Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:57
Static task
static1
Behavioral task
behavioral1
Sample
1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe
Resource
win10v2004-20230220-en
General
-
Target
1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe
-
Size
700KB
-
MD5
42a468c39218b8a23e14f70478555887
-
SHA1
b7541998b22c99b3026d0edd30f8a2a88f7aa0ee
-
SHA256
1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0
-
SHA512
291106e0280951d783c00cc5a87b63810fadd7b273940d7d2524a8c218a156a1367bab2724ce490c715b81c648a38b5d96e82811e673f27bb9be1da6c3d8ac9d
-
SSDEEP
12288:YMrZy9066mtg33w9DGmcA/uAX8FRaeUMfwJ5yHP1NvjqyS2QPVh:xy6YBGO8fPUzJ5yHtgyOPv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9614.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1488-187-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-188-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-190-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-192-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-194-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-196-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-198-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-200-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-202-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-204-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-206-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-208-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-210-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-218-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-220-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-214-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-222-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-224-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1488-1107-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4740 un219242.exe 4492 pro9614.exe 1488 qu3598.exe 428 si283117.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9614.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un219242.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un219242.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3956 4492 WerFault.exe 87 5040 1488 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4492 pro9614.exe 4492 pro9614.exe 1488 qu3598.exe 1488 qu3598.exe 428 si283117.exe 428 si283117.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4492 pro9614.exe Token: SeDebugPrivilege 1488 qu3598.exe Token: SeDebugPrivilege 428 si283117.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 4740 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 86 PID 2716 wrote to memory of 4740 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 86 PID 2716 wrote to memory of 4740 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 86 PID 4740 wrote to memory of 4492 4740 un219242.exe 87 PID 4740 wrote to memory of 4492 4740 un219242.exe 87 PID 4740 wrote to memory of 4492 4740 un219242.exe 87 PID 4740 wrote to memory of 1488 4740 un219242.exe 96 PID 4740 wrote to memory of 1488 4740 un219242.exe 96 PID 4740 wrote to memory of 1488 4740 un219242.exe 96 PID 2716 wrote to memory of 428 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 101 PID 2716 wrote to memory of 428 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 101 PID 2716 wrote to memory of 428 2716 1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe"C:\Users\Admin\AppData\Local\Temp\1bfec430d5b10687657012f0172fc87bbc6e8f810add25e0566b3beff15270d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9614.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 10844⤵
- Program crash
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3598.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 13044⤵
- Program crash
PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si283117.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si283117.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4492 -ip 44921⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1488 -ip 14881⤵PID:3524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52b98568d2c60099dc08d0d58f78e918a
SHA169cad130ee628434768abb1a0437a30ebc8469b1
SHA2564330fd665f7d362009cccd0f42487c99b0d51d46d55cc67530b6d29473b45a13
SHA512bbef2a481b98746474c142e3b8ca1bc784b70f49f5c54c7edbe5f2ab24c538ce1157904a2abdea67f1e05d0a7c2a9f3bdbba61f28a7d3efded1a6c7f423beebb
-
Filesize
175KB
MD52b98568d2c60099dc08d0d58f78e918a
SHA169cad130ee628434768abb1a0437a30ebc8469b1
SHA2564330fd665f7d362009cccd0f42487c99b0d51d46d55cc67530b6d29473b45a13
SHA512bbef2a481b98746474c142e3b8ca1bc784b70f49f5c54c7edbe5f2ab24c538ce1157904a2abdea67f1e05d0a7c2a9f3bdbba61f28a7d3efded1a6c7f423beebb
-
Filesize
558KB
MD5bbe46558a9fa61b3532efe3967e42e21
SHA1c4eec8603925dc29aa15e40c30b636b752c13931
SHA2567926faa495526747c0b83fef3a424155a98e6ddb82d42d2902e64a38a6520882
SHA512ddd5c59b5431c8e557cde23800685a7da8a43a65148ff43b1b85096fbe79546019073e2d9c30be15b048c3f30f71521059d69e0b0b20ec7457778e2a07430de5
-
Filesize
558KB
MD5bbe46558a9fa61b3532efe3967e42e21
SHA1c4eec8603925dc29aa15e40c30b636b752c13931
SHA2567926faa495526747c0b83fef3a424155a98e6ddb82d42d2902e64a38a6520882
SHA512ddd5c59b5431c8e557cde23800685a7da8a43a65148ff43b1b85096fbe79546019073e2d9c30be15b048c3f30f71521059d69e0b0b20ec7457778e2a07430de5
-
Filesize
307KB
MD586098a1999007be760c13b2f17266b10
SHA1ca1db3f4b0145093f2af7e16514a4a77e1daed2e
SHA256dc015e5643e6cbd8d037cf55912cd5fed7292dc71ffb70288180e3cd9fcfe486
SHA5122203243c385608e1813d0c361e366279678fed6d4738009f18e4f3f3850d75cfedab7d94392d572f099c45e38b0485c7f6cc87c3c70c91a5423240da0d75f5ad
-
Filesize
307KB
MD586098a1999007be760c13b2f17266b10
SHA1ca1db3f4b0145093f2af7e16514a4a77e1daed2e
SHA256dc015e5643e6cbd8d037cf55912cd5fed7292dc71ffb70288180e3cd9fcfe486
SHA5122203243c385608e1813d0c361e366279678fed6d4738009f18e4f3f3850d75cfedab7d94392d572f099c45e38b0485c7f6cc87c3c70c91a5423240da0d75f5ad
-
Filesize
365KB
MD56c87dd1b40d525a88ec7eadd94f4f5bd
SHA1a2923a1136f1337794cee94a8960f8eee4bf73ce
SHA2560842fd444e1d07fc500ec8cc58b368fa43e53cf09e11ab04e048c780850631fc
SHA51215c6a94887b57584162610b506a5ff2cb0dd6c9f185cd439271307493801d6af78f4c70eb8035d56060cdd7463e73d3b1b8f4681f8a0a346b2df38d544794a23
-
Filesize
365KB
MD56c87dd1b40d525a88ec7eadd94f4f5bd
SHA1a2923a1136f1337794cee94a8960f8eee4bf73ce
SHA2560842fd444e1d07fc500ec8cc58b368fa43e53cf09e11ab04e048c780850631fc
SHA51215c6a94887b57584162610b506a5ff2cb0dd6c9f185cd439271307493801d6af78f4c70eb8035d56060cdd7463e73d3b1b8f4681f8a0a346b2df38d544794a23