Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:26
Static task
static1
Behavioral task
behavioral1
Sample
75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe
Resource
win10v2004-20230221-en
General
-
Target
75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe
-
Size
694KB
-
MD5
5913a0b837ea391257b56edf14c756c1
-
SHA1
4c277880ddf480f750c2d81fbe2a1623273cdb2a
-
SHA256
75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85
-
SHA512
b4529df29213a04f6f95495c072e296600e86e90f44495be1adfe3b99b8747f6079aec107a8bc89348ec73f6e5d2e2bb87509c63baf091412af99192631e3e65
-
SSDEEP
12288:TMrjy90DIUNlF3JeMjOAsqqzDrRjxvEkpPiDjnhUtQs66I/DrEM49BWEn:cyUIUNP3Ni9tXRjmkpPivhUtQszQCWEn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0963.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4368-191-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-190-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-193-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-195-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-197-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-199-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-201-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-203-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-205-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-207-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-209-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-211-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-213-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-215-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-217-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-219-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-221-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-223-0x0000000002780000-0x00000000027BF000-memory.dmp family_redline behavioral1/memory/4368-1108-0x0000000002770000-0x0000000002780000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2652 un380169.exe 2988 pro0963.exe 4368 qu4114.exe 1628 si109854.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0963.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un380169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un380169.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1504 2988 WerFault.exe 85 4804 4368 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 pro0963.exe 2988 pro0963.exe 4368 qu4114.exe 4368 qu4114.exe 1628 si109854.exe 1628 si109854.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 pro0963.exe Token: SeDebugPrivilege 4368 qu4114.exe Token: SeDebugPrivilege 1628 si109854.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 2652 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 84 PID 956 wrote to memory of 2652 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 84 PID 956 wrote to memory of 2652 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 84 PID 2652 wrote to memory of 2988 2652 un380169.exe 85 PID 2652 wrote to memory of 2988 2652 un380169.exe 85 PID 2652 wrote to memory of 2988 2652 un380169.exe 85 PID 2652 wrote to memory of 4368 2652 un380169.exe 93 PID 2652 wrote to memory of 4368 2652 un380169.exe 93 PID 2652 wrote to memory of 4368 2652 un380169.exe 93 PID 956 wrote to memory of 1628 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 98 PID 956 wrote to memory of 1628 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 98 PID 956 wrote to memory of 1628 956 75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe"C:\Users\Admin\AppData\Local\Temp\75f0077f795516ce0d8be655dee368cab2159a2baefa2f7509ef9c347e5f5a85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un380169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un380169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0963.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 10844⤵
- Program crash
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 19004⤵
- Program crash
PID:4804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si109854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si109854.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2988 -ip 29881⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4368 -ip 43681⤵PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54888ec7e5abb1f874dccb95071e1af8b
SHA1fb6bbb63c5d250657459aabd636f4de8660044b9
SHA2560617f2ce6c6a5868731ccb7a560ad508bad1090505d1441d3ebb332b093ea401
SHA512551df0c36aed1a441686660fdf28fbc4e9d01411c071befbd7a8f3f8cbbe72c19e415b2581d533536d21b84da00c371933740003689db406595f8a956ab177bb
-
Filesize
175KB
MD54888ec7e5abb1f874dccb95071e1af8b
SHA1fb6bbb63c5d250657459aabd636f4de8660044b9
SHA2560617f2ce6c6a5868731ccb7a560ad508bad1090505d1441d3ebb332b093ea401
SHA512551df0c36aed1a441686660fdf28fbc4e9d01411c071befbd7a8f3f8cbbe72c19e415b2581d533536d21b84da00c371933740003689db406595f8a956ab177bb
-
Filesize
553KB
MD5d23d2a9ae02c3232171cf3d412022d7a
SHA155807b79ae7d20d07ddd2260985ba85a7ae0c373
SHA256a82d8766b6dc3eb332c4ff5888c27fca4ab57ac7e98bd02872d99b048deebdc5
SHA51217f81bb40e47dd7e77f33a56b62d70546b632e6730eb40794177b059f69f5943901ae00561d6f676033bde62d25185498fd5f27b80f4db67bef6da330b3c3dc6
-
Filesize
553KB
MD5d23d2a9ae02c3232171cf3d412022d7a
SHA155807b79ae7d20d07ddd2260985ba85a7ae0c373
SHA256a82d8766b6dc3eb332c4ff5888c27fca4ab57ac7e98bd02872d99b048deebdc5
SHA51217f81bb40e47dd7e77f33a56b62d70546b632e6730eb40794177b059f69f5943901ae00561d6f676033bde62d25185498fd5f27b80f4db67bef6da330b3c3dc6
-
Filesize
308KB
MD5b97555ff56729a097d11fd6cfd69013e
SHA1b5c5d396f3d79e4b1867b0d27b1070810fc965c3
SHA256c5e82c0bf2160732d7e3a9cc72f9438056d05fd4eabc2bf731eb8683cb7e2a3c
SHA51207e6bc38cf3b02a85e536b26259ad592988c15ede371fa58e9a1f5e023c5949b9c5086fcaf919c912af3321ee342ff6ae2bdf9925d429a7d0fa34da27c3eced5
-
Filesize
308KB
MD5b97555ff56729a097d11fd6cfd69013e
SHA1b5c5d396f3d79e4b1867b0d27b1070810fc965c3
SHA256c5e82c0bf2160732d7e3a9cc72f9438056d05fd4eabc2bf731eb8683cb7e2a3c
SHA51207e6bc38cf3b02a85e536b26259ad592988c15ede371fa58e9a1f5e023c5949b9c5086fcaf919c912af3321ee342ff6ae2bdf9925d429a7d0fa34da27c3eced5
-
Filesize
366KB
MD55179d1b2b1f66c68736aa358e7343a76
SHA18c824ee793ccf24f58e8540bdf645bb80e719b03
SHA2566d51ecbe3015b37fcd31839484945bf199eebac90b5ef4e6a70311d6fe962697
SHA512dbdf3283c1364d66c1cb5eca08262815ee7fa05b97baa5187734aed1c1a685206d4b93d1083e319a9f5620aba0916931f17713858115168ce8039fbeea4c503c
-
Filesize
366KB
MD55179d1b2b1f66c68736aa358e7343a76
SHA18c824ee793ccf24f58e8540bdf645bb80e719b03
SHA2566d51ecbe3015b37fcd31839484945bf199eebac90b5ef4e6a70311d6fe962697
SHA512dbdf3283c1364d66c1cb5eca08262815ee7fa05b97baa5187734aed1c1a685206d4b93d1083e319a9f5620aba0916931f17713858115168ce8039fbeea4c503c