Analysis
-
max time kernel
101s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:27
Static task
static1
Behavioral task
behavioral1
Sample
73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe
Resource
win10v2004-20230221-en
General
-
Target
73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe
-
Size
700KB
-
MD5
ec93561cc0c345861e7797cf1baa6083
-
SHA1
c242984296f154f775913686614a2c9f7eaa7e77
-
SHA256
73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8
-
SHA512
086538f8a577ebf7457f7f4cb3a1bf5dc5ff898e521f6b7d7986a3e5d854caa5ca83e3cc059382d735124221dc2eda3558f6d79ba83ead7ae497c1fd3db15a1b
-
SSDEEP
12288:VMrjy90Q4NUs37OyreDseMbZa9ZPXQ6NwPtNLYoBcphy7pTE:KyLveO1Q9bZavXtNAtljOEq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9733.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9733.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2644-191-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-192-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-194-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-196-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-198-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-200-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-202-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-204-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-206-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-208-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-210-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-212-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-214-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-216-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-218-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-220-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-224-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/2644-222-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4520 un317571.exe 3452 pro9733.exe 2644 qu9996.exe 4496 si103174.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9733.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un317571.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un317571.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4436 3452 WerFault.exe 84 4208 2644 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3452 pro9733.exe 3452 pro9733.exe 2644 qu9996.exe 2644 qu9996.exe 4496 si103174.exe 4496 si103174.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3452 pro9733.exe Token: SeDebugPrivilege 2644 qu9996.exe Token: SeDebugPrivilege 4496 si103174.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4520 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 83 PID 4904 wrote to memory of 4520 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 83 PID 4904 wrote to memory of 4520 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 83 PID 4520 wrote to memory of 3452 4520 un317571.exe 84 PID 4520 wrote to memory of 3452 4520 un317571.exe 84 PID 4520 wrote to memory of 3452 4520 un317571.exe 84 PID 4520 wrote to memory of 2644 4520 un317571.exe 90 PID 4520 wrote to memory of 2644 4520 un317571.exe 90 PID 4520 wrote to memory of 2644 4520 un317571.exe 90 PID 4904 wrote to memory of 4496 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 93 PID 4904 wrote to memory of 4496 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 93 PID 4904 wrote to memory of 4496 4904 73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe"C:\Users\Admin\AppData\Local\Temp\73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 10884⤵
- Program crash
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 14724⤵
- Program crash
PID:4208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3452 -ip 34521⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2644 -ip 26441⤵PID:3400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a33d62efc1c72f7132b5b59c348c96df
SHA1a575ae349549deb2fe57cc479f9fae67bba7428d
SHA256af28c13b5a03e8191baa75b5180b9b227951439ed32dd6f6b9463261fecf3f63
SHA512bf49f777bdefe83d686b9c47da929365a34a814b83602788d59cc556ad0916aed68d6eceab33f1c6887da6bf8e57e05ad054899992131340c87c9ea64b7a14ec
-
Filesize
175KB
MD5a33d62efc1c72f7132b5b59c348c96df
SHA1a575ae349549deb2fe57cc479f9fae67bba7428d
SHA256af28c13b5a03e8191baa75b5180b9b227951439ed32dd6f6b9463261fecf3f63
SHA512bf49f777bdefe83d686b9c47da929365a34a814b83602788d59cc556ad0916aed68d6eceab33f1c6887da6bf8e57e05ad054899992131340c87c9ea64b7a14ec
-
Filesize
558KB
MD56c3f2641ef21136223bbc64cc2b6fd68
SHA1e7d3ce6557e3d4be8f31bd9ab49874943c8ef5a2
SHA256ef6ebd011c09b07c2448144fdb2502d07503feafe436ed24c3aacac4173a1856
SHA51291faa8cba442f9c88274737c2888d1c8f43555239b07ab816b57ca157ea6508dcc6024280c812b020ace900d98f1d66ceb487f00abc8d959fc3d4559d52b8abc
-
Filesize
558KB
MD56c3f2641ef21136223bbc64cc2b6fd68
SHA1e7d3ce6557e3d4be8f31bd9ab49874943c8ef5a2
SHA256ef6ebd011c09b07c2448144fdb2502d07503feafe436ed24c3aacac4173a1856
SHA51291faa8cba442f9c88274737c2888d1c8f43555239b07ab816b57ca157ea6508dcc6024280c812b020ace900d98f1d66ceb487f00abc8d959fc3d4559d52b8abc
-
Filesize
307KB
MD577720d9d9a59a8acc856e01b6603fb9e
SHA115253a30313fdd744c11ac88d8b5b596d7563e9c
SHA256c2c303843488ab98410645a8a04cc99b68f3531d834bf2dbe9988e6e1568faa0
SHA5123be91615cd9b5a73ac7aa7ec0d65425d7acab3d85f932e3142aad374630bb7d6c8f586d794e8cad1eeb494bb77ef5afdba84fa02839e040dbee47cae09902bca
-
Filesize
307KB
MD577720d9d9a59a8acc856e01b6603fb9e
SHA115253a30313fdd744c11ac88d8b5b596d7563e9c
SHA256c2c303843488ab98410645a8a04cc99b68f3531d834bf2dbe9988e6e1568faa0
SHA5123be91615cd9b5a73ac7aa7ec0d65425d7acab3d85f932e3142aad374630bb7d6c8f586d794e8cad1eeb494bb77ef5afdba84fa02839e040dbee47cae09902bca
-
Filesize
366KB
MD58a8fdc8d099f914a779aea8d00645e9a
SHA18fb3e9832b1635f0514366de61fa76ed1203d3f4
SHA256fa8f6873c96573e66d8c71976012fd60e872e60b5b50e12ef432c7e587719a76
SHA512d1bdc5be8f5bed73a336ae8d58e779285a7c15d974021562fba54c45fbcd2874a248999f9f64c7ebad192b909aa027378bf576290e2d1991902ab6cf7d61fc6a
-
Filesize
366KB
MD58a8fdc8d099f914a779aea8d00645e9a
SHA18fb3e9832b1635f0514366de61fa76ed1203d3f4
SHA256fa8f6873c96573e66d8c71976012fd60e872e60b5b50e12ef432c7e587719a76
SHA512d1bdc5be8f5bed73a336ae8d58e779285a7c15d974021562fba54c45fbcd2874a248999f9f64c7ebad192b909aa027378bf576290e2d1991902ab6cf7d61fc6a