Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe
Resource
win10v2004-20230220-en
General
-
Target
af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe
-
Size
675KB
-
MD5
4a7d9e8b674b5a9d5454c214e772af12
-
SHA1
f7372676fb5597566546796daabbc985476820bb
-
SHA256
af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad
-
SHA512
5d8ba22dc10a627d2640230e9f328dfb9dd99c66fe19ac843d3a14ff41b1c2ae511cfb0e5cd269b553e88427ecee76b23e661c155274ba66897327819d335bdd
-
SSDEEP
12288:kMrOy90LYfvMWtDTDzwZB2YSSiyUe1kEZar3wjEJU9273AL:6yO4j1e1khr3W92i
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9461.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2716-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-198-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-202-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-214-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-216-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-218-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-220-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-222-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2716-225-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 560 un208589.exe 1536 pro9461.exe 2716 qu5365.exe 928 si372004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9461.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un208589.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un208589.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5016 1536 WerFault.exe 79 4984 2716 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1536 pro9461.exe 1536 pro9461.exe 2716 qu5365.exe 2716 qu5365.exe 928 si372004.exe 928 si372004.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1536 pro9461.exe Token: SeDebugPrivilege 2716 qu5365.exe Token: SeDebugPrivilege 928 si372004.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 652 wrote to memory of 560 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 78 PID 652 wrote to memory of 560 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 78 PID 652 wrote to memory of 560 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 78 PID 560 wrote to memory of 1536 560 un208589.exe 79 PID 560 wrote to memory of 1536 560 un208589.exe 79 PID 560 wrote to memory of 1536 560 un208589.exe 79 PID 560 wrote to memory of 2716 560 un208589.exe 92 PID 560 wrote to memory of 2716 560 un208589.exe 92 PID 560 wrote to memory of 2716 560 un208589.exe 92 PID 652 wrote to memory of 928 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 96 PID 652 wrote to memory of 928 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 96 PID 652 wrote to memory of 928 652 af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe"C:\Users\Admin\AppData\Local\Temp\af6040740ca006075a15890eb728783b0c736c338f4dfc1b0136bdac926a2aad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208589.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208589.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9461.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9461.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 10844⤵
- Program crash
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5365.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 13684⤵
- Program crash
PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372004.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1536 -ip 15361⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2716 -ip 27161⤵PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a239cf1b64850b720d298a35d6a0fbfd
SHA1cbea68da70eaab00c8ddf429ffb4681864dbb3d1
SHA256d8faf08a3eb734fd6fa3afe20d1ed8020c8d1d657b94ee52797f8107b89b57c6
SHA512ae6651bda572a2b2f437b357316e35ac3647864c25ea6212e277c91191ddb1cf39a0ccd2eaed9f7d4b78180c8fa18af4fc39beea34a89cb3a23442bc2c8daac1
-
Filesize
175KB
MD5a239cf1b64850b720d298a35d6a0fbfd
SHA1cbea68da70eaab00c8ddf429ffb4681864dbb3d1
SHA256d8faf08a3eb734fd6fa3afe20d1ed8020c8d1d657b94ee52797f8107b89b57c6
SHA512ae6651bda572a2b2f437b357316e35ac3647864c25ea6212e277c91191ddb1cf39a0ccd2eaed9f7d4b78180c8fa18af4fc39beea34a89cb3a23442bc2c8daac1
-
Filesize
533KB
MD57a1a923d78d068e1e76ee27af6ee38e0
SHA13dd3e07e5f6ad0ff8760662ca0eb1e273285316a
SHA25676f4f021e6a61c86a1b168093599fa492fdf608bbc230a4de403881113a80cd1
SHA512086d05170b5d609270642690b878ca6e8f8662daa5aec1cdfffebe6caa1f0740f3f54f0e6aa3222fef54c723202aecc491b5795ec03b0acf6341b088fa55f6e5
-
Filesize
533KB
MD57a1a923d78d068e1e76ee27af6ee38e0
SHA13dd3e07e5f6ad0ff8760662ca0eb1e273285316a
SHA25676f4f021e6a61c86a1b168093599fa492fdf608bbc230a4de403881113a80cd1
SHA512086d05170b5d609270642690b878ca6e8f8662daa5aec1cdfffebe6caa1f0740f3f54f0e6aa3222fef54c723202aecc491b5795ec03b0acf6341b088fa55f6e5
-
Filesize
272KB
MD5bb99985c7866699efb42c399569ac189
SHA15ccc3fc94294c0636d5bc67f8235084510845b03
SHA256e8e40bef3e56d8a56c22eeed219d9a81c9e16a272d469a8b1628d4ee05df56e1
SHA512661c8519f6937b6de11a92a209e61648feccedf6825179ca662d7db3bd4b8b17bf29ce7194cf44ca8c3f022f2cd3b2cc18bb405c58ad63da283c29859d2d2c98
-
Filesize
272KB
MD5bb99985c7866699efb42c399569ac189
SHA15ccc3fc94294c0636d5bc67f8235084510845b03
SHA256e8e40bef3e56d8a56c22eeed219d9a81c9e16a272d469a8b1628d4ee05df56e1
SHA512661c8519f6937b6de11a92a209e61648feccedf6825179ca662d7db3bd4b8b17bf29ce7194cf44ca8c3f022f2cd3b2cc18bb405c58ad63da283c29859d2d2c98
-
Filesize
331KB
MD5eeb7d3680838817e9478ce67ae02e9b6
SHA1b87ffe819f7fdd3c4e28a7944d545d0c4f330d0c
SHA256378a79d0de790061936bf6de49677c8d46eb3b9db756df6c6198297b24972963
SHA512422903458802326804be76ddb3d7ba20c8f6ea83a03de52cb12e47a542c94878c5071b93845467b4c47fd4c68b97f21494b4ab3c462ecdfb088083192423c671
-
Filesize
331KB
MD5eeb7d3680838817e9478ce67ae02e9b6
SHA1b87ffe819f7fdd3c4e28a7944d545d0c4f330d0c
SHA256378a79d0de790061936bf6de49677c8d46eb3b9db756df6c6198297b24972963
SHA512422903458802326804be76ddb3d7ba20c8f6ea83a03de52cb12e47a542c94878c5071b93845467b4c47fd4c68b97f21494b4ab3c462ecdfb088083192423c671