Analysis
-
max time kernel
58s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:13
Static task
static1
Behavioral task
behavioral1
Sample
f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe
Resource
win10v2004-20230221-en
General
-
Target
f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe
-
Size
695KB
-
MD5
f0041f0c47fcfcaff1a7a44d37fce285
-
SHA1
7286caa9e648d7a44ad8928b353117d50ff308a6
-
SHA256
f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11
-
SHA512
a6a80019eca42ab04f6dbd29088da63e1e77244e876a2b29bb416fa38b7997752903a7349fa4c9081e128ee90c01420754e1e28a460078780e1c2182836cc1fe
-
SSDEEP
12288:+Mr/y90+ZFA/6WN612cDLApKBMcyAvqQcp717O8QwR3jtVW0nhSeQs6XIVKeS7HS:ZyrFN1j/dBMcy21cvO8zpjtVWKhSeQsh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9919.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3008-192-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-194-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-191-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-196-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-198-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-200-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-202-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-206-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-204-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-208-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-210-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-212-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-214-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-216-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-218-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-220-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-222-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-224-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/3008-1109-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline behavioral1/memory/3008-1111-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1576 un043613.exe 5000 pro9919.exe 3008 qu4750.exe 2404 si543409.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9919.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un043613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un043613.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3620 5000 WerFault.exe 84 3616 3008 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5000 pro9919.exe 5000 pro9919.exe 3008 qu4750.exe 3008 qu4750.exe 2404 si543409.exe 2404 si543409.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5000 pro9919.exe Token: SeDebugPrivilege 3008 qu4750.exe Token: SeDebugPrivilege 2404 si543409.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1576 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 83 PID 2592 wrote to memory of 1576 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 83 PID 2592 wrote to memory of 1576 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 83 PID 1576 wrote to memory of 5000 1576 un043613.exe 84 PID 1576 wrote to memory of 5000 1576 un043613.exe 84 PID 1576 wrote to memory of 5000 1576 un043613.exe 84 PID 1576 wrote to memory of 3008 1576 un043613.exe 90 PID 1576 wrote to memory of 3008 1576 un043613.exe 90 PID 1576 wrote to memory of 3008 1576 un043613.exe 90 PID 2592 wrote to memory of 2404 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 94 PID 2592 wrote to memory of 2404 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 94 PID 2592 wrote to memory of 2404 2592 f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe"C:\Users\Admin\AppData\Local\Temp\f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10844⤵
- Program crash
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 18004⤵
- Program crash
PID:3616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5000 -ip 50001⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3008 -ip 30081⤵PID:2620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD576c5263de4ba8432d2f64e0bef9f31e0
SHA1a046c31d096fa6e9eab4b08b94e17f28cfbf1f05
SHA25600da893f50644c668e8c6865d2f143e5d82fc7725620e22fba217ddd7005419e
SHA5124c12bc481f5771497f6f0ba679fbe6a4659116c7a376124832acbfbe6d5f84375a296f723f6bd88840aba43435bcb9d0d07c1af1f99674088cec5c304605f5d3
-
Filesize
175KB
MD576c5263de4ba8432d2f64e0bef9f31e0
SHA1a046c31d096fa6e9eab4b08b94e17f28cfbf1f05
SHA25600da893f50644c668e8c6865d2f143e5d82fc7725620e22fba217ddd7005419e
SHA5124c12bc481f5771497f6f0ba679fbe6a4659116c7a376124832acbfbe6d5f84375a296f723f6bd88840aba43435bcb9d0d07c1af1f99674088cec5c304605f5d3
-
Filesize
553KB
MD54796318b40a4440f8599dedcd578f1e1
SHA115c4baac529339418153fb0e9dc6515c15142355
SHA2568c2b8cd55174b1805b66e66f221040993b2bb91ade72ce5f34015677a3257d71
SHA5129ba793bb667927471ee43860b9782f701f70ff5c5229263a993cfd4b5da05297edee95c205ac4ed832148027b50e80d748fdc4698ef3a9db1bdcd29bf9652a4d
-
Filesize
553KB
MD54796318b40a4440f8599dedcd578f1e1
SHA115c4baac529339418153fb0e9dc6515c15142355
SHA2568c2b8cd55174b1805b66e66f221040993b2bb91ade72ce5f34015677a3257d71
SHA5129ba793bb667927471ee43860b9782f701f70ff5c5229263a993cfd4b5da05297edee95c205ac4ed832148027b50e80d748fdc4698ef3a9db1bdcd29bf9652a4d
-
Filesize
308KB
MD5871d5c122973d7c555748a8656bb2035
SHA124bdc150e0b5a49842248a9b379f422368428e0b
SHA2565e7547c5ae43ba9dd15b863e6da0d7eb32b6fc542c0c72c2d9d9beebdaa37a00
SHA512becb9ae9502805b1b61f053736ae7384e0732e918dfa10d518d090955dbc54d028d981cf9a8305d864345e5602c1e19ac3966b6fee73bc09489929e4775bca8a
-
Filesize
308KB
MD5871d5c122973d7c555748a8656bb2035
SHA124bdc150e0b5a49842248a9b379f422368428e0b
SHA2565e7547c5ae43ba9dd15b863e6da0d7eb32b6fc542c0c72c2d9d9beebdaa37a00
SHA512becb9ae9502805b1b61f053736ae7384e0732e918dfa10d518d090955dbc54d028d981cf9a8305d864345e5602c1e19ac3966b6fee73bc09489929e4775bca8a
-
Filesize
366KB
MD5fcd113771c683ed2043ff8fa27057708
SHA1bb5362748aafdfef43709844008ab8937ab74fb6
SHA256fad182a47a794c8ea1f3a74b243e334fa9789057dd7d4da471cb29632ea333ee
SHA512b69e2bfd6b2f5d2051048d4a599ebe68504eb6ee0fba4e9ac73a783b6eccc8efea22b8c7c986f40bdf47305ea166a2a32361e540abda627ba78cace80c7221e7
-
Filesize
366KB
MD5fcd113771c683ed2043ff8fa27057708
SHA1bb5362748aafdfef43709844008ab8937ab74fb6
SHA256fad182a47a794c8ea1f3a74b243e334fa9789057dd7d4da471cb29632ea333ee
SHA512b69e2bfd6b2f5d2051048d4a599ebe68504eb6ee0fba4e9ac73a783b6eccc8efea22b8c7c986f40bdf47305ea166a2a32361e540abda627ba78cace80c7221e7