Analysis
-
max time kernel
106s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:49
Static task
static1
Behavioral task
behavioral1
Sample
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe
Resource
win10v2004-20230220-en
General
-
Target
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe
-
Size
695KB
-
MD5
2896126e9b5fa8a56a7fd82969724b12
-
SHA1
6e125840b82311a58902db64f2657186b4bf8e16
-
SHA256
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de
-
SHA512
5990b68ecc4c445bdc2f81ea372c6ab91d1af0ab170fdc6441df06bc3b0997c7fd67fdfe78988b8fed59609c9870acc98ca2f14c79dd95cff923bc981339af5b
-
SSDEEP
12288:9Mrfy90E16dlJGNXegHFJawsAfqU7fi1WTCeGtKoaanh25Qs6dIazO+meWgr:Oy31QlEtegHfceN7IeyZaAh25Qs0ATgr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2879.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4988-191-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-192-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-196-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-198-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-214-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-216-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-218-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-220-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-222-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-224-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4988-1110-0x0000000004E70000-0x0000000004E80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3992 un628279.exe 440 pro2879.exe 4988 qu6684.exe 3228 si340171.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2879.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un628279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un628279.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 816 440 WerFault.exe 87 4132 4988 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 440 pro2879.exe 440 pro2879.exe 4988 qu6684.exe 4988 qu6684.exe 3228 si340171.exe 3228 si340171.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 440 pro2879.exe Token: SeDebugPrivilege 4988 qu6684.exe Token: SeDebugPrivilege 3228 si340171.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3992 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 86 PID 1760 wrote to memory of 3992 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 86 PID 1760 wrote to memory of 3992 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 86 PID 3992 wrote to memory of 440 3992 un628279.exe 87 PID 3992 wrote to memory of 440 3992 un628279.exe 87 PID 3992 wrote to memory of 440 3992 un628279.exe 87 PID 3992 wrote to memory of 4988 3992 un628279.exe 96 PID 3992 wrote to memory of 4988 3992 un628279.exe 96 PID 3992 wrote to memory of 4988 3992 un628279.exe 96 PID 1760 wrote to memory of 3228 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 100 PID 1760 wrote to memory of 3228 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 100 PID 1760 wrote to memory of 3228 1760 2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe"C:\Users\Admin\AppData\Local\Temp\2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628279.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628279.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2879.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2879.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 10884⤵
- Program crash
PID:816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6684.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 19404⤵
- Program crash
PID:4132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si340171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si340171.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 440 -ip 4401⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4988 -ip 49881⤵PID:3204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59fb6c2aedaae022e4e94adb60c630d9c
SHA1f664460a39e7c20ba6f59eb91b5ae75089781cbb
SHA2563f2b426c4a7f4fa49e178a9fb511e780991c6968318cce5b68653ea04709c0a7
SHA512d5f7f9ce615ca28d863680a6a6895af6917569f1596b6d1da0dd1d88a6a17bdac8d2bf790293e704681fc9cc777bf8d2817eabf5c4eb833458fb333455066a54
-
Filesize
175KB
MD59fb6c2aedaae022e4e94adb60c630d9c
SHA1f664460a39e7c20ba6f59eb91b5ae75089781cbb
SHA2563f2b426c4a7f4fa49e178a9fb511e780991c6968318cce5b68653ea04709c0a7
SHA512d5f7f9ce615ca28d863680a6a6895af6917569f1596b6d1da0dd1d88a6a17bdac8d2bf790293e704681fc9cc777bf8d2817eabf5c4eb833458fb333455066a54
-
Filesize
553KB
MD5d061af692d2d00bf68fcde48d3c52bd3
SHA12771ce884c6de35eda6fe9fbab28cdffdad9ffe0
SHA256cfb05acf380a66e442469efb54f1c7da0a51b712af6e7f63031e3498410ba999
SHA51260f1fde11566d6e5e0e8a3cfda9157b6b607aa1aa45e89e87a7c99fcbd0178bf40ffa84e4a1330e44cdeae2aac019da1906d0faaf171140ade260c3bf5d33a53
-
Filesize
553KB
MD5d061af692d2d00bf68fcde48d3c52bd3
SHA12771ce884c6de35eda6fe9fbab28cdffdad9ffe0
SHA256cfb05acf380a66e442469efb54f1c7da0a51b712af6e7f63031e3498410ba999
SHA51260f1fde11566d6e5e0e8a3cfda9157b6b607aa1aa45e89e87a7c99fcbd0178bf40ffa84e4a1330e44cdeae2aac019da1906d0faaf171140ade260c3bf5d33a53
-
Filesize
308KB
MD5a7b9433b265f61c1744a15bf2064e33f
SHA1e98e52d4a66c85dac222bbc5fbdcf6702db57f4e
SHA25680384cc66fdc8d691468d4aa3dfd780b01682bac962643a55def8549fd340668
SHA512d9bdb1214f99046c83da57b07af4c87a57f35b6e1537e394cb1d6eee9cf0db774d7e73da8aa46ca437c2483c7262c60c969caec546a8bd234a85ee08f5e62980
-
Filesize
308KB
MD5a7b9433b265f61c1744a15bf2064e33f
SHA1e98e52d4a66c85dac222bbc5fbdcf6702db57f4e
SHA25680384cc66fdc8d691468d4aa3dfd780b01682bac962643a55def8549fd340668
SHA512d9bdb1214f99046c83da57b07af4c87a57f35b6e1537e394cb1d6eee9cf0db774d7e73da8aa46ca437c2483c7262c60c969caec546a8bd234a85ee08f5e62980
-
Filesize
366KB
MD528f0da166c2f73ee9b13e06c5b30d46c
SHA170eb5f511a220231a0860bb2460160e10c6878f0
SHA256bf6293eab4c6efcf013ebc6b39313510826f0c115070582adf7a5213f5e8e556
SHA512c27f21b48930056f462571e4dca2b08a482e1156476f7101544edcdaaba2d2422089bf86dcbe08a33ed2532a0af7c3c97265649aa1c9aef7501b026bd8c8ad6d
-
Filesize
366KB
MD528f0da166c2f73ee9b13e06c5b30d46c
SHA170eb5f511a220231a0860bb2460160e10c6878f0
SHA256bf6293eab4c6efcf013ebc6b39313510826f0c115070582adf7a5213f5e8e556
SHA512c27f21b48930056f462571e4dca2b08a482e1156476f7101544edcdaaba2d2422089bf86dcbe08a33ed2532a0af7c3c97265649aa1c9aef7501b026bd8c8ad6d