Analysis
-
max time kernel
72s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:54
Static task
static1
Behavioral task
behavioral1
Sample
25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe
Resource
win10v2004-20230220-en
General
-
Target
25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe
-
Size
695KB
-
MD5
80c3210269669c09bfd092ecff6deef3
-
SHA1
d4948b57b53487e10c827d1c0a4d06bbc37b5ff9
-
SHA256
25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008
-
SHA512
bff39855f734138c88dcaf0faaa53bacd09b7feacf034ecddb023670b92778afda65c36b9b673a565020d1149628630f9bd2531142169b77e3e2749472991fac
-
SSDEEP
12288:1Mrjy90Py8FLRTpdwrlFBpbaCVYjpqxv8obnh9MQs6+I4:Oy+TpWrdpbhGjmv8yh9MQsfn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8191.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8191.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4832-191-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-192-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-194-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-201-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-198-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-203-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-205-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-207-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-209-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-211-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-213-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-215-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-217-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-219-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-221-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-225-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-223-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4832-227-0x0000000002910000-0x000000000294F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 460 un329990.exe 3520 pro8191.exe 4832 qu1799.exe 3312 si817086.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8191.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un329990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un329990.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3652 3520 WerFault.exe 86 4448 4832 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3520 pro8191.exe 3520 pro8191.exe 4832 qu1799.exe 4832 qu1799.exe 3312 si817086.exe 3312 si817086.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3520 pro8191.exe Token: SeDebugPrivilege 4832 qu1799.exe Token: SeDebugPrivilege 3312 si817086.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4804 wrote to memory of 460 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 85 PID 4804 wrote to memory of 460 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 85 PID 4804 wrote to memory of 460 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 85 PID 460 wrote to memory of 3520 460 un329990.exe 86 PID 460 wrote to memory of 3520 460 un329990.exe 86 PID 460 wrote to memory of 3520 460 un329990.exe 86 PID 460 wrote to memory of 4832 460 un329990.exe 94 PID 460 wrote to memory of 4832 460 un329990.exe 94 PID 460 wrote to memory of 4832 460 un329990.exe 94 PID 4804 wrote to memory of 3312 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 97 PID 4804 wrote to memory of 3312 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 97 PID 4804 wrote to memory of 3312 4804 25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe"C:\Users\Admin\AppData\Local\Temp\25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 10844⤵
- Program crash
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 20204⤵
- Program crash
PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3520 -ip 35201⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4832 -ip 48321⤵PID:1224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5999652b8feb8fdc2a0316fea1e345b26
SHA1d1461532bba594937c7820022adc6b91687ee819
SHA25667ab3164902088667773aebd18e6c1043a9a0ebc7f0bdcd71e5ec60b2243361d
SHA512d1ae253bcc7df77a09e037dce5d1b3e7f77729e0152eb947e1c69abf4aa4e8821a70fc7cba2d9aec2b41083b775ab40241186383ff5c0a45de05616ff57f93f9
-
Filesize
175KB
MD5999652b8feb8fdc2a0316fea1e345b26
SHA1d1461532bba594937c7820022adc6b91687ee819
SHA25667ab3164902088667773aebd18e6c1043a9a0ebc7f0bdcd71e5ec60b2243361d
SHA512d1ae253bcc7df77a09e037dce5d1b3e7f77729e0152eb947e1c69abf4aa4e8821a70fc7cba2d9aec2b41083b775ab40241186383ff5c0a45de05616ff57f93f9
-
Filesize
553KB
MD5e09da21709c7651cc7d0764b8d697070
SHA14ee8266183e60d4d5a10b12125857ab0787d665d
SHA256911bf33c88a9c0c6ac1df2ed2763f336b56fcb4905e3c3c508ca7e11888c4adc
SHA5128277cf99eea9064083abd9b77cba8504be120dcbabd57fc1400fb53bc1172027fcbadc6371368953bbdfbb7c2dc1ac6e15e32ed0a1c2fdbeb0a5e85e50a9cd83
-
Filesize
553KB
MD5e09da21709c7651cc7d0764b8d697070
SHA14ee8266183e60d4d5a10b12125857ab0787d665d
SHA256911bf33c88a9c0c6ac1df2ed2763f336b56fcb4905e3c3c508ca7e11888c4adc
SHA5128277cf99eea9064083abd9b77cba8504be120dcbabd57fc1400fb53bc1172027fcbadc6371368953bbdfbb7c2dc1ac6e15e32ed0a1c2fdbeb0a5e85e50a9cd83
-
Filesize
308KB
MD525786bf5cb5b7398db51b6d5a09160f7
SHA1d89a5055aa701b99ebeaec995e26e04c34a086e7
SHA2563d98faa2096a244004d1c8881d7ab03362325a107b14f55f14617ac372fb14dd
SHA5129c94a41f38853d52d6a74f6feaadb4521c5ce8e63e94eb553d1e560f154c05f0b260391bd8f37b9163ac240ca295ee61f4957d89fe09f8c566bf3733d3410986
-
Filesize
308KB
MD525786bf5cb5b7398db51b6d5a09160f7
SHA1d89a5055aa701b99ebeaec995e26e04c34a086e7
SHA2563d98faa2096a244004d1c8881d7ab03362325a107b14f55f14617ac372fb14dd
SHA5129c94a41f38853d52d6a74f6feaadb4521c5ce8e63e94eb553d1e560f154c05f0b260391bd8f37b9163ac240ca295ee61f4957d89fe09f8c566bf3733d3410986
-
Filesize
366KB
MD55b7695bd2cdc687f9764f518d9cec162
SHA118b26ce73c5806cd858934f5c9dd06345ab82bae
SHA2564adf0a5f4a3916a1bea47c903b0181f7b95571aecc059e8b7348df6467c5d6d3
SHA512f5d0b8c7e12af5b5dec31a2a62a9a52fe7992aedc5bbb1dbf2447406fa7eea4a69593b6a6388535580ebbdaa524fd80e7368c07d6290543ebf83ac7cf7904f0a
-
Filesize
366KB
MD55b7695bd2cdc687f9764f518d9cec162
SHA118b26ce73c5806cd858934f5c9dd06345ab82bae
SHA2564adf0a5f4a3916a1bea47c903b0181f7b95571aecc059e8b7348df6467c5d6d3
SHA512f5d0b8c7e12af5b5dec31a2a62a9a52fe7992aedc5bbb1dbf2447406fa7eea4a69593b6a6388535580ebbdaa524fd80e7368c07d6290543ebf83ac7cf7904f0a