Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:34
Static task
static1
Behavioral task
behavioral1
Sample
81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe
Resource
win10v2004-20230220-en
General
-
Target
81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe
-
Size
700KB
-
MD5
e595357fb86bf809cc193820884d2a0d
-
SHA1
d17960b0df1c7b963786610f18f42cb53cbc2442
-
SHA256
81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b
-
SHA512
02d9734426b5807418ba7dfbd78bc4cf39372419853d56fcd272189ea3f65f4ecd50eaf937dd44690bac1d3251ca39f97f48d399ebdf81eb570458e8ef6c5699
-
SSDEEP
12288:hMrVy90oc0WrgH/kUqIdDbnE6jdMkUTrpkD2uNdrMRNwPfFLKbn+COF8UZvyR:kyZO0k6pEcakUXpkDv7rMRNAfNKT/OSp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2404.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2404.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3464-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-222-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-226-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3464-228-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2968 un298671.exe 2764 pro2404.exe 3464 qu4193.exe 4000 si532242.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2404.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un298671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un298671.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3876 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4060 2764 WerFault.exe 84 2076 3464 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2764 pro2404.exe 2764 pro2404.exe 3464 qu4193.exe 3464 qu4193.exe 4000 si532242.exe 4000 si532242.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2764 pro2404.exe Token: SeDebugPrivilege 3464 qu4193.exe Token: SeDebugPrivilege 4000 si532242.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2968 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 83 PID 4668 wrote to memory of 2968 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 83 PID 4668 wrote to memory of 2968 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 83 PID 2968 wrote to memory of 2764 2968 un298671.exe 84 PID 2968 wrote to memory of 2764 2968 un298671.exe 84 PID 2968 wrote to memory of 2764 2968 un298671.exe 84 PID 2968 wrote to memory of 3464 2968 un298671.exe 90 PID 2968 wrote to memory of 3464 2968 un298671.exe 90 PID 2968 wrote to memory of 3464 2968 un298671.exe 90 PID 4668 wrote to memory of 4000 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 94 PID 4668 wrote to memory of 4000 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 94 PID 4668 wrote to memory of 4000 4668 81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe"C:\Users\Admin\AppData\Local\Temp\81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10844⤵
- Program crash
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 13324⤵
- Program crash
PID:2076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2764 -ip 27641⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3464 -ip 34641⤵PID:1716
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD555b37de5aa5ce687dff36f374bc90d00
SHA1a21b79c610213596feb08153a98fed8855db1be9
SHA256d427b98db7b2fa7c69e9a0fc276c69524158f7d7a4d49f5c2d642eeab23dce13
SHA51271178fb7f4b5643e2c018110f358c299e813bb8f9cb8b05c5ff5ab41406ee58f683d7f3ed8d12b2f8984d35c1c676c083a3837b17959734acc90a34ab51a5908
-
Filesize
175KB
MD555b37de5aa5ce687dff36f374bc90d00
SHA1a21b79c610213596feb08153a98fed8855db1be9
SHA256d427b98db7b2fa7c69e9a0fc276c69524158f7d7a4d49f5c2d642eeab23dce13
SHA51271178fb7f4b5643e2c018110f358c299e813bb8f9cb8b05c5ff5ab41406ee58f683d7f3ed8d12b2f8984d35c1c676c083a3837b17959734acc90a34ab51a5908
-
Filesize
557KB
MD566859ce5904629bd6c8d04962e3a234c
SHA16ba3b02ee92614085e59087b231a0d5f992f8373
SHA256f5469aec08214fbcefb2b1cfea09788e3382f45f3cb1ffbe8694e0244e34d7ea
SHA5122e0f9766ce5f5b086c93f6669f8f1a4a0445b3d6efa0489b8e2adcaca8df42ae9b4e4e4c354a76f436588e6a6f0889dee1f641985b77e36883a03455aefa46a0
-
Filesize
557KB
MD566859ce5904629bd6c8d04962e3a234c
SHA16ba3b02ee92614085e59087b231a0d5f992f8373
SHA256f5469aec08214fbcefb2b1cfea09788e3382f45f3cb1ffbe8694e0244e34d7ea
SHA5122e0f9766ce5f5b086c93f6669f8f1a4a0445b3d6efa0489b8e2adcaca8df42ae9b4e4e4c354a76f436588e6a6f0889dee1f641985b77e36883a03455aefa46a0
-
Filesize
307KB
MD5e43c33e9b2c6c079a912f8c0305f7ebd
SHA11a9dc5a2290385c62b17bae7846934822dc49b78
SHA2564088171f2b717c52b0d7cab34eb0829426edf57c6fba1180d59b552886ca3226
SHA512fbb5c73bb6367ecd052c10dc4bff761f65047921eb134857942a76f3b6e68f55baaab2b8eec07287be30fe77dc3b1f13b369abd47e76ba3981146397a7d18296
-
Filesize
307KB
MD5e43c33e9b2c6c079a912f8c0305f7ebd
SHA11a9dc5a2290385c62b17bae7846934822dc49b78
SHA2564088171f2b717c52b0d7cab34eb0829426edf57c6fba1180d59b552886ca3226
SHA512fbb5c73bb6367ecd052c10dc4bff761f65047921eb134857942a76f3b6e68f55baaab2b8eec07287be30fe77dc3b1f13b369abd47e76ba3981146397a7d18296
-
Filesize
366KB
MD5ba6c454fee84bd5570296b0d139283a7
SHA12435ff2a03286066d0b57550f69490bc163d4de7
SHA2562d1890e4b728cd6b83c8e4b809f70f3060cdf53c8b5165ed61da476f6281555a
SHA512eb32c599018667656d3a6ed52fe06b7bd5e4813b3e9cb3f61afd49de75fdd9b55cad441f626bd4cea488612bd764be396cfa2ded2becc0c34a00ec3259253fdb
-
Filesize
366KB
MD5ba6c454fee84bd5570296b0d139283a7
SHA12435ff2a03286066d0b57550f69490bc163d4de7
SHA2562d1890e4b728cd6b83c8e4b809f70f3060cdf53c8b5165ed61da476f6281555a
SHA512eb32c599018667656d3a6ed52fe06b7bd5e4813b3e9cb3f61afd49de75fdd9b55cad441f626bd4cea488612bd764be396cfa2ded2becc0c34a00ec3259253fdb