Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:19
Static task
static1
Behavioral task
behavioral1
Sample
0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe
Resource
win10v2004-20230220-en
General
-
Target
0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe
-
Size
695KB
-
MD5
4fec67a0f98cb90ab51853978f778f62
-
SHA1
b6b78c15a67814bc5b8040ce958466f270d328ac
-
SHA256
0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c
-
SHA512
6a1bef462db2ff0492f37782388a5da96fdcd7f3dfd6a2621ccdfd3c7a44c07f0727da28829a793c49c070b4d01edf623e757ebd74c1806c67fed5d514b7db2d
-
SSDEEP
12288:gMrVy901WPrpwn79oOakAaq0kpv7/Nbt4PnhzPQs6kIMpvPpD:lym4Kn7jakr2VB4vhzPQsxJHZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8644.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8644.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1124-189-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-190-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-192-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-222-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/1124-1108-0x0000000004DB0000-0x0000000004DC0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un781102.exe 1416 pro8644.exe 1124 qu9560.exe 964 si496493.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8644.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un781102.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un781102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3752 1416 WerFault.exe 86 1116 1124 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1416 pro8644.exe 1416 pro8644.exe 1124 qu9560.exe 1124 qu9560.exe 964 si496493.exe 964 si496493.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1416 pro8644.exe Token: SeDebugPrivilege 1124 qu9560.exe Token: SeDebugPrivilege 964 si496493.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4268 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 85 PID 1128 wrote to memory of 4268 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 85 PID 1128 wrote to memory of 4268 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 85 PID 4268 wrote to memory of 1416 4268 un781102.exe 86 PID 4268 wrote to memory of 1416 4268 un781102.exe 86 PID 4268 wrote to memory of 1416 4268 un781102.exe 86 PID 4268 wrote to memory of 1124 4268 un781102.exe 92 PID 4268 wrote to memory of 1124 4268 un781102.exe 92 PID 4268 wrote to memory of 1124 4268 un781102.exe 92 PID 1128 wrote to memory of 964 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 96 PID 1128 wrote to memory of 964 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 96 PID 1128 wrote to memory of 964 1128 0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe"C:\Users\Admin\AppData\Local\Temp\0d962d1eae4cc61c67997ccff9895d8c64c0d1a16f6cd21a768c8e7b9269661c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781102.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8644.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 10844⤵
- Program crash
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9560.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9560.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 18084⤵
- Program crash
PID:1116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si496493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si496493.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1416 -ip 14161⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1124 -ip 11241⤵PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f948ea9325b9ca94d2785da25a628b4a
SHA1a679275f4450a5014b02bd3e52effcf495c4a488
SHA256ae843e34038f18e133787b4c870ea33b28c5dc89f00b9972f4a95c53161ee9da
SHA5129059ccbb6c22585c622703cf426a75216fb077c50fd0294824ecfe9e556c00ff755198be4c2b8b0a36d560a14d59ba2b5271a9c76b77c1c93bc487395f1d97ab
-
Filesize
175KB
MD5f948ea9325b9ca94d2785da25a628b4a
SHA1a679275f4450a5014b02bd3e52effcf495c4a488
SHA256ae843e34038f18e133787b4c870ea33b28c5dc89f00b9972f4a95c53161ee9da
SHA5129059ccbb6c22585c622703cf426a75216fb077c50fd0294824ecfe9e556c00ff755198be4c2b8b0a36d560a14d59ba2b5271a9c76b77c1c93bc487395f1d97ab
-
Filesize
553KB
MD556bbf06c9618ab173afaa23ff8c4b14a
SHA12965bfa5b70cfbf9192a30aefda482878bc171c7
SHA2563b8f29a9127e5aa8c76f3164166581e4f2c0ac8c757bc9b330367bec0c632a1f
SHA512e4f01c7548bb8781f294b407962b03f5a3cda59deb685366f06523b7a2c94b4dfa7ea13981f3ab52e3e38ac5844efedf622ff81a736783dfb19a065dc8113d64
-
Filesize
553KB
MD556bbf06c9618ab173afaa23ff8c4b14a
SHA12965bfa5b70cfbf9192a30aefda482878bc171c7
SHA2563b8f29a9127e5aa8c76f3164166581e4f2c0ac8c757bc9b330367bec0c632a1f
SHA512e4f01c7548bb8781f294b407962b03f5a3cda59deb685366f06523b7a2c94b4dfa7ea13981f3ab52e3e38ac5844efedf622ff81a736783dfb19a065dc8113d64
-
Filesize
308KB
MD574bc526657e3f04fa1baef1623741256
SHA134bbb0194c4d00eb1faa5bcd67d6014ab864d28d
SHA256287d9cc52d26ada8c3474627a2d1b21ce234425f320b7376ebfbe65cf31ff2df
SHA51281c8112c2ffbecfa567366f8c02d5e907328835c5377fca61e58b58c2af3d5e9ce6b9dc9a2242920bda02ce08de8db438fdfcc5e2f7b8344325015ce64ab034e
-
Filesize
308KB
MD574bc526657e3f04fa1baef1623741256
SHA134bbb0194c4d00eb1faa5bcd67d6014ab864d28d
SHA256287d9cc52d26ada8c3474627a2d1b21ce234425f320b7376ebfbe65cf31ff2df
SHA51281c8112c2ffbecfa567366f8c02d5e907328835c5377fca61e58b58c2af3d5e9ce6b9dc9a2242920bda02ce08de8db438fdfcc5e2f7b8344325015ce64ab034e
-
Filesize
366KB
MD5d60bc5352cbdfa6f2981dbef0861eb8b
SHA1a97b49891e002dac9b1dfc4cb8358938ef659fd6
SHA2567d0169b0f8451f4e601ab388e8614173bdacb9155e67120e81d5a2e3b9872106
SHA512b2af5ee4fae2ce145b431a60a9380ed0300a6b6ff714be5e669d9e5de6aeb921f41411b3b9c3197d29c2f0413f3acaf92ffd096ef7c0b0f84ecd59755549b5c7
-
Filesize
366KB
MD5d60bc5352cbdfa6f2981dbef0861eb8b
SHA1a97b49891e002dac9b1dfc4cb8358938ef659fd6
SHA2567d0169b0f8451f4e601ab388e8614173bdacb9155e67120e81d5a2e3b9872106
SHA512b2af5ee4fae2ce145b431a60a9380ed0300a6b6ff714be5e669d9e5de6aeb921f41411b3b9c3197d29c2f0413f3acaf92ffd096ef7c0b0f84ecd59755549b5c7