Analysis
-
max time kernel
80s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:16
Static task
static1
Behavioral task
behavioral1
Sample
cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe
Resource
win10v2004-20230221-en
General
-
Target
cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe
-
Size
696KB
-
MD5
e288231352766ba55eb8e2517a0a773b
-
SHA1
6f0346fdd7cb930992b2531d7f33d7de54fc5813
-
SHA256
cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f
-
SHA512
7dffa0d7756e86bc4a8c6bb106306df2c29d3702f7a0de99794bec18fefdc22451993d5d80d1e3336cc1eb9bc431eb94a79d944608e1e98c83fb7dc0071d7428
-
SSDEEP
12288:AMrry90VOSFgR63R9Ei+pGTVXhXuuleu/vtKLz3sWtnhATQs6cIjn0NUo:7yXW/Ei+peXhXuulR/vtyT1hATQshi0t
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6972.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/752-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-192-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-222-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/752-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3004 un436562.exe 496 pro6972.exe 752 qu5749.exe 4844 si280730.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6972.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6972.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un436562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un436562.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3156 496 WerFault.exe 86 4708 752 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 496 pro6972.exe 496 pro6972.exe 752 qu5749.exe 752 qu5749.exe 4844 si280730.exe 4844 si280730.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 496 pro6972.exe Token: SeDebugPrivilege 752 qu5749.exe Token: SeDebugPrivilege 4844 si280730.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3004 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 85 PID 4124 wrote to memory of 3004 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 85 PID 4124 wrote to memory of 3004 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 85 PID 3004 wrote to memory of 496 3004 un436562.exe 86 PID 3004 wrote to memory of 496 3004 un436562.exe 86 PID 3004 wrote to memory of 496 3004 un436562.exe 86 PID 3004 wrote to memory of 752 3004 un436562.exe 95 PID 3004 wrote to memory of 752 3004 un436562.exe 95 PID 3004 wrote to memory of 752 3004 un436562.exe 95 PID 4124 wrote to memory of 4844 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 100 PID 4124 wrote to memory of 4844 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 100 PID 4124 wrote to memory of 4844 4124 cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe"C:\Users\Admin\AppData\Local\Temp\cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 10844⤵
- Program crash
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 18404⤵
- Program crash
PID:4708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 496 -ip 4961⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 752 -ip 7521⤵PID:460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56039dbb96837529f412a1eacc9a26ce3
SHA15028798c33f3b42372c34c689eb36e98cac146f8
SHA256d18bb71d4adac8bd5a539dff69629be576f916fba3ab0a3dc5edf9fc1fee2108
SHA512f6a70279aafb2f81b97cd31b2df9f6644c604c837a6c712a85b3a46b43bcc4d4a82abf2d162f6ee1bf6e92084082fa09e93cccaba6c28de6de631301ec6fb52a
-
Filesize
175KB
MD56039dbb96837529f412a1eacc9a26ce3
SHA15028798c33f3b42372c34c689eb36e98cac146f8
SHA256d18bb71d4adac8bd5a539dff69629be576f916fba3ab0a3dc5edf9fc1fee2108
SHA512f6a70279aafb2f81b97cd31b2df9f6644c604c837a6c712a85b3a46b43bcc4d4a82abf2d162f6ee1bf6e92084082fa09e93cccaba6c28de6de631301ec6fb52a
-
Filesize
553KB
MD5d5488f997fbbb57cd0ed87ec7dc748ed
SHA14b2e17e49202a7298d1d2a56ddcfe8775ece6f64
SHA256b976e94b4d396d9d7def1f88ec9f70238b0e3a838789e279886d0a6731b40a2d
SHA512b9bdd584a99357d15e8883929d509c39ed0a958c1a7d0bf5989bcb32d5daeca92c683e363cc26e2da1b4c534bf9b6bc97866f5a87ab20d2c535c7bbf87f51215
-
Filesize
553KB
MD5d5488f997fbbb57cd0ed87ec7dc748ed
SHA14b2e17e49202a7298d1d2a56ddcfe8775ece6f64
SHA256b976e94b4d396d9d7def1f88ec9f70238b0e3a838789e279886d0a6731b40a2d
SHA512b9bdd584a99357d15e8883929d509c39ed0a958c1a7d0bf5989bcb32d5daeca92c683e363cc26e2da1b4c534bf9b6bc97866f5a87ab20d2c535c7bbf87f51215
-
Filesize
308KB
MD5dc1bfe7e1f20b4f23a4ce1561838e703
SHA14d924b085df716509d66af328d5e350d992704a3
SHA25644d3e344fb5b8ffbf9d1e8a9b2caced8263434e4a8d1c86a76709f97a4a5a4dc
SHA5123aaf17d0b80dc608ceffccb55a12dca60106375845ebb3878349bf0f9edd3aa2c86363501478cbad18a8537847c073d51cb2cac01cabec555dbd092671b8a885
-
Filesize
308KB
MD5dc1bfe7e1f20b4f23a4ce1561838e703
SHA14d924b085df716509d66af328d5e350d992704a3
SHA25644d3e344fb5b8ffbf9d1e8a9b2caced8263434e4a8d1c86a76709f97a4a5a4dc
SHA5123aaf17d0b80dc608ceffccb55a12dca60106375845ebb3878349bf0f9edd3aa2c86363501478cbad18a8537847c073d51cb2cac01cabec555dbd092671b8a885
-
Filesize
366KB
MD5b145f03e41178d2cd2e0f553387fdf6c
SHA190eaee62904a8009935b3b66921edde862333e54
SHA2565f00901d1ad7e47b899ea8a302faca8319744fc80d1fdd706488375598ff0e74
SHA5120b93740f475cd7f0b6f123fbf5568aa4b79e70756b0e123c90f6418d7d0562aa27c45903e41bc912a4906d418b4ea7b2e656e09e03c9e11ae9daa76ff8d7ff89
-
Filesize
366KB
MD5b145f03e41178d2cd2e0f553387fdf6c
SHA190eaee62904a8009935b3b66921edde862333e54
SHA2565f00901d1ad7e47b899ea8a302faca8319744fc80d1fdd706488375598ff0e74
SHA5120b93740f475cd7f0b6f123fbf5568aa4b79e70756b0e123c90f6418d7d0562aa27c45903e41bc912a4906d418b4ea7b2e656e09e03c9e11ae9daa76ff8d7ff89