Analysis
-
max time kernel
97s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:31
Static task
static1
Behavioral task
behavioral1
Sample
c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe
Resource
win10v2004-20230220-en
General
-
Target
c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe
-
Size
700KB
-
MD5
71e6baafabcca6cb031ceb3a32101457
-
SHA1
b1912c8daabe9b59481ea26fe415002ab86a7a8c
-
SHA256
c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f
-
SHA512
e58ebabe335ed8b3f7ed4b0f5e78a2811bcd390513cdf262733fff880c1861e708ffed2d1e1f9a23138db612e99eaa9ca478c2efffb57b1c08f9e38b0427ea7e
-
SSDEEP
12288:BMrsy90TyRVjvzf2YMBjef1+LU0muHmbZQoRIisiFNwPViLRiXdddscr:dygUjvZM0+LNmBZQcNAVYORr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0190.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5084-189-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-190-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-192-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-194-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-196-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-200-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-198-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-202-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-204-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-206-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-208-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-210-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-212-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-214-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-216-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-218-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-220-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-222-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/5084-393-0x00000000009E0000-0x00000000009F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3208 un598958.exe 1236 pro0190.exe 5084 qu0590.exe 640 si684552.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0190.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0190.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un598958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un598958.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3612 1236 WerFault.exe 86 1312 5084 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1236 pro0190.exe 1236 pro0190.exe 5084 qu0590.exe 5084 qu0590.exe 640 si684552.exe 640 si684552.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1236 pro0190.exe Token: SeDebugPrivilege 5084 qu0590.exe Token: SeDebugPrivilege 640 si684552.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3208 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 85 PID 1952 wrote to memory of 3208 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 85 PID 1952 wrote to memory of 3208 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 85 PID 3208 wrote to memory of 1236 3208 un598958.exe 86 PID 3208 wrote to memory of 1236 3208 un598958.exe 86 PID 3208 wrote to memory of 1236 3208 un598958.exe 86 PID 3208 wrote to memory of 5084 3208 un598958.exe 89 PID 3208 wrote to memory of 5084 3208 un598958.exe 89 PID 3208 wrote to memory of 5084 3208 un598958.exe 89 PID 1952 wrote to memory of 640 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 93 PID 1952 wrote to memory of 640 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 93 PID 1952 wrote to memory of 640 1952 c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe"C:\Users\Admin\AppData\Local\Temp\c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 10844⤵
- Program crash
PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 13404⤵
- Program crash
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1236 -ip 12361⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5084 -ip 50841⤵PID:4632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54d5f0227cd19b70d90526b0640447093
SHA1c73e52cd3641e699b96ee3f204c5470663b9b604
SHA256aee2f6a64a3e266a7ce8f6e67d180e70d9e1e1f21af8be325e70d3a6b525c711
SHA512fa08601829fbaac8345b5c5a31d0c995467a2423fbf031702442abbf9707540a2f0d2ac950c414393ec720274d282b7aaf1e49e8c8bcade6e7ceee4cab17ba01
-
Filesize
175KB
MD54d5f0227cd19b70d90526b0640447093
SHA1c73e52cd3641e699b96ee3f204c5470663b9b604
SHA256aee2f6a64a3e266a7ce8f6e67d180e70d9e1e1f21af8be325e70d3a6b525c711
SHA512fa08601829fbaac8345b5c5a31d0c995467a2423fbf031702442abbf9707540a2f0d2ac950c414393ec720274d282b7aaf1e49e8c8bcade6e7ceee4cab17ba01
-
Filesize
558KB
MD5d5e05c617e11ad77e5d6648a992367dd
SHA1e742e89aa6dcef2c531c89050ce10e740d9320eb
SHA25601cb8dc9cc0d187bdebf649ad32eb74f580a8ff86520ac9ed5fe11b680eabdee
SHA512c0c89a83f897a4b1ab3ccf0f31c657c024b6166a74fdfb620ad3fef7b57b4552b8950a0a469f9a84648735b88da438327474defc05625d439388fb841bcf4d8a
-
Filesize
558KB
MD5d5e05c617e11ad77e5d6648a992367dd
SHA1e742e89aa6dcef2c531c89050ce10e740d9320eb
SHA25601cb8dc9cc0d187bdebf649ad32eb74f580a8ff86520ac9ed5fe11b680eabdee
SHA512c0c89a83f897a4b1ab3ccf0f31c657c024b6166a74fdfb620ad3fef7b57b4552b8950a0a469f9a84648735b88da438327474defc05625d439388fb841bcf4d8a
-
Filesize
307KB
MD517457efbbff46ae20e6315f43df21927
SHA14cf9b4dbcf74bc1938906cc5843269e36fe4872a
SHA2564f146daa05d9d1ce9a0551eaa4e5c51bace9d8fabe23d8af57bdd528ee1e3a6a
SHA5128c818d173b381425337a9dc568ff4781a70c04c2ff83583f50ab5cab582ba6479a657a1387e6b4ec2cd9f6e2fe804055113ca4410912c1829551f8c45b67b0b2
-
Filesize
307KB
MD517457efbbff46ae20e6315f43df21927
SHA14cf9b4dbcf74bc1938906cc5843269e36fe4872a
SHA2564f146daa05d9d1ce9a0551eaa4e5c51bace9d8fabe23d8af57bdd528ee1e3a6a
SHA5128c818d173b381425337a9dc568ff4781a70c04c2ff83583f50ab5cab582ba6479a657a1387e6b4ec2cd9f6e2fe804055113ca4410912c1829551f8c45b67b0b2
-
Filesize
366KB
MD5f8d2aa72089a6ffff8956143e5c8805e
SHA19fe09063583bc9696347a024d3384ec44ec4b796
SHA2569a48c04223ddac9f1b29434df1e0f4878eb94708abb4de8ed1a4708996ccbae0
SHA512a65c13065622be23df2798905fb8ee1998a6cda3fde7f7c0b1daffd30007cc2068fd0a3e7fb6e00297c31b1d8b96b3aaac57bb4992f3d7ca51a666adc2a28c8e
-
Filesize
366KB
MD5f8d2aa72089a6ffff8956143e5c8805e
SHA19fe09063583bc9696347a024d3384ec44ec4b796
SHA2569a48c04223ddac9f1b29434df1e0f4878eb94708abb4de8ed1a4708996ccbae0
SHA512a65c13065622be23df2798905fb8ee1998a6cda3fde7f7c0b1daffd30007cc2068fd0a3e7fb6e00297c31b1d8b96b3aaac57bb4992f3d7ca51a666adc2a28c8e