f0013c05cdfea530c0c41652400cadc19997ed39213006023003a8990d8a9b49b4554a51b72aec1227a0ae1751ba9b5ed01e78967a7ff
-
Filesize
307KB
MD57fbdf2f2aeabfbb0f63d1c21d58a75ee
SHA1a2edcd142f1f1bd22b0e480b7b4866f2033ddd65
SHA256483f4bd6470f49f7a6d0a087fd1965a1b152c17c4ba9552a65f2c2f4bc510324
SHA5129af499c76a93a841921f0013c05cdfea530c0c41652400cadc19997ed39213006023003a8990d8a9b49b4554a51b72aec1227a0ae1751ba9b5ed01e78967a7ff
-
Filesize
365KB
MD56b8ae8578dac0d4c74410f15f078a0d5
SHA1feb91a9d5c3856c311a78b45edec3298fb8ebdba
SHA256ffad518f990ba23f56ac2693dc5737327de6b8f5475650db8fcdd1cb7b43e9fd
SHA512ffb603a8dd885eae5ba4a9ab6aa1f60aeecd1d3476dcd4a727cf42eb1117250f9425766a887b0f676cec3e29cf713d3654ab79b2099960d3302832dd49d06ade
-
Filesize
365KB
MD56b8ae8578dac0d4c74410f15f078a0d5
SHA1feb91a9d5c3856c311a78b45edec3298fb8ebdba
SHA256ffad518f990ba23f56ac2693dc5737327de6b8f5475650db8fcdd1cb7b43e9fd
SHA512ffb603a8dd885eae5ba4a9ab6aa1f60aeecd1d3476dcd4a727cf42eb1117250f9425766a887b0f676cec3e29cf713d3654ab79b2099960d3302832dd49d06ade