Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:03
Static task
static1
Behavioral task
behavioral1
Sample
682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe
Resource
win10v2004-20230220-en
General
-
Target
682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe
-
Size
695KB
-
MD5
09b3609a28804a88d3c1cf733b61326c
-
SHA1
191d3f5a0d82bc52e722708749322af2567257a6
-
SHA256
682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499
-
SHA512
398e0d0c2eb61c81ad091c9215e4c984e6a7d8057642f2d5a9d877ecb11ea68195413c95ba3cf07880cf5e119d3a3eaa07ed17b23956f27626d397f4b1282949
-
SSDEEP
12288:vMrXy90dqYWr/kMImRbt19BaI0ARqUxyj+u8SBE2Xk4h1T1ePnhaSMeBk8gmqwM:wyPdIMIm319I0kj98SfXz1BevhaSxkeG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1060.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1060.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3732-191-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-192-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-194-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-196-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-198-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-200-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-202-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-204-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-206-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-208-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-210-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-212-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-214-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-216-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-218-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-220-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-222-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline behavioral1/memory/3732-224-0x00000000052E0000-0x000000000531F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2108 un804061.exe 3284 pro1060.exe 3732 qu3827.exe 2456 si292709.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1060.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un804061.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un804061.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1720 3284 WerFault.exe 84 3028 3732 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3284 pro1060.exe 3284 pro1060.exe 3732 qu3827.exe 3732 qu3827.exe 2456 si292709.exe 2456 si292709.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3284 pro1060.exe Token: SeDebugPrivilege 3732 qu3827.exe Token: SeDebugPrivilege 2456 si292709.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2108 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 83 PID 1456 wrote to memory of 2108 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 83 PID 1456 wrote to memory of 2108 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 83 PID 2108 wrote to memory of 3284 2108 un804061.exe 84 PID 2108 wrote to memory of 3284 2108 un804061.exe 84 PID 2108 wrote to memory of 3284 2108 un804061.exe 84 PID 2108 wrote to memory of 3732 2108 un804061.exe 93 PID 2108 wrote to memory of 3732 2108 un804061.exe 93 PID 2108 wrote to memory of 3732 2108 un804061.exe 93 PID 1456 wrote to memory of 2456 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 98 PID 1456 wrote to memory of 2456 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 98 PID 1456 wrote to memory of 2456 1456 682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe"C:\Users\Admin\AppData\Local\Temp\682adcc1e286e9740296e75d75a943ec8384ae249dbb65d56cda53fc18c27499.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un804061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un804061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1060.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 10844⤵
- Program crash
PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3827.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 19844⤵
- Program crash
PID:3028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si292709.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si292709.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3284 -ip 32841⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3732 -ip 37321⤵PID:4272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d2ea3dcca9392872947dbf9f866cb67e
SHA1893fd9cf019a9121f68cc3949356c7bc491ec19a
SHA2567954fb6fcb38c90e7bbf302491cdbc23c180c4dc3ed7ee8af555d4221ab53070
SHA5122d4bd4c72dd5368ff95ee6cded81c3f4bd1edeb64ad8804b9286cd9afb78d25b37353aecdac4ae823f8d3c5c825323916e7a5344e67121620f3083bb3780b2cf
-
Filesize
175KB
MD5d2ea3dcca9392872947dbf9f866cb67e
SHA1893fd9cf019a9121f68cc3949356c7bc491ec19a
SHA2567954fb6fcb38c90e7bbf302491cdbc23c180c4dc3ed7ee8af555d4221ab53070
SHA5122d4bd4c72dd5368ff95ee6cded81c3f4bd1edeb64ad8804b9286cd9afb78d25b37353aecdac4ae823f8d3c5c825323916e7a5344e67121620f3083bb3780b2cf
-
Filesize
553KB
MD580d58695c167e7111a0cab0379be79df
SHA11451167873e40fe1b962efa338f2678ade8fe770
SHA256c6a434633460bc3070446a74a447cdf0843d9b6323ab39a27b04f95bff120c09
SHA512e6561db7e85bbe4cf197cbea0555d541ac154b8b037f5a672244af0dfe5003313d69a2684d0eb47dc0b39f2560efd1e0039d0f09a89a871ac8ecc524440de6b8
-
Filesize
553KB
MD580d58695c167e7111a0cab0379be79df
SHA11451167873e40fe1b962efa338f2678ade8fe770
SHA256c6a434633460bc3070446a74a447cdf0843d9b6323ab39a27b04f95bff120c09
SHA512e6561db7e85bbe4cf197cbea0555d541ac154b8b037f5a672244af0dfe5003313d69a2684d0eb47dc0b39f2560efd1e0039d0f09a89a871ac8ecc524440de6b8
-
Filesize
308KB
MD598ea7bd13e2fc9f675922c4ce9503f0e
SHA103e7237cd35a071b8e532672aab4ad21cc247f3f
SHA25611658815f12a4b65d8d72a264d5a5de851bef488c006a0a9fe2f8435859e0b20
SHA512feea5718919fb7ae3dc79bf98e3f220297e0ad7fdb9e45d5ccb01a04cfaa36423d958811adce8db73c95544c5879f5bd9f98bf498f70b996988d1387e19b3857
-
Filesize
308KB
MD598ea7bd13e2fc9f675922c4ce9503f0e
SHA103e7237cd35a071b8e532672aab4ad21cc247f3f
SHA25611658815f12a4b65d8d72a264d5a5de851bef488c006a0a9fe2f8435859e0b20
SHA512feea5718919fb7ae3dc79bf98e3f220297e0ad7fdb9e45d5ccb01a04cfaa36423d958811adce8db73c95544c5879f5bd9f98bf498f70b996988d1387e19b3857
-
Filesize
366KB
MD54209e4e781993e4c7126c3c00052c604
SHA1954b1d8b4a9565ceca7d66e25a3b5badee629497
SHA25600ffa0b0154922c546364d119fc1eb795324d99c13d00c7bc897d40af497f3c3
SHA51297fba78d46569749beb3881d3d91b9771f8943b81bb2b1bbe33d1c9efa2d1e7ed8061320eaec922b118865de3bd122fd3caf3c635f5288964912a30eb8a98dfb
-
Filesize
366KB
MD54209e4e781993e4c7126c3c00052c604
SHA1954b1d8b4a9565ceca7d66e25a3b5badee629497
SHA25600ffa0b0154922c546364d119fc1eb795324d99c13d00c7bc897d40af497f3c3
SHA51297fba78d46569749beb3881d3d91b9771f8943b81bb2b1bbe33d1c9efa2d1e7ed8061320eaec922b118865de3bd122fd3caf3c635f5288964912a30eb8a98dfb