Analysis
-
max time kernel
139s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:47
Static task
static1
Behavioral task
behavioral1
Sample
30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe
Resource
win10v2004-20230221-en
General
-
Target
30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe
-
Size
700KB
-
MD5
57882b2ef916f45ab6bcbf3c047980ab
-
SHA1
b67712a8a7180c46d2556a38155d00e5e8695a55
-
SHA256
30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4
-
SHA512
f31ddc1df8d970552b10fd2c4e4524aecc5e89bc520dc2a2b2d2eb13e20e9caded027fcfe3ae1bfdc4d214da577dd6092120f807c873fb0b1ceefd56726bc93f
-
SSDEEP
12288:RMr/y90Sxx6Kd9DuhcAf4NkNrqF5mTQG4Dp+u60bO/OtNCtAI:iyxz6tf4cqA6Dp1mO/CyI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9737.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9737.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4324-189-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-190-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-192-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-194-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-196-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-198-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-201-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-208-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-210-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-204-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-212-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-214-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-216-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-218-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-220-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-222-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-224-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/4324-226-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4152 un304849.exe 2692 pro9737.exe 4324 qu8008.exe 4444 si120690.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9737.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un304849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un304849.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1872 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4880 2692 WerFault.exe 83 1580 4324 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 pro9737.exe 2692 pro9737.exe 4324 qu8008.exe 4324 qu8008.exe 4444 si120690.exe 4444 si120690.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro9737.exe Token: SeDebugPrivilege 4324 qu8008.exe Token: SeDebugPrivilege 4444 si120690.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4152 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 82 PID 2064 wrote to memory of 4152 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 82 PID 2064 wrote to memory of 4152 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 82 PID 4152 wrote to memory of 2692 4152 un304849.exe 83 PID 4152 wrote to memory of 2692 4152 un304849.exe 83 PID 4152 wrote to memory of 2692 4152 un304849.exe 83 PID 4152 wrote to memory of 4324 4152 un304849.exe 89 PID 4152 wrote to memory of 4324 4152 un304849.exe 89 PID 4152 wrote to memory of 4324 4152 un304849.exe 89 PID 2064 wrote to memory of 4444 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 93 PID 2064 wrote to memory of 4444 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 93 PID 2064 wrote to memory of 4444 2064 30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe"C:\Users\Admin\AppData\Local\Temp\30ecce64d24397ea14e84eb0c869a2399d59f015d8156dfe334d9b1acae912c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304849.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304849.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9737.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10844⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8008.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13484⤵
- Program crash
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si120690.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si120690.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2692 -ip 26921⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4324 -ip 43241⤵PID:688
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58cc453eb044ac179299cd971a5e72732
SHA1bb03650e23be79cc59078f938296b46d4574ea05
SHA25647dade753a29a2f6594c9586907d87f36f5ec5f5f918752b9f8c6bb2ad466ed1
SHA5124d351f4244568fb2103b734084ca4086e4b0c698643c93d91173fd6fbb0fc03d2b1bbf021ece4f5345342f6061bb7b129c4af95ade0d28732d161dd04cd73890
-
Filesize
175KB
MD58cc453eb044ac179299cd971a5e72732
SHA1bb03650e23be79cc59078f938296b46d4574ea05
SHA25647dade753a29a2f6594c9586907d87f36f5ec5f5f918752b9f8c6bb2ad466ed1
SHA5124d351f4244568fb2103b734084ca4086e4b0c698643c93d91173fd6fbb0fc03d2b1bbf021ece4f5345342f6061bb7b129c4af95ade0d28732d161dd04cd73890
-
Filesize
558KB
MD575decfdbffa3eb8373a3d13d72908578
SHA17bfceecbaa773f99c03e18645e0ba4c94d4446c8
SHA25653bc8df00bb3a5eb997710baef665989b13be53958f0bf3b6f7890e8bab1c3f9
SHA51214be6f03fc1a70efde54fe30db37602075f75fb224d57f998038782159bdc99481f09a302a30feac28fcae48b804af47b7cd496e8d06a51636988b5680cd7e47
-
Filesize
558KB
MD575decfdbffa3eb8373a3d13d72908578
SHA17bfceecbaa773f99c03e18645e0ba4c94d4446c8
SHA25653bc8df00bb3a5eb997710baef665989b13be53958f0bf3b6f7890e8bab1c3f9
SHA51214be6f03fc1a70efde54fe30db37602075f75fb224d57f998038782159bdc99481f09a302a30feac28fcae48b804af47b7cd496e8d06a51636988b5680cd7e47
-
Filesize
307KB
MD52bfed628c4b9b16dd62f6de1b6b3ce9c
SHA1aeb1d41915e1866a02bf43721296fe722d6abbbf
SHA256e963c1884fc263963df77fc8dd87fcb0473b7230527f74155a86b9207fa88457
SHA512bdf7ca95564bcf7004df26017c1af81e9a32b07a140e864072fac79e0b12397bc16114f348b7a56b09370abfb99485082c6ad454b5e990c1de63b8b3fa4a292b
-
Filesize
307KB
MD52bfed628c4b9b16dd62f6de1b6b3ce9c
SHA1aeb1d41915e1866a02bf43721296fe722d6abbbf
SHA256e963c1884fc263963df77fc8dd87fcb0473b7230527f74155a86b9207fa88457
SHA512bdf7ca95564bcf7004df26017c1af81e9a32b07a140e864072fac79e0b12397bc16114f348b7a56b09370abfb99485082c6ad454b5e990c1de63b8b3fa4a292b
-
Filesize
365KB
MD5c8008ac696144ef4984555dca01e39a7
SHA1b3f71937fd171d6410a133bc4a518114851ff25b
SHA2569c5fa490dced345c47330732344a93adf783f6d42688a57d622b6d8ef59f9841
SHA512eb3a49332d3f01e0ddf0ab1963385434df1d740fd9e2330596ae193f1fd99bf89615241721d17e1798805737c096c36a63fceeea6e9035852b24dd21e3636ae4
-
Filesize
365KB
MD5c8008ac696144ef4984555dca01e39a7
SHA1b3f71937fd171d6410a133bc4a518114851ff25b
SHA2569c5fa490dced345c47330732344a93adf783f6d42688a57d622b6d8ef59f9841
SHA512eb3a49332d3f01e0ddf0ab1963385434df1d740fd9e2330596ae193f1fd99bf89615241721d17e1798805737c096c36a63fceeea6e9035852b24dd21e3636ae4