Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:39
Static task
static1
Behavioral task
behavioral1
Sample
ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe
Resource
win10v2004-20230220-en
General
-
Target
ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe
-
Size
695KB
-
MD5
ae2e9427fc2dde498d3e81b413688720
-
SHA1
fcd15b203880b31e1306686c399a2c7253233c46
-
SHA256
ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073
-
SHA512
8e50d88bfaf82e1734eaa7f523a43004cb8eef462cac2c9416306d15c8f38d4ec04e3009cc2a617dc27e18d6d34e5876c924150276ec81326ad1a3100d58cf77
-
SSDEEP
12288:pMrKy90gajVL2AqqEZDrFjABSrGb+nhslQs6sIizrpXS:nyJq2zpXFjHG4hslQsZTrpXS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4928-191-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-192-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-194-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-196-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-198-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-200-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-202-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-204-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-206-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-208-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-210-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-212-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-214-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-216-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-218-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-220-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-222-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-224-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4928-391-0x0000000000AA0000-0x0000000000AB0000-memory.dmp family_redline behavioral1/memory/4928-1110-0x0000000000AA0000-0x0000000000AB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3008 un238649.exe 4012 pro2993.exe 4928 qu1279.exe 3232 si514360.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2993.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un238649.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un238649.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1872 4012 WerFault.exe 86 768 4928 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4012 pro2993.exe 4012 pro2993.exe 4928 qu1279.exe 4928 qu1279.exe 3232 si514360.exe 3232 si514360.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4012 pro2993.exe Token: SeDebugPrivilege 4928 qu1279.exe Token: SeDebugPrivilege 3232 si514360.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4668 wrote to memory of 3008 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 85 PID 4668 wrote to memory of 3008 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 85 PID 4668 wrote to memory of 3008 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 85 PID 3008 wrote to memory of 4012 3008 un238649.exe 86 PID 3008 wrote to memory of 4012 3008 un238649.exe 86 PID 3008 wrote to memory of 4012 3008 un238649.exe 86 PID 3008 wrote to memory of 4928 3008 un238649.exe 92 PID 3008 wrote to memory of 4928 3008 un238649.exe 92 PID 3008 wrote to memory of 4928 3008 un238649.exe 92 PID 4668 wrote to memory of 3232 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 96 PID 4668 wrote to memory of 3232 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 96 PID 4668 wrote to memory of 3232 4668 ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe"C:\Users\Admin\AppData\Local\Temp\ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 10844⤵
- Program crash
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 18164⤵
- Program crash
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4012 -ip 40121⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4928 -ip 49281⤵PID:1432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ff10004be57ec3a0484f7eb1a0c40e45
SHA1645bee66b95783ac7db99ce9f34ab7dfb6e4c03f
SHA256cd502ec934781354dfbad45fa9b957f30c361defe8eda6b2e3175a1b1d9caedd
SHA51281ac62cd05fde0a6c8f1111bba6c28a2f5dfbbe2919a51360cf1adb5e072d63474a2f0a68853baf0cdd1b932c3f25623302ccf1000ae8cc1700058d504caadc6
-
Filesize
175KB
MD5ff10004be57ec3a0484f7eb1a0c40e45
SHA1645bee66b95783ac7db99ce9f34ab7dfb6e4c03f
SHA256cd502ec934781354dfbad45fa9b957f30c361defe8eda6b2e3175a1b1d9caedd
SHA51281ac62cd05fde0a6c8f1111bba6c28a2f5dfbbe2919a51360cf1adb5e072d63474a2f0a68853baf0cdd1b932c3f25623302ccf1000ae8cc1700058d504caadc6
-
Filesize
553KB
MD5bf31c0ec87b25c010c7f5089eb807716
SHA176022e0718ceb29898a977b76987448cce03344a
SHA256c5b8829557491bbf331811a45e4eeb3205df9dec2cfd7b0bee0ada1d6fafd5f3
SHA512ab749cd48f17f80c7c298b3122bdc1425046cffc9a4aa1ee661b2b24d09d4782dee1edb81df480988b52b9f0d856b9440d995bdbd42726238c82f0d63727ec9c
-
Filesize
553KB
MD5bf31c0ec87b25c010c7f5089eb807716
SHA176022e0718ceb29898a977b76987448cce03344a
SHA256c5b8829557491bbf331811a45e4eeb3205df9dec2cfd7b0bee0ada1d6fafd5f3
SHA512ab749cd48f17f80c7c298b3122bdc1425046cffc9a4aa1ee661b2b24d09d4782dee1edb81df480988b52b9f0d856b9440d995bdbd42726238c82f0d63727ec9c
-
Filesize
308KB
MD5a62c4f62e791d28012c6bd4bd2c75b12
SHA10739fbf35da9816ba1d1fa296f4039df3cdf21fb
SHA256f1d66edee459cd86299d77f35a49f41571224220b7d1de9fadbee14eb48c3216
SHA5127c59078629832f5376131ab8dd0e2ed253e473465064ea86064469831e0fc900fb24352164146493296efca9747f85c77bad97e72767e86497fa1c895e89dd97
-
Filesize
308KB
MD5a62c4f62e791d28012c6bd4bd2c75b12
SHA10739fbf35da9816ba1d1fa296f4039df3cdf21fb
SHA256f1d66edee459cd86299d77f35a49f41571224220b7d1de9fadbee14eb48c3216
SHA5127c59078629832f5376131ab8dd0e2ed253e473465064ea86064469831e0fc900fb24352164146493296efca9747f85c77bad97e72767e86497fa1c895e89dd97
-
Filesize
366KB
MD5d5eee3b3bbc77ab422819d055d2a3346
SHA171942c1774c3693f6593d8199e4afe1ab98d01f0
SHA256b4c31c51f04109444ff23490d5bb04fc6f91fa6910fcf693c297711347675be3
SHA512c22b9952f58cc283f2409a351deb2e9ab5887df32fba581a289ffd7bd7c37ee209cfdb75c8b5d29f92c430b9e240dddb3fdff0506cd68ca29d67c35e34d8b281
-
Filesize
366KB
MD5d5eee3b3bbc77ab422819d055d2a3346
SHA171942c1774c3693f6593d8199e4afe1ab98d01f0
SHA256b4c31c51f04109444ff23490d5bb04fc6f91fa6910fcf693c297711347675be3
SHA512c22b9952f58cc283f2409a351deb2e9ab5887df32fba581a289ffd7bd7c37ee209cfdb75c8b5d29f92c430b9e240dddb3fdff0506cd68ca29d67c35e34d8b281