Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe
Resource
win10v2004-20230221-en
General
-
Target
c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe
-
Size
695KB
-
MD5
f2ece4cf1c852c3d1b6005311300e127
-
SHA1
4c0ab7cc93ae19e960863adc23c78a6118ffaaaa
-
SHA256
c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a
-
SHA512
fdc41b0e0d2f6702b35da85cd0a9df48c0deef81c7657c2ecf3530e5b1abdcf6f9f7eac56d377803b890e78efb4d81bab4a44fd49b01761d7c895c8b8126a6a7
-
SSDEEP
12288:QMr/y9032S5WKpYRB8pIHI8DgwtDSojKL4gHzmBnhBC8GibLG2E:/ym2SW0skIHbTGojKLNUhBLGeLG/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8600.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1788-190-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-191-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-193-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-195-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-197-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-199-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-201-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-203-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-208-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-211-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-207-0x0000000002250000-0x0000000002260000-memory.dmp family_redline behavioral1/memory/1788-213-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-215-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-217-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-219-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-221-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-223-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-225-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/1788-227-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3080 un696875.exe 1384 pro8600.exe 1788 qu1573.exe 4700 si187810.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8600.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un696875.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un696875.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2368 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3904 1384 WerFault.exe 84 4252 1788 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1384 pro8600.exe 1384 pro8600.exe 1788 qu1573.exe 1788 qu1573.exe 4700 si187810.exe 4700 si187810.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 pro8600.exe Token: SeDebugPrivilege 1788 qu1573.exe Token: SeDebugPrivilege 4700 si187810.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3080 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 83 PID 2712 wrote to memory of 3080 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 83 PID 2712 wrote to memory of 3080 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 83 PID 3080 wrote to memory of 1384 3080 un696875.exe 84 PID 3080 wrote to memory of 1384 3080 un696875.exe 84 PID 3080 wrote to memory of 1384 3080 un696875.exe 84 PID 3080 wrote to memory of 1788 3080 un696875.exe 90 PID 3080 wrote to memory of 1788 3080 un696875.exe 90 PID 3080 wrote to memory of 1788 3080 un696875.exe 90 PID 2712 wrote to memory of 4700 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 93 PID 2712 wrote to memory of 4700 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 93 PID 2712 wrote to memory of 4700 2712 c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe"C:\Users\Admin\AppData\Local\Temp\c1ac6f91df74dfa55bde7b479d4e6e357b55a3f7325da8dd6985d71c2e8a035a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un696875.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un696875.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8600.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11044⤵
- Program crash
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1573.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 18724⤵
- Program crash
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si187810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si187810.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1384 -ip 13841⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1788 -ip 17881⤵PID:4996
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dfd510210778ea5439df606af465d5fc
SHA15c6e87e194ccee317f0494011f46c5f0481dabe0
SHA256ef00fba55c0a4bc193952ab21f7f693af1e6d3e28d4b7f1351220c7c630fe899
SHA512b44b729c3b7c6265b2782e6f14cfd1d3a3e42bccb9569d04ebbaeaf60cfd75f8ef509434bbe9476675252af8c503ebe4745bb324264e21c1002c032306b3e182
-
Filesize
175KB
MD5dfd510210778ea5439df606af465d5fc
SHA15c6e87e194ccee317f0494011f46c5f0481dabe0
SHA256ef00fba55c0a4bc193952ab21f7f693af1e6d3e28d4b7f1351220c7c630fe899
SHA512b44b729c3b7c6265b2782e6f14cfd1d3a3e42bccb9569d04ebbaeaf60cfd75f8ef509434bbe9476675252af8c503ebe4745bb324264e21c1002c032306b3e182
-
Filesize
553KB
MD5eb64aca7a4832721deaf86b52451471e
SHA1e75a3feefce1da62ba1fd9a4b2337270e192dd72
SHA256fcb25776eaae7f90ffa2461f311ae71923d75bf8b0da4edc23df5506f724b0d7
SHA512fa83db7e9ae359ddd20300ba262ea4d95bae2423012c72ddd6ec17b455e61d34fe7e8e1e1f1f6e5ce8452527f64c9a54f6d4c4d376153394c7b629eda28c8920
-
Filesize
553KB
MD5eb64aca7a4832721deaf86b52451471e
SHA1e75a3feefce1da62ba1fd9a4b2337270e192dd72
SHA256fcb25776eaae7f90ffa2461f311ae71923d75bf8b0da4edc23df5506f724b0d7
SHA512fa83db7e9ae359ddd20300ba262ea4d95bae2423012c72ddd6ec17b455e61d34fe7e8e1e1f1f6e5ce8452527f64c9a54f6d4c4d376153394c7b629eda28c8920
-
Filesize
308KB
MD5e181528b9b55ae8db41445fbdf8f1465
SHA14fd8f0a54086f781053f238723fc53afebbcd37a
SHA25659b089cea810dd8da4894bb9d8ce708e64468867ffd53ae2e60cfccef48a7c9b
SHA51215b8c93fb7b17c093192ebc1b764c436525896a99ce04916e838844cb53b720cf43e95721116b016f7be78aa53e847da6090e88678b49424b15e5698c35a1020
-
Filesize
308KB
MD5e181528b9b55ae8db41445fbdf8f1465
SHA14fd8f0a54086f781053f238723fc53afebbcd37a
SHA25659b089cea810dd8da4894bb9d8ce708e64468867ffd53ae2e60cfccef48a7c9b
SHA51215b8c93fb7b17c093192ebc1b764c436525896a99ce04916e838844cb53b720cf43e95721116b016f7be78aa53e847da6090e88678b49424b15e5698c35a1020
-
Filesize
366KB
MD5bfaed7f8a5c69a2f2a093621855863af
SHA11447851834194f64b986882813d01999c5d7b3a1
SHA25620c1e55f63edbf931c8835310092be4cea26aeef2cee46f6ffc5c28acb2f85e4
SHA5126325be83c25bfc357ad107e5eaea80ff8a4112dd44b89cbf9aab35ce488149e7190a3cbc3c7fa41ba01e16acb0eb9e5d92916509d09319e42d625149f9217ac0
-
Filesize
366KB
MD5bfaed7f8a5c69a2f2a093621855863af
SHA11447851834194f64b986882813d01999c5d7b3a1
SHA25620c1e55f63edbf931c8835310092be4cea26aeef2cee46f6ffc5c28acb2f85e4
SHA5126325be83c25bfc357ad107e5eaea80ff8a4112dd44b89cbf9aab35ce488149e7190a3cbc3c7fa41ba01e16acb0eb9e5d92916509d09319e42d625149f9217ac0