Analysis
-
max time kernel
132s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe
Resource
win10v2004-20230220-en
General
-
Target
fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe
-
Size
695KB
-
MD5
e072355f65fa486935d36ed7e17fa0fc
-
SHA1
8f39768069be32fd81df27ceffeb6e60690e04e0
-
SHA256
fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673
-
SHA512
aa908a7e7db240713b870ce972213ce8435cebf4fb675b83d1f99925aa54d27a441b1e1bba32e8638865e3ab084032f4f5f925690a97bd47b012b863ae9f5246
-
SSDEEP
12288:nMrry90+xqfOI09AoqSDRxIufWnzpybHPOnhFYusZtDFVT:Ay3kxeJRTkuH0hFLsnF1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5082.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5082.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5082.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5082.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5082.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5082.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3432-190-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-191-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-193-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-195-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-197-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-199-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-201-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-203-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-205-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-207-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-209-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-211-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-213-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-215-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-217-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-219-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-221-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/3432-223-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5116 un114856.exe 1088 pro5082.exe 3432 qu7760.exe 2988 si733753.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5082.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5082.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un114856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un114856.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4504 1088 WerFault.exe 84 4240 3432 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1088 pro5082.exe 1088 pro5082.exe 3432 qu7760.exe 3432 qu7760.exe 2988 si733753.exe 2988 si733753.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1088 pro5082.exe Token: SeDebugPrivilege 3432 qu7760.exe Token: SeDebugPrivilege 2988 si733753.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 5116 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 83 PID 4824 wrote to memory of 5116 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 83 PID 4824 wrote to memory of 5116 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 83 PID 5116 wrote to memory of 1088 5116 un114856.exe 84 PID 5116 wrote to memory of 1088 5116 un114856.exe 84 PID 5116 wrote to memory of 1088 5116 un114856.exe 84 PID 5116 wrote to memory of 3432 5116 un114856.exe 90 PID 5116 wrote to memory of 3432 5116 un114856.exe 90 PID 5116 wrote to memory of 3432 5116 un114856.exe 90 PID 4824 wrote to memory of 2988 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 98 PID 4824 wrote to memory of 2988 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 98 PID 4824 wrote to memory of 2988 4824 fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe"C:\Users\Admin\AppData\Local\Temp\fde528eec6d64f19624454cf02656aa3c0424db382a136a1ffdf13932ee5b673.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114856.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114856.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5082.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 10844⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7760.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7760.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 19924⤵
- Program crash
PID:4240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si733753.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1088 -ip 10881⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3432 -ip 34321⤵PID:3088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD580c7fc13cc8f864b6d933bd1d561de5d
SHA1b9034786b61a9dbff3741959d61f921daad327f8
SHA2565ea83bad51fd47da11209d64987de666898af2971c0b1fcafe3febd7c37ef743
SHA5126c7815215787f261bb688cced206d397794cabdec1ea31d116e08469c26fbd256a3a64d1a1618052eeeaf3ab4e9eb5c267d706e6652ad6b161735d0c699a2479
-
Filesize
175KB
MD580c7fc13cc8f864b6d933bd1d561de5d
SHA1b9034786b61a9dbff3741959d61f921daad327f8
SHA2565ea83bad51fd47da11209d64987de666898af2971c0b1fcafe3febd7c37ef743
SHA5126c7815215787f261bb688cced206d397794cabdec1ea31d116e08469c26fbd256a3a64d1a1618052eeeaf3ab4e9eb5c267d706e6652ad6b161735d0c699a2479
-
Filesize
553KB
MD505c6db982bc923e2a3f5cef11750daf9
SHA191b91e263431e493e0507cce7c92a4c58e357205
SHA2561cbbed7e16a3dc3b0f83ec699c1bbfcc842648ae049f840d0cba04586f147d3b
SHA5123dba6dda5b083550017ac8f3be079aba154a72568d0361a03443e30b7d5d807a297efec36400020aa526b71ba5f369d7746b5efa3a14df48b25afe675175b28c
-
Filesize
553KB
MD505c6db982bc923e2a3f5cef11750daf9
SHA191b91e263431e493e0507cce7c92a4c58e357205
SHA2561cbbed7e16a3dc3b0f83ec699c1bbfcc842648ae049f840d0cba04586f147d3b
SHA5123dba6dda5b083550017ac8f3be079aba154a72568d0361a03443e30b7d5d807a297efec36400020aa526b71ba5f369d7746b5efa3a14df48b25afe675175b28c
-
Filesize
308KB
MD53d088b81af204b0a36e1c41a91341051
SHA1bd02da1aa79f19708203cc18468f5099e1aa195c
SHA25662559f6340d110f6a8cb59eec624595bc88e13aa29c2026738d10bc1bd165263
SHA51240546085e89a95692b694a8123e0982d4f0d1ec6e75c3683a49848ea991d8b5541f639fd97f854b7220a075be5dc82beb8a98bdc6cd48ad852df1472815fd3db
-
Filesize
308KB
MD53d088b81af204b0a36e1c41a91341051
SHA1bd02da1aa79f19708203cc18468f5099e1aa195c
SHA25662559f6340d110f6a8cb59eec624595bc88e13aa29c2026738d10bc1bd165263
SHA51240546085e89a95692b694a8123e0982d4f0d1ec6e75c3683a49848ea991d8b5541f639fd97f854b7220a075be5dc82beb8a98bdc6cd48ad852df1472815fd3db
-
Filesize
366KB
MD5a90a65d99aa2d088605e9f9b183e807c
SHA1acbb08b70626e0d3227192b524cf4ece865a0276
SHA2569de3fc015999c0dee93d6d7e4b51d572b9437048a6c2b0796ff2625c5816d822
SHA512f53f720afe322a2c29fdbd2c45fb21f6e8f84bec63965a34e665f23f0a9243677e0e1649ac2b385e8217e92047c2d895f685b6c17e0d84fd6816549dd82c93ff
-
Filesize
366KB
MD5a90a65d99aa2d088605e9f9b183e807c
SHA1acbb08b70626e0d3227192b524cf4ece865a0276
SHA2569de3fc015999c0dee93d6d7e4b51d572b9437048a6c2b0796ff2625c5816d822
SHA512f53f720afe322a2c29fdbd2c45fb21f6e8f84bec63965a34e665f23f0a9243677e0e1649ac2b385e8217e92047c2d895f685b6c17e0d84fd6816549dd82c93ff