Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:00
Static task
static1
Behavioral task
behavioral1
Sample
9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe
Resource
win10v2004-20230220-en
General
-
Target
9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe
-
Size
695KB
-
MD5
46d17fa059062a9c2178aa17360e214a
-
SHA1
cfa4b04b313da828307bddde9d4a4fc443d20ff5
-
SHA256
9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d
-
SHA512
b3237cd0cb1096d107334c123f823e0f848f19d622a8d5641567af784471f43a899815a137de6a1632f493beae695b5551ba1852c69bd162eaf13b48bc6a95a1
-
SSDEEP
12288:PMrhy90ePQ0g1xJgAqmMyUqdvTIAQqKsJCuMbdzPNILMsYnhrBQs6WITK/Kppv7p:myzAjPqmJUqhMVVcApzPNs2hrBQs/MKI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4281.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4281.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5076-190-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-191-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-193-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-195-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-197-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-199-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-201-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-203-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-205-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-207-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-209-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-211-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-213-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-215-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-217-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-219-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-221-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-223-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/5076-279-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2464 un622996.exe 876 pro4281.exe 5076 qu3367.exe 1012 si023413.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4281.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un622996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un622996.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5064 876 WerFault.exe 86 2040 5076 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 876 pro4281.exe 876 pro4281.exe 5076 qu3367.exe 5076 qu3367.exe 1012 si023413.exe 1012 si023413.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 876 pro4281.exe Token: SeDebugPrivilege 5076 qu3367.exe Token: SeDebugPrivilege 1012 si023413.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2464 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 85 PID 2128 wrote to memory of 2464 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 85 PID 2128 wrote to memory of 2464 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 85 PID 2464 wrote to memory of 876 2464 un622996.exe 86 PID 2464 wrote to memory of 876 2464 un622996.exe 86 PID 2464 wrote to memory of 876 2464 un622996.exe 86 PID 2464 wrote to memory of 5076 2464 un622996.exe 92 PID 2464 wrote to memory of 5076 2464 un622996.exe 92 PID 2464 wrote to memory of 5076 2464 un622996.exe 92 PID 2128 wrote to memory of 1012 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 96 PID 2128 wrote to memory of 1012 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 96 PID 2128 wrote to memory of 1012 2128 9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe"C:\Users\Admin\AppData\Local\Temp\9ac59ace81ac1c3208a0348a8cc2e889da00731dbba03f36f4167f66a6e8112d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un622996.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un622996.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4281.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 10844⤵
- Program crash
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3367.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 11364⤵
- Program crash
PID:2040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023413.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 876 -ip 8761⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5076 -ip 50761⤵PID:716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c120528459ccf2a8add163e7d456527
SHA1d42053826455b978f7486a916f2ba686428ed00d
SHA256590fee00d1e5389b6eee975c7fe3057745e97ceac4bfddc64ab6f6d02f5c3988
SHA5129248d82b4c6316aeb4c967ff4d1791591e0bf248bc6f77aef2392bccc94a69c0466688315993eda589fc888a7db7161a3c3472a0191ae6853279c93ee099a463
-
Filesize
175KB
MD55c120528459ccf2a8add163e7d456527
SHA1d42053826455b978f7486a916f2ba686428ed00d
SHA256590fee00d1e5389b6eee975c7fe3057745e97ceac4bfddc64ab6f6d02f5c3988
SHA5129248d82b4c6316aeb4c967ff4d1791591e0bf248bc6f77aef2392bccc94a69c0466688315993eda589fc888a7db7161a3c3472a0191ae6853279c93ee099a463
-
Filesize
553KB
MD55197ec1b011e0d757ae978b27fc34167
SHA1ac40f8f3a616c24f77ee3711f5ab533f35e41726
SHA256bbcb9260d88bf1b7b34ba9285a28d3cae0418bf4e3d0c7d0d4f5a36b24b6773e
SHA512ed460467cd034a3df89c19e389073999ea0a6eff9f41a2b9e6ad8effd3ee7312112a3bbbb4412a9ebf452b3eeaa61dcc3ce657c50cafe3194eb1dcc6fa7649bb
-
Filesize
553KB
MD55197ec1b011e0d757ae978b27fc34167
SHA1ac40f8f3a616c24f77ee3711f5ab533f35e41726
SHA256bbcb9260d88bf1b7b34ba9285a28d3cae0418bf4e3d0c7d0d4f5a36b24b6773e
SHA512ed460467cd034a3df89c19e389073999ea0a6eff9f41a2b9e6ad8effd3ee7312112a3bbbb4412a9ebf452b3eeaa61dcc3ce657c50cafe3194eb1dcc6fa7649bb
-
Filesize
308KB
MD56b06310a5d21b7ae53fcb98915d11d79
SHA1d41460100d52a6612d4488c487f615593b590958
SHA2568c713c0c0a01d8356cc0fef9549415173e4580093466913cdec4894da524b28e
SHA5125ce8cf71fda3725ef91f799a56a09e721335404fd57edcff8bdba7b9f80832680cfd460e1e0a04572e3f07c53e23230d24809299bd7d2c426b8d57b965319617
-
Filesize
308KB
MD56b06310a5d21b7ae53fcb98915d11d79
SHA1d41460100d52a6612d4488c487f615593b590958
SHA2568c713c0c0a01d8356cc0fef9549415173e4580093466913cdec4894da524b28e
SHA5125ce8cf71fda3725ef91f799a56a09e721335404fd57edcff8bdba7b9f80832680cfd460e1e0a04572e3f07c53e23230d24809299bd7d2c426b8d57b965319617
-
Filesize
366KB
MD5f43071ebeb441cf3ea7488c205db6cfb
SHA1f72ee901aecd3bdea85030ee8ea86b89791620dd
SHA256bf735e435aa88adb0e908ea338e77004ff684ac0490ac2db6968ce1f66e4d8cb
SHA512c854225b16c1556753375501f87ab8bf50e050cc1331522e2120b80e51a83c6bae9451b1a74e988a977bda998f5880ae9771ed8cd61649e4c6b9db4d9773546d
-
Filesize
366KB
MD5f43071ebeb441cf3ea7488c205db6cfb
SHA1f72ee901aecd3bdea85030ee8ea86b89791620dd
SHA256bf735e435aa88adb0e908ea338e77004ff684ac0490ac2db6968ce1f66e4d8cb
SHA512c854225b16c1556753375501f87ab8bf50e050cc1331522e2120b80e51a83c6bae9451b1a74e988a977bda998f5880ae9771ed8cd61649e4c6b9db4d9773546d