Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:26
Static task
static1
Behavioral task
behavioral1
Sample
c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe
Resource
win10v2004-20230220-en
General
-
Target
c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe
-
Size
701KB
-
MD5
dc804ce13da1e6a5a922eaef2812ce1a
-
SHA1
9e9ab4847ee3940c3a284adcd118534483e9930c
-
SHA256
c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3
-
SHA512
d145de6b0d39d6d57a047c170b5d8ae8a6581c96d7a45038fd6e90dab0aabe2aad3bfbb5b62c2e25ba7af2d8be5f228a9fbafe7950efe8e1f0d3d7004b98f544
-
SSDEEP
12288:cMr8y90aee35BS8+0/Jy8yPEGRO37X0KPDmNwPDMLdwV5esC+3J:gypTE8+0Ry89z3wMKNAD26MsC+3J
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9530.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4568-189-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-191-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-188-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-193-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-195-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-197-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-199-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-201-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-203-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-205-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-207-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-209-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-211-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-213-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-215-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-217-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-219-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-221-0x0000000005340000-0x000000000537F000-memory.dmp family_redline behavioral1/memory/4568-532-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3624 un011239.exe 4724 pro9530.exe 4568 qu6980.exe 4408 si037650.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9530.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011239.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011239.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1204 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 860 4724 WerFault.exe 84 1540 4568 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4724 pro9530.exe 4724 pro9530.exe 4568 qu6980.exe 4568 qu6980.exe 4408 si037650.exe 4408 si037650.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4724 pro9530.exe Token: SeDebugPrivilege 4568 qu6980.exe Token: SeDebugPrivilege 4408 si037650.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3624 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 83 PID 3620 wrote to memory of 3624 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 83 PID 3620 wrote to memory of 3624 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 83 PID 3624 wrote to memory of 4724 3624 un011239.exe 84 PID 3624 wrote to memory of 4724 3624 un011239.exe 84 PID 3624 wrote to memory of 4724 3624 un011239.exe 84 PID 3624 wrote to memory of 4568 3624 un011239.exe 90 PID 3624 wrote to memory of 4568 3624 un011239.exe 90 PID 3624 wrote to memory of 4568 3624 un011239.exe 90 PID 3620 wrote to memory of 4408 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 93 PID 3620 wrote to memory of 4408 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 93 PID 3620 wrote to memory of 4408 3620 c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe"C:\Users\Admin\AppData\Local\Temp\c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 10804⤵
- Program crash
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 13404⤵
- Program crash
PID:1540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4724 -ip 47241⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4568 -ip 45681⤵PID:1552
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f78c458872802f1813096100c5a1ff78
SHA182efbcdc2eff26d84292d50951da70c98f3784ce
SHA256cef1b94138444dbe0c374bf5b989b37fb8c7ed2dc40222ab5168c6678a76ac64
SHA512599917b19f81fbee6d6887453ed08a9588a197d9cc4724c83913d44f535a6c9cdd4c55af5372e3c84441abd179ffb5bf2e42ff915f88fcc38dc95495ae0c65e6
-
Filesize
175KB
MD5f78c458872802f1813096100c5a1ff78
SHA182efbcdc2eff26d84292d50951da70c98f3784ce
SHA256cef1b94138444dbe0c374bf5b989b37fb8c7ed2dc40222ab5168c6678a76ac64
SHA512599917b19f81fbee6d6887453ed08a9588a197d9cc4724c83913d44f535a6c9cdd4c55af5372e3c84441abd179ffb5bf2e42ff915f88fcc38dc95495ae0c65e6
-
Filesize
558KB
MD5497b5ed9655a5558b5d10249a0d6bd08
SHA14cec68727ffea90d59ca4a6cd29f5a67b12bc8c2
SHA2566921fc773a20129d333030a32f38008c69ba4b7a0da764639a7c6e246f1c6331
SHA5127ed38bb9aa3a2e9df5e62cee60fa8fc0031b27f52b80116971545e42aa355c8b28eeffcaf1546394349d828c39ccc1b7303ec1c7df6ea9dc735210b912bc056c
-
Filesize
558KB
MD5497b5ed9655a5558b5d10249a0d6bd08
SHA14cec68727ffea90d59ca4a6cd29f5a67b12bc8c2
SHA2566921fc773a20129d333030a32f38008c69ba4b7a0da764639a7c6e246f1c6331
SHA5127ed38bb9aa3a2e9df5e62cee60fa8fc0031b27f52b80116971545e42aa355c8b28eeffcaf1546394349d828c39ccc1b7303ec1c7df6ea9dc735210b912bc056c
-
Filesize
307KB
MD58aa8b26bedd6d58312f45cbf4ecb6f41
SHA121bbf9d935fe97e0a4786290121ee2a1d65b96a2
SHA25629a8ed3adb64b1a25493dce078f45b7d25705c97e950008d4bb3c6162ce5cd5e
SHA512f4de2aa80252c63d1a4f58b16267a144d8739bcbcd232b6690d6d196ec2b9598c030f16af08d5a4fc1cc5af35b0a0338167989caafc903c6ea1ad59ac335f260
-
Filesize
307KB
MD58aa8b26bedd6d58312f45cbf4ecb6f41
SHA121bbf9d935fe97e0a4786290121ee2a1d65b96a2
SHA25629a8ed3adb64b1a25493dce078f45b7d25705c97e950008d4bb3c6162ce5cd5e
SHA512f4de2aa80252c63d1a4f58b16267a144d8739bcbcd232b6690d6d196ec2b9598c030f16af08d5a4fc1cc5af35b0a0338167989caafc903c6ea1ad59ac335f260
-
Filesize
366KB
MD5a913dd33dfce64bd64da72290334468c
SHA19be76bbec39baa4e01aed1dd6247a0494ad1b300
SHA2562c04eba15b1f0ebe77b52d3c4dacbec04452f9f700ffcaefac016a837baa4244
SHA512876a5503583f93560ca06446056ed2106f307718f517ab27f1c124320d78bd552325a5e7e2edae09f9a7e98daac57ffdb35a034d74032223d55a8a27dd84951c
-
Filesize
366KB
MD5a913dd33dfce64bd64da72290334468c
SHA19be76bbec39baa4e01aed1dd6247a0494ad1b300
SHA2562c04eba15b1f0ebe77b52d3c4dacbec04452f9f700ffcaefac016a837baa4244
SHA512876a5503583f93560ca06446056ed2106f307718f517ab27f1c124320d78bd552325a5e7e2edae09f9a7e98daac57ffdb35a034d74032223d55a8a27dd84951c