Analysis
-
max time kernel
137s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:37
Static task
static1
Behavioral task
behavioral1
Sample
ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe
Resource
win10v2004-20230220-en
General
-
Target
ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe
-
Size
696KB
-
MD5
c830169b7a5776a24314e1abb71f4668
-
SHA1
cb8d017262df4ceb906333bc448409256375d95c
-
SHA256
ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77
-
SHA512
1fdd16e8fc8826c7de5fc903a98874081f0a394359fcb42a62be8eed80ab82e4695100514369688063ceff55772de7e6d0c47adcb1afa701fd952c0eb36328bb
-
SSDEEP
12288:kMrGy90KX7uAAh9YQptPGcASqaPmpFPROMTe43bwRnhwxN8AUgyjSf:Ky/0pXTxOpFpZTXyhw8Ahr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5436.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5436.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/5040-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-225-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/5040-227-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4768 un164597.exe 2348 pro5436.exe 5040 qu8655.exe 2028 si159343.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5436.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un164597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un164597.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3328 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 732 2348 WerFault.exe 86 2496 5040 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2348 pro5436.exe 2348 pro5436.exe 5040 qu8655.exe 5040 qu8655.exe 2028 si159343.exe 2028 si159343.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2348 pro5436.exe Token: SeDebugPrivilege 5040 qu8655.exe Token: SeDebugPrivilege 2028 si159343.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4768 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 85 PID 1228 wrote to memory of 4768 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 85 PID 1228 wrote to memory of 4768 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 85 PID 4768 wrote to memory of 2348 4768 un164597.exe 86 PID 4768 wrote to memory of 2348 4768 un164597.exe 86 PID 4768 wrote to memory of 2348 4768 un164597.exe 86 PID 4768 wrote to memory of 5040 4768 un164597.exe 92 PID 4768 wrote to memory of 5040 4768 un164597.exe 92 PID 4768 wrote to memory of 5040 4768 un164597.exe 92 PID 1228 wrote to memory of 2028 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 96 PID 1228 wrote to memory of 2028 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 96 PID 1228 wrote to memory of 2028 1228 ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe"C:\Users\Admin\AppData\Local\Temp\ec7d6f98d98ac8fdef1828ea651435df2fe0dd689b6df55066c031e24aae2d77.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un164597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un164597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5436.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10884⤵
- Program crash
PID:732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8655.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 12204⤵
- Program crash
PID:2496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si159343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si159343.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2348 -ip 23481⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5040 -ip 50401⤵PID:812
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d59f4ef6b181aa918d0a44569a462e52
SHA1f94d8432187c57f1dd2da252bb5ba78087a35047
SHA256e62ddee13e8cbeb00187b9aba9da3a57503ac65257f392b191f73b8445af4a86
SHA512a7edb8a89b6916d57ada8051cb344cdf6abaced4b7064dd42f9483d92469df46192e6500a7d100dff86fa95f4fe563e3c7cfc492ee45e683fbac517bc172b26a
-
Filesize
175KB
MD5d59f4ef6b181aa918d0a44569a462e52
SHA1f94d8432187c57f1dd2da252bb5ba78087a35047
SHA256e62ddee13e8cbeb00187b9aba9da3a57503ac65257f392b191f73b8445af4a86
SHA512a7edb8a89b6916d57ada8051cb344cdf6abaced4b7064dd42f9483d92469df46192e6500a7d100dff86fa95f4fe563e3c7cfc492ee45e683fbac517bc172b26a
-
Filesize
553KB
MD58fe80fe2b684d5421d6ff284eec0c80d
SHA1b5afd3543f45d2ef546bbc3d334fecbb3d7e3a79
SHA2568bfb8dabd4967c09d80cb0e599dbdf580510359358395fa6560f014aa9fd7bda
SHA512dc77ed74b2d0353a9470c621d41990b6ace85a05f2c318670c9809d6b6220674fe4982c869f7a8e793a2381e00552f79486da1547c230b9f504c5743609e15ba
-
Filesize
553KB
MD58fe80fe2b684d5421d6ff284eec0c80d
SHA1b5afd3543f45d2ef546bbc3d334fecbb3d7e3a79
SHA2568bfb8dabd4967c09d80cb0e599dbdf580510359358395fa6560f014aa9fd7bda
SHA512dc77ed74b2d0353a9470c621d41990b6ace85a05f2c318670c9809d6b6220674fe4982c869f7a8e793a2381e00552f79486da1547c230b9f504c5743609e15ba
-
Filesize
308KB
MD5eb6324e295259268d703d7c814d57be1
SHA14c6887fc8374f630ab998b133c5e5858c1e1f565
SHA2567802740c4eb6f5183610619a657ba40841981d8907c8beae4f2d439fcec2f944
SHA5124467e20be69d32097d02d882f2366bdef1bab51af30dda32fe526d981c122398510fc82a30b7dd4cb9b7e27053513eec378c7e5f1272af4ba7e4bea01fe2ca2e
-
Filesize
308KB
MD5eb6324e295259268d703d7c814d57be1
SHA14c6887fc8374f630ab998b133c5e5858c1e1f565
SHA2567802740c4eb6f5183610619a657ba40841981d8907c8beae4f2d439fcec2f944
SHA5124467e20be69d32097d02d882f2366bdef1bab51af30dda32fe526d981c122398510fc82a30b7dd4cb9b7e27053513eec378c7e5f1272af4ba7e4bea01fe2ca2e
-
Filesize
366KB
MD5acef194ba1eb342a2c5b4ee3033a6a97
SHA146e1acbedad9d6790657bce8a78529bc7e95bbb9
SHA256556bcb33f2f71092ddd1ae77e06791e3a5224c2c36156cbc17469c6a0ce82304
SHA51262cdae4a602701c0ebf6a94e18c41344e30a5005fff19e9b9f6d955734f5036fe328cee428a0cd5dc69707b81eee216bb360b0c48f6501c488c3e1c808e06e70
-
Filesize
366KB
MD5acef194ba1eb342a2c5b4ee3033a6a97
SHA146e1acbedad9d6790657bce8a78529bc7e95bbb9
SHA256556bcb33f2f71092ddd1ae77e06791e3a5224c2c36156cbc17469c6a0ce82304
SHA51262cdae4a602701c0ebf6a94e18c41344e30a5005fff19e9b9f6d955734f5036fe328cee428a0cd5dc69707b81eee216bb360b0c48f6501c488c3e1c808e06e70