Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:32
Static task
static1
Behavioral task
behavioral1
Sample
22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe
Resource
win10v2004-20230221-en
General
-
Target
22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe
-
Size
699KB
-
MD5
70b972f95326d1931cde6530f2a78abe
-
SHA1
5a2986c331234b4f368dad82d6d97632f1ef0891
-
SHA256
22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9
-
SHA512
daf5cf375ef46c5261ed210b143c4a340d722cf105d194576dc5bc947d6094429f6fbe3f06e15510f165b428f615561e2d7674f09437513ece090b3e5073de57
-
SSDEEP
12288:7MrPy90gMctzsYkNbKqCi4SeEn2kOyreRs4kED9OHsmQmpErMCNwP1HLZ+atQLH2:gyZgYG/C5w5O1aBE5OMmArMCNA1rZ0n2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4132.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4132.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3192-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/3192-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1352 un020942.exe 4224 pro4132.exe 3192 qu2856.exe 3828 si129740.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4132.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un020942.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un020942.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3880 4224 WerFault.exe 83 3348 3192 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4224 pro4132.exe 4224 pro4132.exe 3192 qu2856.exe 3192 qu2856.exe 3828 si129740.exe 3828 si129740.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4224 pro4132.exe Token: SeDebugPrivilege 3192 qu2856.exe Token: SeDebugPrivilege 3828 si129740.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1352 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 82 PID 1912 wrote to memory of 1352 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 82 PID 1912 wrote to memory of 1352 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 82 PID 1352 wrote to memory of 4224 1352 un020942.exe 83 PID 1352 wrote to memory of 4224 1352 un020942.exe 83 PID 1352 wrote to memory of 4224 1352 un020942.exe 83 PID 1352 wrote to memory of 3192 1352 un020942.exe 89 PID 1352 wrote to memory of 3192 1352 un020942.exe 89 PID 1352 wrote to memory of 3192 1352 un020942.exe 89 PID 1912 wrote to memory of 3828 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 93 PID 1912 wrote to memory of 3828 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 93 PID 1912 wrote to memory of 3828 1912 22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe"C:\Users\Admin\AppData\Local\Temp\22aad8200df966b05049403755b8524efaf7c19126f5afdcedb5862760b7d5c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020942.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020942.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4132.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 10844⤵
- Program crash
PID:3880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2856.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 13284⤵
- Program crash
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si129740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si129740.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4224 -ip 42241⤵PID:472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3192 -ip 31921⤵PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50400d62f578728fca4a449e2e814b1dc
SHA1c4d0b4c59013332638e415ab385da565d42b33c5
SHA2560d918ffe02771570b2d49675a44ae4ce4d8362a4ab6b3b788a3c38e82ec1a672
SHA512f0d21054569d0479b3697bb8bd07794d1a2aff2b8bf0abe1ed2f593a05b460eb0419bc85ab57ab6b126b8251fb7a6a286722955e3e0504be7c2665d3d697a2cf
-
Filesize
175KB
MD50400d62f578728fca4a449e2e814b1dc
SHA1c4d0b4c59013332638e415ab385da565d42b33c5
SHA2560d918ffe02771570b2d49675a44ae4ce4d8362a4ab6b3b788a3c38e82ec1a672
SHA512f0d21054569d0479b3697bb8bd07794d1a2aff2b8bf0abe1ed2f593a05b460eb0419bc85ab57ab6b126b8251fb7a6a286722955e3e0504be7c2665d3d697a2cf
-
Filesize
557KB
MD564b1a989c808b55bfb8baecedf02132e
SHA196137021a656782074d2937c2345baf2a4e625a2
SHA2561a830bbb4a0fa5fd4862d3ece845194b796992cf1e08672c07158c922b386e4a
SHA512fd72d19e5bf5c5020f036b36d99617720d9e237e953e2758072f479955bc6bb1bdbf2b79507dae513ba767017f6fa9e04e38328cd3e44f6eb3560a0956a5d653
-
Filesize
557KB
MD564b1a989c808b55bfb8baecedf02132e
SHA196137021a656782074d2937c2345baf2a4e625a2
SHA2561a830bbb4a0fa5fd4862d3ece845194b796992cf1e08672c07158c922b386e4a
SHA512fd72d19e5bf5c5020f036b36d99617720d9e237e953e2758072f479955bc6bb1bdbf2b79507dae513ba767017f6fa9e04e38328cd3e44f6eb3560a0956a5d653
-
Filesize
307KB
MD5d4ef79b1fb644e6bede9c062fd5a1b7c
SHA1bae3900e0e474c21871aeb73723680f900313a33
SHA25664a30611181a99a21ad0e0ba7ffa06b1df93adfe3011793bb9512f8ff838198d
SHA512140a314dc0b674bb4446bf92c59975819879b2e05ca384a2f5a99a9b2ff82823dc7c609a4494212011ac2c4586f494560cf14b037182c9a4ffb51f2786554d8c
-
Filesize
307KB
MD5d4ef79b1fb644e6bede9c062fd5a1b7c
SHA1bae3900e0e474c21871aeb73723680f900313a33
SHA25664a30611181a99a21ad0e0ba7ffa06b1df93adfe3011793bb9512f8ff838198d
SHA512140a314dc0b674bb4446bf92c59975819879b2e05ca384a2f5a99a9b2ff82823dc7c609a4494212011ac2c4586f494560cf14b037182c9a4ffb51f2786554d8c
-
Filesize
366KB
MD51238bc315bbebcfafbc1669a7a638ee5
SHA103d8663d494005257d00fb047fa84063f57730d4
SHA25659e66ed519ab6af50fd6822020b385643e9639441763c5a5c34285fbf9680f3b
SHA51200803ccfe74f1a6a4a82d261417efa14625f3af4bfb11ac49f89f7ba0daeb766487137c2bee6ab15ebd8a74d78cf8d553f21034d20978d85d1982b63a8eb4dfd
-
Filesize
366KB
MD51238bc315bbebcfafbc1669a7a638ee5
SHA103d8663d494005257d00fb047fa84063f57730d4
SHA25659e66ed519ab6af50fd6822020b385643e9639441763c5a5c34285fbf9680f3b
SHA51200803ccfe74f1a6a4a82d261417efa14625f3af4bfb11ac49f89f7ba0daeb766487137c2bee6ab15ebd8a74d78cf8d553f21034d20978d85d1982b63a8eb4dfd