Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe
Resource
win10v2004-20230221-en
General
-
Target
1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe
-
Size
695KB
-
MD5
51aae0d8565d7984433faee18475fb16
-
SHA1
0995bc74b0ded6cc0221e109dd0fa1eaad71934f
-
SHA256
1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf
-
SHA512
24b26eb74229cf0aa8a48b6eef1778eff6629a8ffadd4646f0bb42f53e6516eca68a0977ed9699dfa424afc5b006707deb31dfb8132e15893717c76d65b8de42
-
SSDEEP
12288:EMrfy90kfN/eE83jmVBAzqCTpuOVzR59sUqJnasynh0oQs66ILOAt0hOLn:zyVN2x3jAibTP79SJIh0oQsTat0c
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6474.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2728-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/2728-402-0x0000000004DF0000-0x0000000004E00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1904 un437127.exe 2660 pro6474.exe 2728 qu6941.exe 3816 si095803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6474.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un437127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un437127.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2748 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1700 2660 WerFault.exe 83 3632 2728 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2660 pro6474.exe 2660 pro6474.exe 2728 qu6941.exe 2728 qu6941.exe 3816 si095803.exe 3816 si095803.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2660 pro6474.exe Token: SeDebugPrivilege 2728 qu6941.exe Token: SeDebugPrivilege 3816 si095803.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1904 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 82 PID 2648 wrote to memory of 1904 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 82 PID 2648 wrote to memory of 1904 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 82 PID 1904 wrote to memory of 2660 1904 un437127.exe 83 PID 1904 wrote to memory of 2660 1904 un437127.exe 83 PID 1904 wrote to memory of 2660 1904 un437127.exe 83 PID 1904 wrote to memory of 2728 1904 un437127.exe 89 PID 1904 wrote to memory of 2728 1904 un437127.exe 89 PID 1904 wrote to memory of 2728 1904 un437127.exe 89 PID 2648 wrote to memory of 3816 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 92 PID 2648 wrote to memory of 3816 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 92 PID 2648 wrote to memory of 3816 2648 1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe"C:\Users\Admin\AppData\Local\Temp\1f81f630944e76ab1b6b9e2f7850f0323868460785d1b62647be80741f773edf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437127.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6474.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10844⤵
- Program crash
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6941.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6941.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 18764⤵
- Program crash
PID:3632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si095803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si095803.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2660 -ip 26601⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2728 -ip 27281⤵PID:1232
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f71ccf28d406a9d721cb7920ac649dbc
SHA18350eacc33fed26d04f174e13b5b2579f04e1c98
SHA25694a4e7dd78d103685b83abc96668152e935c14b2ce32b523d181c163eb5fbbfd
SHA5129089d2a69abecd455577b0243c51a3bf6fdaf05f2c6adc0cf6cf1308fbaffe04dd1c8efc4aa6fe7e5249b092e537813afe9ba9ea84f2db29e0516fcc96c90a51
-
Filesize
175KB
MD5f71ccf28d406a9d721cb7920ac649dbc
SHA18350eacc33fed26d04f174e13b5b2579f04e1c98
SHA25694a4e7dd78d103685b83abc96668152e935c14b2ce32b523d181c163eb5fbbfd
SHA5129089d2a69abecd455577b0243c51a3bf6fdaf05f2c6adc0cf6cf1308fbaffe04dd1c8efc4aa6fe7e5249b092e537813afe9ba9ea84f2db29e0516fcc96c90a51
-
Filesize
553KB
MD57aed61004917e237d0aa011e52bf886f
SHA106c0f85b97d1247c80d6e8ffc86b40fed8dc6b3b
SHA25647f14f06a2b29a67fa744ffb1d722e3ed397ba2787fa86616b570c5f7f24354a
SHA512e91bff338689a0a8a3c3941dc585493694ff67501455fcfe8f3aab36f7d57386654a455526221fcef5e5e44c4801adec9ac43ceb99bc0cf553c6216df13afe0f
-
Filesize
553KB
MD57aed61004917e237d0aa011e52bf886f
SHA106c0f85b97d1247c80d6e8ffc86b40fed8dc6b3b
SHA25647f14f06a2b29a67fa744ffb1d722e3ed397ba2787fa86616b570c5f7f24354a
SHA512e91bff338689a0a8a3c3941dc585493694ff67501455fcfe8f3aab36f7d57386654a455526221fcef5e5e44c4801adec9ac43ceb99bc0cf553c6216df13afe0f
-
Filesize
308KB
MD57fe57da1064b991c1250e59424b5b5b3
SHA1ba363eefab6ea5661577df741917b3f33147999f
SHA256791736d5ef0136bb634581add868904ee42e1fbfdf4672937c2fc0c34ef493ac
SHA5128da7fdbb319ddcd90d198deb9c7040fff3434863838e44fbfbee5c03defffdf444f364fd4bbcc5dbaf95f5e85c4ec446192b6572288ea73fb6defa9b790455e9
-
Filesize
308KB
MD57fe57da1064b991c1250e59424b5b5b3
SHA1ba363eefab6ea5661577df741917b3f33147999f
SHA256791736d5ef0136bb634581add868904ee42e1fbfdf4672937c2fc0c34ef493ac
SHA5128da7fdbb319ddcd90d198deb9c7040fff3434863838e44fbfbee5c03defffdf444f364fd4bbcc5dbaf95f5e85c4ec446192b6572288ea73fb6defa9b790455e9
-
Filesize
366KB
MD553d0c3fc2c6ca06fa7ec351dd25d949c
SHA13e978d52538c8a399b3817b3e3e64dd081acffd8
SHA25695023969c93aa73a6f449747cc2df9c673415452e58e9240d7ee7808af18146a
SHA512b3314f1650e05856ebd7231cdea4bdef275e6556f84943f2f2f13294a5f7eccd6117effa53fd3f26aa43637e2600cd5c64ca61c08d94ab6303380c7bc20c7015
-
Filesize
366KB
MD553d0c3fc2c6ca06fa7ec351dd25d949c
SHA13e978d52538c8a399b3817b3e3e64dd081acffd8
SHA25695023969c93aa73a6f449747cc2df9c673415452e58e9240d7ee7808af18146a
SHA512b3314f1650e05856ebd7231cdea4bdef275e6556f84943f2f2f13294a5f7eccd6117effa53fd3f26aa43637e2600cd5c64ca61c08d94ab6303380c7bc20c7015