Analysis
-
max time kernel
59s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe
Resource
win10v2004-20230221-en
General
-
Target
c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe
-
Size
695KB
-
MD5
7f80d5e70bad9d019161fb17b9e8b17d
-
SHA1
b1db8cf58b5b557b43d2f94266be82809c572d7d
-
SHA256
c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6
-
SHA512
d715db64d3338daa8c44d299ea30ed61c08216f8ea3f32258af715a5c7df16c274a10f7f04b7a9eb912da3a5032427a9f7db8e4d0931de8fd6e039ad8db2633c
-
SSDEEP
12288:HMrny90eEFAIHjJstEwFsk6aYtIrrasOdiXJuqHs2LKC6BUgqnhhYiKdRG4DDv:oy7EFA0KTCk6aSIrras00M2B6BUgwhhU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0183.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0183.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/640-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-225-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline behavioral1/memory/640-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/640-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3088 un042309.exe 4552 pro0183.exe 640 qu3259.exe 4124 si767819.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0183.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un042309.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un042309.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3548 4552 WerFault.exe 83 1924 640 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4552 pro0183.exe 4552 pro0183.exe 640 qu3259.exe 640 qu3259.exe 4124 si767819.exe 4124 si767819.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4552 pro0183.exe Token: SeDebugPrivilege 640 qu3259.exe Token: SeDebugPrivilege 4124 si767819.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3088 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 82 PID 4700 wrote to memory of 3088 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 82 PID 4700 wrote to memory of 3088 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 82 PID 3088 wrote to memory of 4552 3088 un042309.exe 83 PID 3088 wrote to memory of 4552 3088 un042309.exe 83 PID 3088 wrote to memory of 4552 3088 un042309.exe 83 PID 3088 wrote to memory of 640 3088 un042309.exe 89 PID 3088 wrote to memory of 640 3088 un042309.exe 89 PID 3088 wrote to memory of 640 3088 un042309.exe 89 PID 4700 wrote to memory of 4124 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 93 PID 4700 wrote to memory of 4124 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 93 PID 4700 wrote to memory of 4124 4700 c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe"C:\Users\Admin\AppData\Local\Temp\c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 10884⤵
- Program crash
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 18524⤵
- Program crash
PID:1924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4552 -ip 45521⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 640 -ip 6401⤵PID:528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e4abe1f1dca104b3909c4abf3cd57fde
SHA1b3c7b15b465fdbd05b48b212056f95df5e85fa7f
SHA256176aa8fe7639ee3d457299c053c6b13153f0dda563d941f8fa5136e7295b1b91
SHA512ac6b56a5d5e551ed9b014307b9e727c1b0c06fc306e48ecd1c51a1f99ae1d088fc8f36af8c30641a4e3767dcf53130a12ec68d7ca43f75725fc081c34a00bdc7
-
Filesize
175KB
MD5e4abe1f1dca104b3909c4abf3cd57fde
SHA1b3c7b15b465fdbd05b48b212056f95df5e85fa7f
SHA256176aa8fe7639ee3d457299c053c6b13153f0dda563d941f8fa5136e7295b1b91
SHA512ac6b56a5d5e551ed9b014307b9e727c1b0c06fc306e48ecd1c51a1f99ae1d088fc8f36af8c30641a4e3767dcf53130a12ec68d7ca43f75725fc081c34a00bdc7
-
Filesize
553KB
MD51684056712227c4264589c8c19df2c46
SHA1d494d1b587dfbdcd93fa9d4ce6c6e84a20c99b68
SHA256eb906be52996a352aebd1f6ff800c660a407568b3e55f751bf9b1bf4ac4aad99
SHA5128808addb2f240e9342cbaa785942c880184b7f05eeba2a89012cb2ba21de9ef84cde30940b2a6a5b90de0f87b500979528bad7be2a834f8eed685e838d843c4b
-
Filesize
553KB
MD51684056712227c4264589c8c19df2c46
SHA1d494d1b587dfbdcd93fa9d4ce6c6e84a20c99b68
SHA256eb906be52996a352aebd1f6ff800c660a407568b3e55f751bf9b1bf4ac4aad99
SHA5128808addb2f240e9342cbaa785942c880184b7f05eeba2a89012cb2ba21de9ef84cde30940b2a6a5b90de0f87b500979528bad7be2a834f8eed685e838d843c4b
-
Filesize
308KB
MD52443d8d25d0578359e40d820751f747c
SHA1fd1e6464d8edf55a20955959aa08bada8ab00176
SHA2560cd530afd88d06a74526d5d67535ff701288ddf2dc68ea96e494725fed90a741
SHA5127508500841f00cc1006646e5a578943801ea25dcbf095df8fffea9779b72f6ba681af700b52c08f7e9c41c99211dfa8507e05b3d7a71d003b0acc01364c7b310
-
Filesize
308KB
MD52443d8d25d0578359e40d820751f747c
SHA1fd1e6464d8edf55a20955959aa08bada8ab00176
SHA2560cd530afd88d06a74526d5d67535ff701288ddf2dc68ea96e494725fed90a741
SHA5127508500841f00cc1006646e5a578943801ea25dcbf095df8fffea9779b72f6ba681af700b52c08f7e9c41c99211dfa8507e05b3d7a71d003b0acc01364c7b310
-
Filesize
366KB
MD5563e062db16918f2bf829f4bab452547
SHA1d294e3e2206bb8cda3de07426e60e78ea8a7d998
SHA256ca9daf3737be32ad080abc9a40387bc364459ceed730fdd13d8ecc182af305e0
SHA512d4315f86db58a391c1743bcd5a34f252d54f23308369db7b94a522751415f227e84636b67517bdb4dfba4abca92eb7146d565acf69946eee665f73a15d5f2e36
-
Filesize
366KB
MD5563e062db16918f2bf829f4bab452547
SHA1d294e3e2206bb8cda3de07426e60e78ea8a7d998
SHA256ca9daf3737be32ad080abc9a40387bc364459ceed730fdd13d8ecc182af305e0
SHA512d4315f86db58a391c1743bcd5a34f252d54f23308369db7b94a522751415f227e84636b67517bdb4dfba4abca92eb7146d565acf69946eee665f73a15d5f2e36