Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:55
Static task
static1
Behavioral task
behavioral1
Sample
e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe
Resource
win10v2004-20230221-en
General
-
Target
e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe
-
Size
700KB
-
MD5
8e445e92d82e0ddfad4a1250978536eb
-
SHA1
c89e7873229895837a3f1946c4a5ddfc51a9bb35
-
SHA256
e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd
-
SHA512
77d6d43520c01c306754e30d339681f2be163150585ef7c39f5b4ce0ceb81e64b21ab6199abff5b8a89a5d86d4a3fe8f786c3ca282dbb15e03a87849daabe585
-
SSDEEP
12288:RMrjy90DRQ6pPJ/HYTG9D5ecAkKe4+wPFNH8o0SE5/oSjlE:iys9lHOE4+wPFNH8hZRjW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3686.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3686.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3692-191-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-192-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-194-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-198-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-200-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-196-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-202-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-204-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-206-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-208-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-210-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-212-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-214-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-216-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-218-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-220-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-222-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-224-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/3692-422-0x0000000004DC0000-0x0000000004DD0000-memory.dmp family_redline behavioral1/memory/3692-424-0x0000000004DC0000-0x0000000004DD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3488 un066764.exe 2196 pro3686.exe 3692 qu1961.exe 4912 si920054.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3686.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un066764.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un066764.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4748 2196 WerFault.exe 84 3632 3692 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2196 pro3686.exe 2196 pro3686.exe 3692 qu1961.exe 3692 qu1961.exe 4912 si920054.exe 4912 si920054.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2196 pro3686.exe Token: SeDebugPrivilege 3692 qu1961.exe Token: SeDebugPrivilege 4912 si920054.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3488 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 83 PID 4884 wrote to memory of 3488 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 83 PID 4884 wrote to memory of 3488 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 83 PID 3488 wrote to memory of 2196 3488 un066764.exe 84 PID 3488 wrote to memory of 2196 3488 un066764.exe 84 PID 3488 wrote to memory of 2196 3488 un066764.exe 84 PID 3488 wrote to memory of 3692 3488 un066764.exe 90 PID 3488 wrote to memory of 3692 3488 un066764.exe 90 PID 3488 wrote to memory of 3692 3488 un066764.exe 90 PID 4884 wrote to memory of 4912 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 94 PID 4884 wrote to memory of 4912 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 94 PID 4884 wrote to memory of 4912 4884 e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe"C:\Users\Admin\AppData\Local\Temp\e85f81da6ac29390bb590f2886b4d3cab212621989f2e0c234b80f48ed49cfdd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un066764.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un066764.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3686.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 10844⤵
- Program crash
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1961.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 13484⤵
- Program crash
PID:3632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920054.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920054.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2196 -ip 21961⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3692 -ip 36921⤵PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52d9b887bd973ed84141389259e886f05
SHA1186ea58d9ffc89293637ace44fe0cad53a95f758
SHA25650981c877f71dc3705adca2fd92ed1cb330e31576846dd86edc250e85b84d59e
SHA512309dfe5237107389be00482863ec155b75618238b6e0cbe68f3ad396e9e95aee5d38a1a829dfa8fa8d39b6370cd6a9e32ca47e9d5502c33493a71286f29bc373
-
Filesize
175KB
MD52d9b887bd973ed84141389259e886f05
SHA1186ea58d9ffc89293637ace44fe0cad53a95f758
SHA25650981c877f71dc3705adca2fd92ed1cb330e31576846dd86edc250e85b84d59e
SHA512309dfe5237107389be00482863ec155b75618238b6e0cbe68f3ad396e9e95aee5d38a1a829dfa8fa8d39b6370cd6a9e32ca47e9d5502c33493a71286f29bc373
-
Filesize
558KB
MD5a82cc2e680d81316fcd35e387b3cc855
SHA17736a792e378c1381086074bdf158f2caa9f788b
SHA25646fbe9ac6f1e0c03b0c3b1fe238796e5af233f5c5da09d738c66e576e2401867
SHA512ba44ae863463ce80c6d1d773d44fe029145b58e1ec69c97c5f7d7382653dabb0a410e6414ad10fc3d284b2aafc7f2aeb4b8af8f641221901bbc6c91e7d76ce4a
-
Filesize
558KB
MD5a82cc2e680d81316fcd35e387b3cc855
SHA17736a792e378c1381086074bdf158f2caa9f788b
SHA25646fbe9ac6f1e0c03b0c3b1fe238796e5af233f5c5da09d738c66e576e2401867
SHA512ba44ae863463ce80c6d1d773d44fe029145b58e1ec69c97c5f7d7382653dabb0a410e6414ad10fc3d284b2aafc7f2aeb4b8af8f641221901bbc6c91e7d76ce4a
-
Filesize
307KB
MD52ed0d87f7d966cb83efb98adbd97992e
SHA1b6d3beae5bc2ede3f97ced85049cdd75768844c3
SHA256bbc6df5abe3aa16d2ccb833049e95ccc665cf0691142384fbb4cfd457ff03005
SHA5126f17d59885c66159d8f8197f8397a18945850435c98185d310d637aa7e0ccd86765bb3a6ca4a5212bd7e9b5a15ef35125a5bd479b4272585d847364a532a09a3
-
Filesize
307KB
MD52ed0d87f7d966cb83efb98adbd97992e
SHA1b6d3beae5bc2ede3f97ced85049cdd75768844c3
SHA256bbc6df5abe3aa16d2ccb833049e95ccc665cf0691142384fbb4cfd457ff03005
SHA5126f17d59885c66159d8f8197f8397a18945850435c98185d310d637aa7e0ccd86765bb3a6ca4a5212bd7e9b5a15ef35125a5bd479b4272585d847364a532a09a3
-
Filesize
365KB
MD5302a9748bd7639e9cc156b3699f874a0
SHA1518fc32023223f0dcba9403b488ffedf8405246a
SHA256c8219e761e5d92def54c0ade447d216d645c5beccdde0986f8b6d20904c2f6fa
SHA512affb4d660bedbca74d0f434aaedb2a4720a793707a0ff2a8c03eb98ce6d2e070bc2292f0d1765e83469cca02981cc25fbc9f293039b1b3f2f6ca1672c2e2e6a7
-
Filesize
365KB
MD5302a9748bd7639e9cc156b3699f874a0
SHA1518fc32023223f0dcba9403b488ffedf8405246a
SHA256c8219e761e5d92def54c0ade447d216d645c5beccdde0986f8b6d20904c2f6fa
SHA512affb4d660bedbca74d0f434aaedb2a4720a793707a0ff2a8c03eb98ce6d2e070bc2292f0d1765e83469cca02981cc25fbc9f293039b1b3f2f6ca1672c2e2e6a7