Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:46
Static task
static1
Behavioral task
behavioral1
Sample
35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe
Resource
win10v2004-20230221-en
General
-
Target
35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe
-
Size
695KB
-
MD5
dd5135979d4c43ab8631e4d356baabd6
-
SHA1
0d1898e4073d383fbfb9126283415b7d7e5f0a98
-
SHA256
35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3
-
SHA512
c79b69cfc17a57f66430e97dec90ade486d97d7e0e93c424d65eee8f41e31f4c5877ee456d68a9a533d09619d6b71c6bd4058fb9fd8a76460e23bbd0a7515280
-
SSDEEP
12288:kMrey90r8txlEyUo+/+agWcPinSRJGxvuBxzhQkqnh5IVTojJ8jbB:Cy40lEiq1gWcqSRJGcxIh5Koj2l
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0764.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2492-191-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-192-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-194-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-196-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-198-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-200-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-202-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-204-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-206-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-208-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-210-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-212-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-214-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-216-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-218-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-220-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-222-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/2492-224-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3684 un506684.exe 4676 pro0764.exe 2492 qu1962.exe 2520 si917288.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0764.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0764.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un506684.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un506684.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 436 4676 WerFault.exe 82 3364 2492 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4676 pro0764.exe 4676 pro0764.exe 2492 qu1962.exe 2492 qu1962.exe 2520 si917288.exe 2520 si917288.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4676 pro0764.exe Token: SeDebugPrivilege 2492 qu1962.exe Token: SeDebugPrivilege 2520 si917288.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3684 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 81 PID 4376 wrote to memory of 3684 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 81 PID 4376 wrote to memory of 3684 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 81 PID 3684 wrote to memory of 4676 3684 un506684.exe 82 PID 3684 wrote to memory of 4676 3684 un506684.exe 82 PID 3684 wrote to memory of 4676 3684 un506684.exe 82 PID 3684 wrote to memory of 2492 3684 un506684.exe 88 PID 3684 wrote to memory of 2492 3684 un506684.exe 88 PID 3684 wrote to memory of 2492 3684 un506684.exe 88 PID 4376 wrote to memory of 2520 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 92 PID 4376 wrote to memory of 2520 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 92 PID 4376 wrote to memory of 2520 4376 35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe"C:\Users\Admin\AppData\Local\Temp\35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 10964⤵
- Program crash
PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 17844⤵
- Program crash
PID:3364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4676 -ip 46761⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2492 -ip 24921⤵PID:1360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58f601a076280777af5f75683e3f96f79
SHA149d8b8a8b35638c1118143928fd7fdd192f2c696
SHA2564e9528d095d43d398f93391caf7ae2b0ced5d9bb757453629b578f8fc33b1754
SHA512df03a805532624bc1d4a9d7ef233b4e4793c7dd330f039552a55b83039e5736b55c09bd9e3e16834be90457b075793421f410397a852c0839ca1914d00e7134c
-
Filesize
175KB
MD58f601a076280777af5f75683e3f96f79
SHA149d8b8a8b35638c1118143928fd7fdd192f2c696
SHA2564e9528d095d43d398f93391caf7ae2b0ced5d9bb757453629b578f8fc33b1754
SHA512df03a805532624bc1d4a9d7ef233b4e4793c7dd330f039552a55b83039e5736b55c09bd9e3e16834be90457b075793421f410397a852c0839ca1914d00e7134c
-
Filesize
553KB
MD56341fa13cd442b26590a636886c35815
SHA170a645d4af206a5f8fbdb57b3f45cc1976d00cd1
SHA2565aae6a263b432e08f7c0c00e871aa6d11cae8a9959118bdd80c7c63a8da2f5ce
SHA51297a002cce88e311e6ddac50f55fe31cf0dca447651215b7a12f67e3e854398f8e6413ac07aa341336d4eb1534dc8fae6f14679c928cfa3e9e29187143d48c7a1
-
Filesize
553KB
MD56341fa13cd442b26590a636886c35815
SHA170a645d4af206a5f8fbdb57b3f45cc1976d00cd1
SHA2565aae6a263b432e08f7c0c00e871aa6d11cae8a9959118bdd80c7c63a8da2f5ce
SHA51297a002cce88e311e6ddac50f55fe31cf0dca447651215b7a12f67e3e854398f8e6413ac07aa341336d4eb1534dc8fae6f14679c928cfa3e9e29187143d48c7a1
-
Filesize
308KB
MD5d498b5a5f6b26ec68881cde52501876c
SHA1d0d7a661417d10157c3dc44cff629f5861fe5d46
SHA256583a29cbf8acff95fe3b21294d733245913856f3faaf8cf63731a082cfcedb7c
SHA51208ca0db9e1f4f548118617de2a3b4f5580a03380abeef54edd358733d49ca942c9288126595425c84337bc998af6e89ae93b7af7e382e7f04f78fb40059d43fc
-
Filesize
308KB
MD5d498b5a5f6b26ec68881cde52501876c
SHA1d0d7a661417d10157c3dc44cff629f5861fe5d46
SHA256583a29cbf8acff95fe3b21294d733245913856f3faaf8cf63731a082cfcedb7c
SHA51208ca0db9e1f4f548118617de2a3b4f5580a03380abeef54edd358733d49ca942c9288126595425c84337bc998af6e89ae93b7af7e382e7f04f78fb40059d43fc
-
Filesize
366KB
MD52082950a97466a7889fd5c0b1d5e732e
SHA10883d599d8bb779d6a42055a756673689a6c6b31
SHA256756d8d4d3bf3d81a1530d907cefea44aa2e27447d688795daee101a80e51609f
SHA512f856e19f3a8fa099d4e5f719fbbe71e2e1bf30ba6e27d06a9253e25b64dab8757e521688b56df93ef37163b5d4d981397d072f65bf3b514e4fc182f679a191e7
-
Filesize
366KB
MD52082950a97466a7889fd5c0b1d5e732e
SHA10883d599d8bb779d6a42055a756673689a6c6b31
SHA256756d8d4d3bf3d81a1530d907cefea44aa2e27447d688795daee101a80e51609f
SHA512f856e19f3a8fa099d4e5f719fbbe71e2e1bf30ba6e27d06a9253e25b64dab8757e521688b56df93ef37163b5d4d981397d072f65bf3b514e4fc182f679a191e7