Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
Resource
win10v2004-20230220-en
General
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
-
Size
695KB
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0231.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0231.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1056-191-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-192-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-196-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-198-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-194-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-200-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-204-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-208-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-212-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-214-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-219-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-222-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-224-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-226-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1056-228-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4672 un355045.exe 4504 pro0231.exe 1056 qu5626.exe 4236 si027186.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0231.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un355045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3312 4504 WerFault.exe 84 2492 1056 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 pro0231.exe 4504 pro0231.exe 1056 qu5626.exe 1056 qu5626.exe 4236 si027186.exe 4236 si027186.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 pro0231.exe Token: SeDebugPrivilege 1056 qu5626.exe Token: SeDebugPrivilege 4236 si027186.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4672 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 83 PID 1988 wrote to memory of 4672 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 83 PID 1988 wrote to memory of 4672 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 83 PID 4672 wrote to memory of 4504 4672 un355045.exe 84 PID 4672 wrote to memory of 4504 4672 un355045.exe 84 PID 4672 wrote to memory of 4504 4672 un355045.exe 84 PID 4672 wrote to memory of 1056 4672 un355045.exe 90 PID 4672 wrote to memory of 1056 4672 un355045.exe 90 PID 4672 wrote to memory of 1056 4672 un355045.exe 90 PID 1988 wrote to memory of 4236 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 94 PID 1988 wrote to memory of 4236 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 94 PID 1988 wrote to memory of 4236 1988 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe"C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 10844⤵
- Program crash
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 17324⤵
- Program crash
PID:2492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4504 -ip 45041⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1056 -ip 10561⤵PID:4248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5df59d66538c7da43c0a82b3c38fcb7f7
SHA1f48a5982fe14e5ae8dd3f1b3a10179a8ff5297e6
SHA25677b77311368a369dd41cf27a668cd3737ff22dc58c8d8bf20b41c15677b2a534
SHA512d34d90a4ca6e79443ecee44df72f6172fbc9c57f05f5af71605454bdee1d8af1a9820b73e865c5de0f69e2cd2573979f4285a8d250c6bac1cbd078760bf93a33
-
Filesize
175KB
MD5df59d66538c7da43c0a82b3c38fcb7f7
SHA1f48a5982fe14e5ae8dd3f1b3a10179a8ff5297e6
SHA25677b77311368a369dd41cf27a668cd3737ff22dc58c8d8bf20b41c15677b2a534
SHA512d34d90a4ca6e79443ecee44df72f6172fbc9c57f05f5af71605454bdee1d8af1a9820b73e865c5de0f69e2cd2573979f4285a8d250c6bac1cbd078760bf93a33
-
Filesize
553KB
MD5c7e284580d93e8707b6cd78a4bab78ca
SHA1bc3dc3551c1254fb72052460e9666dd19158dc2e
SHA25653d642370160d6b211b81049b519350ab34b4cb6787c775f234c8b8766dd9393
SHA51230bf1b4a352c7670f9e1b2c42d60ee11b886ce2dafedee917e7e3b24eea59adb55686e5d5d448f4efd6d46cf7db860262db6b12bfc74700939a981549bef474a
-
Filesize
553KB
MD5c7e284580d93e8707b6cd78a4bab78ca
SHA1bc3dc3551c1254fb72052460e9666dd19158dc2e
SHA25653d642370160d6b211b81049b519350ab34b4cb6787c775f234c8b8766dd9393
SHA51230bf1b4a352c7670f9e1b2c42d60ee11b886ce2dafedee917e7e3b24eea59adb55686e5d5d448f4efd6d46cf7db860262db6b12bfc74700939a981549bef474a
-
Filesize
308KB
MD5d78dc186cf592a55403a2c34647fc445
SHA18f6868a8073e6f6e8c231cd39e63f584c4504e81
SHA25609b4a21d682364d837e3ad3f0daba03b7c1ca1f291b4fcec815cf075551f6634
SHA512585a2ea86aa72f86bf7b4d89538456c9ce882db3715a17408adc47b2cdcf68a47f8e39f483b88fa82df45678519bd7dfa92ce857f182fd9b2f2c6c7dcdff261e
-
Filesize
308KB
MD5d78dc186cf592a55403a2c34647fc445
SHA18f6868a8073e6f6e8c231cd39e63f584c4504e81
SHA25609b4a21d682364d837e3ad3f0daba03b7c1ca1f291b4fcec815cf075551f6634
SHA512585a2ea86aa72f86bf7b4d89538456c9ce882db3715a17408adc47b2cdcf68a47f8e39f483b88fa82df45678519bd7dfa92ce857f182fd9b2f2c6c7dcdff261e
-
Filesize
366KB
MD54e705d1b17525c67f3680e6e87d9905b
SHA10f0eb73a5d93a15b9762f78c54da3abcf580ca0b
SHA256b9d1ab0b4c48a07717e87b7bce1d00f557575c145ea0d525eca3773f746d7876
SHA512b43dad5e1b4944c9a211b9eb9a7d5dc1de269c28a00062b942b6b7b0d9fd0838184c47692ad267db499b22c8bca85d1134e899c64a341f643dbbbbc13f5f7fa9
-
Filesize
366KB
MD54e705d1b17525c67f3680e6e87d9905b
SHA10f0eb73a5d93a15b9762f78c54da3abcf580ca0b
SHA256b9d1ab0b4c48a07717e87b7bce1d00f557575c145ea0d525eca3773f746d7876
SHA512b43dad5e1b4944c9a211b9eb9a7d5dc1de269c28a00062b942b6b7b0d9fd0838184c47692ad267db499b22c8bca85d1134e899c64a341f643dbbbbc13f5f7fa9