Analysis
-
max time kernel
87s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:45
Static task
static1
Behavioral task
behavioral1
Sample
e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe
Resource
win10v2004-20230220-en
General
-
Target
e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe
-
Size
695KB
-
MD5
dc4bd7abfbb9af9c96cfd9a42233974d
-
SHA1
42ee95e6cd4119a0e58ecfff7c60665e51e9185d
-
SHA256
e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0
-
SHA512
fc814a8be956244e17cf8abdc07a626ffa7d5237beedc4c20aedf2333603a6795627b24101120145b307dd4fd7a4831d48087693a9884b95d146aeeb3f1c2dc6
-
SSDEEP
12288:hMrTy90iuTAyDiKgFxtS4V7hcn4ucxwjq/82UnnSnhaX1la0qH2dWKLnwT:yylQGKW+4dnmGUIhalladIwT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9952.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1440-191-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-192-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-196-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-198-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-214-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-216-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-218-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-220-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-222-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-224-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/1440-346-0x0000000004E10000-0x0000000004E20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 860 un567668.exe 3480 pro9952.exe 1440 qu4907.exe 3616 si039629.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9952.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un567668.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un567668.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4100 3480 WerFault.exe 85 1552 1440 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3480 pro9952.exe 3480 pro9952.exe 1440 qu4907.exe 1440 qu4907.exe 3616 si039629.exe 3616 si039629.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3480 pro9952.exe Token: SeDebugPrivilege 1440 qu4907.exe Token: SeDebugPrivilege 3616 si039629.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4112 wrote to memory of 860 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 84 PID 4112 wrote to memory of 860 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 84 PID 4112 wrote to memory of 860 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 84 PID 860 wrote to memory of 3480 860 un567668.exe 85 PID 860 wrote to memory of 3480 860 un567668.exe 85 PID 860 wrote to memory of 3480 860 un567668.exe 85 PID 860 wrote to memory of 1440 860 un567668.exe 92 PID 860 wrote to memory of 1440 860 un567668.exe 92 PID 860 wrote to memory of 1440 860 un567668.exe 92 PID 4112 wrote to memory of 3616 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 97 PID 4112 wrote to memory of 3616 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 97 PID 4112 wrote to memory of 3616 4112 e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe"C:\Users\Admin\AppData\Local\Temp\e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 10884⤵
- Program crash
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 18884⤵
- Program crash
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3480 -ip 34801⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1440 -ip 14401⤵PID:4352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59a682ff7175745ad9c7ec55af175a99b
SHA16aceea159a66c3acb8c006933a0cb5f5b556c61a
SHA256ec0619f4a0d2e6fdf9af7fb333734a50443ff45bca83eee1f040deb0379fd293
SHA512dbe09a9dfa417a97bee41b19b8ca16b62b36f713fc8f572c526066f43b4dc6d2ebeae595896ba5a026bf4906cb2ea694ab7ad88e67d5d5e79496f31bdf89e5e9
-
Filesize
175KB
MD59a682ff7175745ad9c7ec55af175a99b
SHA16aceea159a66c3acb8c006933a0cb5f5b556c61a
SHA256ec0619f4a0d2e6fdf9af7fb333734a50443ff45bca83eee1f040deb0379fd293
SHA512dbe09a9dfa417a97bee41b19b8ca16b62b36f713fc8f572c526066f43b4dc6d2ebeae595896ba5a026bf4906cb2ea694ab7ad88e67d5d5e79496f31bdf89e5e9
-
Filesize
553KB
MD50ec25f912557c79c00870bbc53ce81bd
SHA1df9d3086be0b191173815c3dce8a9a7c90b0da2c
SHA2568d9e4139f742d58b4800f1da19ce6a1c9c781e918d0587aa25c6044c14ae2f76
SHA512dc753b90bc506a988a92e26a79754a19ee806c6dd312f68262bbbcff8f82ed14ccc4fafdec3cb33ec6828962dce1f82e505333ab8e4f36b05ed7ef2fddf3812b
-
Filesize
553KB
MD50ec25f912557c79c00870bbc53ce81bd
SHA1df9d3086be0b191173815c3dce8a9a7c90b0da2c
SHA2568d9e4139f742d58b4800f1da19ce6a1c9c781e918d0587aa25c6044c14ae2f76
SHA512dc753b90bc506a988a92e26a79754a19ee806c6dd312f68262bbbcff8f82ed14ccc4fafdec3cb33ec6828962dce1f82e505333ab8e4f36b05ed7ef2fddf3812b
-
Filesize
308KB
MD53f998527df8bf794c9e192f660d3c9a5
SHA1b0b006120b68bc46b0060ea223548c96dd61c67b
SHA256cf01bec72249fabc432790c317b55ef6ca031586a4e362b671e834cd2894e29c
SHA51265368b5fada54a9b18486086a6259e5dfe61c9a24c15b72120b1f356e811a38aaca1019353e8e883f40ad79dce7e3ae8e30040990a05859beaad8339fb184654
-
Filesize
308KB
MD53f998527df8bf794c9e192f660d3c9a5
SHA1b0b006120b68bc46b0060ea223548c96dd61c67b
SHA256cf01bec72249fabc432790c317b55ef6ca031586a4e362b671e834cd2894e29c
SHA51265368b5fada54a9b18486086a6259e5dfe61c9a24c15b72120b1f356e811a38aaca1019353e8e883f40ad79dce7e3ae8e30040990a05859beaad8339fb184654
-
Filesize
366KB
MD5d1f0ace9b63cda31f8b55b891d02e4a7
SHA16dbef299bda27ac1f6923674ed648faa341b1543
SHA25626af0b03f4d2f8c92a035db48e40e037a9f6e36458bbe28d63d84ea143164c35
SHA51246df1521448cfd430e407f960ede089d4cedd5b15fa6604f7eaa55cfd3b344439730c2729162510b2d28bc0a88f7bef05b36a7fede265b712fea86b72aa7ea89
-
Filesize
366KB
MD5d1f0ace9b63cda31f8b55b891d02e4a7
SHA16dbef299bda27ac1f6923674ed648faa341b1543
SHA25626af0b03f4d2f8c92a035db48e40e037a9f6e36458bbe28d63d84ea143164c35
SHA51246df1521448cfd430e407f960ede089d4cedd5b15fa6604f7eaa55cfd3b344439730c2729162510b2d28bc0a88f7bef05b36a7fede265b712fea86b72aa7ea89