Analysis
-
max time kernel
82s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:29
Static task
static1
Behavioral task
behavioral1
Sample
303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe
Resource
win10v2004-20230220-en
General
-
Target
303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe
-
Size
700KB
-
MD5
47db839edd9c5c1e53d4102c76f96b80
-
SHA1
9473027d827e5f81922a7230047693a503557114
-
SHA256
303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd
-
SHA512
3e3e3ade00dab07d9dfe6b035378d0e6f68463cb8342aca65700ceec5af615128ae2932954e914fc7c8ad4da1e5da25c85d1061ef81980f102bdf0900122e2c6
-
SSDEEP
12288:yMrFy90EnOgCiAJy5H8qr96jWAPMLYhxX5MqvAio8rMuNwP2vLDPWZRiw:/yUJJ/mqwKX5MqIwrMuNA2D4sw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4994.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2792-190-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-193-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-191-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-197-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-200-0x0000000002A70000-0x0000000002A80000-memory.dmp family_redline behavioral1/memory/2792-201-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-203-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-205-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-207-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-209-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-211-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-215-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-217-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-213-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-219-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-221-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-223-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-225-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline behavioral1/memory/2792-227-0x00000000029A0000-0x00000000029DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3160 un312906.exe 1772 pro4994.exe 2792 qu8157.exe 4820 si387461.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4994.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un312906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un312906.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4264 1772 WerFault.exe 86 4100 2792 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1772 pro4994.exe 1772 pro4994.exe 2792 qu8157.exe 2792 qu8157.exe 4820 si387461.exe 4820 si387461.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1772 pro4994.exe Token: SeDebugPrivilege 2792 qu8157.exe Token: SeDebugPrivilege 4820 si387461.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1700 wrote to memory of 3160 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 85 PID 1700 wrote to memory of 3160 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 85 PID 1700 wrote to memory of 3160 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 85 PID 3160 wrote to memory of 1772 3160 un312906.exe 86 PID 3160 wrote to memory of 1772 3160 un312906.exe 86 PID 3160 wrote to memory of 1772 3160 un312906.exe 86 PID 3160 wrote to memory of 2792 3160 un312906.exe 93 PID 3160 wrote to memory of 2792 3160 un312906.exe 93 PID 3160 wrote to memory of 2792 3160 un312906.exe 93 PID 1700 wrote to memory of 4820 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 100 PID 1700 wrote to memory of 4820 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 100 PID 1700 wrote to memory of 4820 1700 303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe"C:\Users\Admin\AppData\Local\Temp\303d536e87936354e87ca2f8599428fd84aae43879ef54f5a1c99376b7a609dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un312906.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un312906.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4994.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 10804⤵
- Program crash
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8157.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 18084⤵
- Program crash
PID:4100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si387461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si387461.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1772 -ip 17721⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2792 -ip 27921⤵PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50b6f242a39067ae095616614d6e5a2cf
SHA1a2ce971885f1bd2cdf6c92aa7315605464d29a84
SHA256a6a15687c84005a920ee269eb28e6b0fea1348a93fdb0368e3552732101117e0
SHA51265da8847e829c61fdb140c0b441abf2d3ff8584339d4bf8e3a99f4283243d20fcd7f03de666218182686f38b07c8977193d1e10a80e1ff83b6d9b358efd786ee
-
Filesize
175KB
MD50b6f242a39067ae095616614d6e5a2cf
SHA1a2ce971885f1bd2cdf6c92aa7315605464d29a84
SHA256a6a15687c84005a920ee269eb28e6b0fea1348a93fdb0368e3552732101117e0
SHA51265da8847e829c61fdb140c0b441abf2d3ff8584339d4bf8e3a99f4283243d20fcd7f03de666218182686f38b07c8977193d1e10a80e1ff83b6d9b358efd786ee
-
Filesize
557KB
MD59c33498828379ceb2b9d114f769f8b35
SHA11fcd6ed2042fab2bb66138452dbec8e3be874e00
SHA25646663db020e2630c0ede3ec82b0db824a7ea5d980556eba56547aa30fba2740e
SHA51262d00f0d97c5ce6b65d48120ac39f9b48b83f4f5b1e3a623e044f2e147751b7d43b3173567b8526fdcd00d6570842d701bf3406f8fd56617c0aad0f56f98f7e4
-
Filesize
557KB
MD59c33498828379ceb2b9d114f769f8b35
SHA11fcd6ed2042fab2bb66138452dbec8e3be874e00
SHA25646663db020e2630c0ede3ec82b0db824a7ea5d980556eba56547aa30fba2740e
SHA51262d00f0d97c5ce6b65d48120ac39f9b48b83f4f5b1e3a623e044f2e147751b7d43b3173567b8526fdcd00d6570842d701bf3406f8fd56617c0aad0f56f98f7e4
-
Filesize
307KB
MD54140e0d33f1b5ace05d37879b393d554
SHA16c08023c588c96f5536a3059270781a40efbcf98
SHA25608e9316a1fd6d05f646502335ac46dbcd9652f7e3a84133dbb4bc511e0e45ffd
SHA51224835d0ea8b80b4b6c6cb8504b96b3cb97d98caf4a3f699584713823a548ba7be50716a1ae6e2db8a8e4bbe25e1f57f1b5b90ec494d0a61368f980d8e3311047
-
Filesize
307KB
MD54140e0d33f1b5ace05d37879b393d554
SHA16c08023c588c96f5536a3059270781a40efbcf98
SHA25608e9316a1fd6d05f646502335ac46dbcd9652f7e3a84133dbb4bc511e0e45ffd
SHA51224835d0ea8b80b4b6c6cb8504b96b3cb97d98caf4a3f699584713823a548ba7be50716a1ae6e2db8a8e4bbe25e1f57f1b5b90ec494d0a61368f980d8e3311047
-
Filesize
366KB
MD5fb6f9b4f29305e38d14aecdbed519500
SHA1c1cc139417a83e80a1199437dafc0ec32260fca8
SHA2566e6300db40ed633b634d4ab9266271abb853c9451c7c2badd2ad7b792810098b
SHA512bded25bcfae86cc60c54c46cf7d8ce5f95c834e619261c776e43bb7dc271e70fc55ad055e39f9358dd0158ed23cfc7478369a401af9e8b3f44e03d2bd03d54c7
-
Filesize
366KB
MD5fb6f9b4f29305e38d14aecdbed519500
SHA1c1cc139417a83e80a1199437dafc0ec32260fca8
SHA2566e6300db40ed633b634d4ab9266271abb853c9451c7c2badd2ad7b792810098b
SHA512bded25bcfae86cc60c54c46cf7d8ce5f95c834e619261c776e43bb7dc271e70fc55ad055e39f9358dd0158ed23cfc7478369a401af9e8b3f44e03d2bd03d54c7