Analysis
-
max time kernel
108s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:22
Static task
static1
Behavioral task
behavioral1
Sample
6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe
Resource
win10v2004-20230220-en
General
-
Target
6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe
-
Size
695KB
-
MD5
18106f6f9675b738b0f539d43a50e88a
-
SHA1
c568a9e7d1c4a1673065a608b0916826abb31ea0
-
SHA256
6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9
-
SHA512
d23b8a6e15cc2e188f24b252e43604f83c5389b919820c277b749ed56fe7488da8a589da3dd6f022a84d85ecbf5b22e0488da2bcbeccf6d7e9db5392ad11b4ef
-
SSDEEP
12288:DMrPy90e0dczDw9nTGQYfaAdqiQqukkdHA0nhwMMeHoQ944gTJXs:YyISvQTG0I5t4gKhwMMeHoug9Xs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5367.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4568-190-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-193-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-195-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-191-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-197-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-199-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-201-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-203-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-205-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-207-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-209-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-211-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-213-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-215-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-217-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-219-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-221-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-223-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/4568-1107-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4004 un153997.exe 3944 pro5367.exe 4568 qu1986.exe 4240 si589798.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5367.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5367.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un153997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un153997.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3332 3944 WerFault.exe 88 3924 4568 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3944 pro5367.exe 3944 pro5367.exe 4568 qu1986.exe 4568 qu1986.exe 4240 si589798.exe 4240 si589798.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3944 pro5367.exe Token: SeDebugPrivilege 4568 qu1986.exe Token: SeDebugPrivilege 4240 si589798.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4004 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 87 PID 2412 wrote to memory of 4004 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 87 PID 2412 wrote to memory of 4004 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 87 PID 4004 wrote to memory of 3944 4004 un153997.exe 88 PID 4004 wrote to memory of 3944 4004 un153997.exe 88 PID 4004 wrote to memory of 3944 4004 un153997.exe 88 PID 4004 wrote to memory of 4568 4004 un153997.exe 97 PID 4004 wrote to memory of 4568 4004 un153997.exe 97 PID 4004 wrote to memory of 4568 4004 un153997.exe 97 PID 2412 wrote to memory of 4240 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 102 PID 2412 wrote to memory of 4240 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 102 PID 2412 wrote to memory of 4240 2412 6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe"C:\Users\Admin\AppData\Local\Temp\6c07f3067dcd840d85095d979c604d32dd8b91208d80ca76ab1c1897d67ae7d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un153997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un153997.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5367.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 10884⤵
- Program crash
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1986.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 11364⤵
- Program crash
PID:3924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si589798.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si589798.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3944 -ip 39441⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4568 -ip 45681⤵PID:2588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c48a16e68e97ae61cc82f31d4b6d52cf
SHA18969252242e34067a9916a745b6ae345c48d3189
SHA256e6b8915422f6a3cf9c3608889242bbc6bba9fb27944c72d1baee5c60514b90c2
SHA512adb800f3f2a2f38cded74bd6212b78dcc3d1935632b76e188b93965058f5799f2e8a9c195bdd784f94860e68e2f78976f8d2e697a588752626646e33625ab4a6
-
Filesize
175KB
MD5c48a16e68e97ae61cc82f31d4b6d52cf
SHA18969252242e34067a9916a745b6ae345c48d3189
SHA256e6b8915422f6a3cf9c3608889242bbc6bba9fb27944c72d1baee5c60514b90c2
SHA512adb800f3f2a2f38cded74bd6212b78dcc3d1935632b76e188b93965058f5799f2e8a9c195bdd784f94860e68e2f78976f8d2e697a588752626646e33625ab4a6
-
Filesize
553KB
MD5f6fee3821009ed71deb9fd32db951a1c
SHA1cd8d9509754b67532d665c4dd2bb3976fb713e62
SHA25621308bab02a4def1086df56822d7bdaf1431d502be39de7c3c695ce8872ac49d
SHA51283224eb2ca1c4b2ccefd277e0c089fea953fc6aa02ceeb18f2149573124e878cbdf648bf79426783f999c870a873404970c9ab144bcb9ae36a44c541b5321dbc
-
Filesize
553KB
MD5f6fee3821009ed71deb9fd32db951a1c
SHA1cd8d9509754b67532d665c4dd2bb3976fb713e62
SHA25621308bab02a4def1086df56822d7bdaf1431d502be39de7c3c695ce8872ac49d
SHA51283224eb2ca1c4b2ccefd277e0c089fea953fc6aa02ceeb18f2149573124e878cbdf648bf79426783f999c870a873404970c9ab144bcb9ae36a44c541b5321dbc
-
Filesize
308KB
MD5295a25dc74d0a64f810b0d87018ddf6a
SHA1f3622376c561bec1a9232d9cd8cfb1805fb96a70
SHA25621d286b2c7e1fcf9deb8f4e29dccde663045af9f448aa9240318fb0fc3a51ce0
SHA512b808b1355d237b58fb208fa2fb7ac0d8cbc53da1b21ebe13d58ff8ac73b966676d608a1fb70bc26ad4433de51b52fe7cbc92dd07176937051a63ad99cfb1601c
-
Filesize
308KB
MD5295a25dc74d0a64f810b0d87018ddf6a
SHA1f3622376c561bec1a9232d9cd8cfb1805fb96a70
SHA25621d286b2c7e1fcf9deb8f4e29dccde663045af9f448aa9240318fb0fc3a51ce0
SHA512b808b1355d237b58fb208fa2fb7ac0d8cbc53da1b21ebe13d58ff8ac73b966676d608a1fb70bc26ad4433de51b52fe7cbc92dd07176937051a63ad99cfb1601c
-
Filesize
366KB
MD59fa845c331db3ce047d16e08470a9695
SHA1c23bc2a666b861f23dfff5cee9e3a016e67b5c19
SHA256492ad48491b88462576b8767f6507f591f59c046912f67a2edbd1558c75b8c85
SHA5129eb887af120d14b7d5d873623ecd9a967633a663a6915e1f7c0cb3ab28b9c325421b680f2f7a22ad1e52c87036b8b360b3d1cf44242e14f65d1462e91eabf87c
-
Filesize
366KB
MD59fa845c331db3ce047d16e08470a9695
SHA1c23bc2a666b861f23dfff5cee9e3a016e67b5c19
SHA256492ad48491b88462576b8767f6507f591f59c046912f67a2edbd1558c75b8c85
SHA5129eb887af120d14b7d5d873623ecd9a967633a663a6915e1f7c0cb3ab28b9c325421b680f2f7a22ad1e52c87036b8b360b3d1cf44242e14f65d1462e91eabf87c