Analysis
-
max time kernel
64s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:44
Static task
static1
Behavioral task
behavioral1
Sample
a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe
Resource
win10v2004-20230220-en
General
-
Target
a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe
-
Size
700KB
-
MD5
a7ba92ec0a72c1317206cd89927ae844
-
SHA1
e9db3989bd267ea133ea50da646ff015b4a23b59
-
SHA256
a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757
-
SHA512
3b329fa1a70328d1fc0823128c4e1d5dfc851bcc1279f53734b3ebb08ffc7b50641bbc352bf23291f1fec9e994b5f1252bb18e3073580edc8c18b98bdb7be641
-
SSDEEP
12288:sMrdy908bMS45rgWVtHKez99D5qcAuIIW1gAufC14R9vGXV3s:py34HRz6uI0AufC1E9Ol3s
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7459.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7459.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7459.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3548-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/3548-357-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un908242.exepro7459.exequ2754.exesi052154.exepid process 4136 un908242.exe 4432 pro7459.exe 3548 qu2754.exe 3144 si052154.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7459.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7459.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exeun908242.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un908242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un908242.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1528 4432 WerFault.exe pro7459.exe 4480 3548 WerFault.exe qu2754.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7459.exequ2754.exesi052154.exepid process 4432 pro7459.exe 4432 pro7459.exe 3548 qu2754.exe 3548 qu2754.exe 3144 si052154.exe 3144 si052154.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7459.exequ2754.exesi052154.exedescription pid process Token: SeDebugPrivilege 4432 pro7459.exe Token: SeDebugPrivilege 3548 qu2754.exe Token: SeDebugPrivilege 3144 si052154.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exeun908242.exedescription pid process target process PID 2132 wrote to memory of 4136 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe un908242.exe PID 2132 wrote to memory of 4136 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe un908242.exe PID 2132 wrote to memory of 4136 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe un908242.exe PID 4136 wrote to memory of 4432 4136 un908242.exe pro7459.exe PID 4136 wrote to memory of 4432 4136 un908242.exe pro7459.exe PID 4136 wrote to memory of 4432 4136 un908242.exe pro7459.exe PID 4136 wrote to memory of 3548 4136 un908242.exe qu2754.exe PID 4136 wrote to memory of 3548 4136 un908242.exe qu2754.exe PID 4136 wrote to memory of 3548 4136 un908242.exe qu2754.exe PID 2132 wrote to memory of 3144 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe si052154.exe PID 2132 wrote to memory of 3144 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe si052154.exe PID 2132 wrote to memory of 3144 2132 a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe si052154.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe"C:\Users\Admin\AppData\Local\Temp\a6f4a74274c39f9e3f74fa14e123f08c1ec5c7bd1738a0d1fa393305650c1757.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7459.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 10924⤵
- Program crash
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2754.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 13244⤵
- Program crash
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052154.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4432 -ip 44321⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3548 -ip 35481⤵PID:2968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b67ab12187ed76aa6f180277f47b64cc
SHA15244f0270df9ecd39b09d56e88528b29f7bcd0e7
SHA256ef4bb6f0492a6ffc44e774541c07a2b19d3c4a0014f6538064c03546050312c2
SHA512db27a425838f560daf1fdd80777dd0bc2afcec18636818b6580f5913ed5bf6ce57fc46a3492bf74d0fbde75f6536ef05bb713d64fe3f42e058babc2ddaddf203
-
Filesize
175KB
MD5b67ab12187ed76aa6f180277f47b64cc
SHA15244f0270df9ecd39b09d56e88528b29f7bcd0e7
SHA256ef4bb6f0492a6ffc44e774541c07a2b19d3c4a0014f6538064c03546050312c2
SHA512db27a425838f560daf1fdd80777dd0bc2afcec18636818b6580f5913ed5bf6ce57fc46a3492bf74d0fbde75f6536ef05bb713d64fe3f42e058babc2ddaddf203
-
Filesize
558KB
MD5ba4108c46f54b0390ad383faa5489a10
SHA169f4b3d84de5fd780c413df211c705a70fb91858
SHA2563fc233079f405703330aaf622492ca340c9c9b1b4dd6201bc1aaa38e9b50dfa9
SHA5126c9333b5a6c08286f55a73087a993af564c6829257c93095a0107684b276ca91b580d9cf3d53c67b71677558e80c39ccc084d94728c182814313705546464c0d
-
Filesize
558KB
MD5ba4108c46f54b0390ad383faa5489a10
SHA169f4b3d84de5fd780c413df211c705a70fb91858
SHA2563fc233079f405703330aaf622492ca340c9c9b1b4dd6201bc1aaa38e9b50dfa9
SHA5126c9333b5a6c08286f55a73087a993af564c6829257c93095a0107684b276ca91b580d9cf3d53c67b71677558e80c39ccc084d94728c182814313705546464c0d
-
Filesize
307KB
MD51f49570f07999afb1d12f74e0d33a993
SHA1af7a82498ade7d446556236683b519977a3a53da
SHA256250f6d280c2eb70626fa2d36afc8529f2cf161012311b8000ff8726a47dd96e0
SHA512d12089753bcb0aa2e081d4d73f04bef04bbfe7fb810c9034b9e79dae6e1b4762739a2a90f7a9bb3985ce283987cf3e4a95484fd35c51ba3eed167aabeaf91656
-
Filesize
307KB
MD51f49570f07999afb1d12f74e0d33a993
SHA1af7a82498ade7d446556236683b519977a3a53da
SHA256250f6d280c2eb70626fa2d36afc8529f2cf161012311b8000ff8726a47dd96e0
SHA512d12089753bcb0aa2e081d4d73f04bef04bbfe7fb810c9034b9e79dae6e1b4762739a2a90f7a9bb3985ce283987cf3e4a95484fd35c51ba3eed167aabeaf91656
-
Filesize
365KB
MD5b0e115b17c24d520ae4d5970af520956
SHA1d06a67e34e6841628ad01ba4bfdb4d44e47240aa
SHA2563b3cc612f64e71eaff6ae100b8aa4aa6da59e7ec728302f6ec2d76be6ddd29e6
SHA512b7048382b7d0c21af2a5363b82a8078d3500d6de11ecb9c592d5d4df099bfac318293a03bdbcce9feba71b83b217bdcd7e47b2b1d41cb60fd50ebccc49a1f9c4
-
Filesize
365KB
MD5b0e115b17c24d520ae4d5970af520956
SHA1d06a67e34e6841628ad01ba4bfdb4d44e47240aa
SHA2563b3cc612f64e71eaff6ae100b8aa4aa6da59e7ec728302f6ec2d76be6ddd29e6
SHA512b7048382b7d0c21af2a5363b82a8078d3500d6de11ecb9c592d5d4df099bfac318293a03bdbcce9feba71b83b217bdcd7e47b2b1d41cb60fd50ebccc49a1f9c4