Analysis
-
max time kernel
137s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:58
Static task
static1
Behavioral task
behavioral1
Sample
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe
Resource
win10v2004-20230220-en
General
-
Target
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe
-
Size
675KB
-
MD5
c940ccb63a9e82b872adf97bb9f00e46
-
SHA1
9429bd1525eac2a7ebd3083dbf75dfba06e1e7d1
-
SHA256
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211
-
SHA512
0d3fcd872b25b5d177d61c4cf991bd74816fbb43c36fc3ab4feaa238c7c32e48fedd3f937fa90069c7ef8575590bb15685ca71cf3250bd747e82e484d1fdf785
-
SSDEEP
12288:8Mrky90VfWt9ofEZ0Yk8izrY/63EIUQcKt2Z/rGwOEJUKkZlQDYcyZ:Iy6f64EZ0x8ivYCiQXurG/nlQDWZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1114.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1114.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4660-189-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-190-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-192-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-194-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-196-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-198-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-200-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-202-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-204-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-206-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-208-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-210-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-212-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-214-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-216-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-218-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-220-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-222-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4660-444-0x00000000026F0000-0x0000000002700000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1232 un083147.exe 3008 pro1114.exe 4660 qu9432.exe 220 si858561.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1114.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un083147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un083147.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1872 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2404 3008 WerFault.exe 86 1440 4660 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3008 pro1114.exe 3008 pro1114.exe 4660 qu9432.exe 4660 qu9432.exe 220 si858561.exe 220 si858561.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3008 pro1114.exe Token: SeDebugPrivilege 4660 qu9432.exe Token: SeDebugPrivilege 220 si858561.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1232 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 85 PID 4280 wrote to memory of 1232 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 85 PID 4280 wrote to memory of 1232 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 85 PID 1232 wrote to memory of 3008 1232 un083147.exe 86 PID 1232 wrote to memory of 3008 1232 un083147.exe 86 PID 1232 wrote to memory of 3008 1232 un083147.exe 86 PID 1232 wrote to memory of 4660 1232 un083147.exe 92 PID 1232 wrote to memory of 4660 1232 un083147.exe 92 PID 1232 wrote to memory of 4660 1232 un083147.exe 92 PID 4280 wrote to memory of 220 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 97 PID 4280 wrote to memory of 220 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 97 PID 4280 wrote to memory of 220 4280 1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe"C:\Users\Admin\AppData\Local\Temp\1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 10804⤵
- Program crash
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 15724⤵
- Program crash
PID:1440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3008 -ip 30081⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4660 -ip 46601⤵PID:4240
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cd473d178b52f269135ad496adb0638c
SHA18779e12d1659fe1f46083bca5844defd239a191a
SHA256ab963f7930849c99048946e5ac4a95ee82825ebd57c608edada6de3731ce9381
SHA512f580f41ee925bc7f0cebb1987e3ec838e3c71ae9820fb1b324d7450e5839a6e2949bcbd275e617fb2673750330b43d44ad0e422a2661d6fdcd8739cb02c6241e
-
Filesize
175KB
MD5cd473d178b52f269135ad496adb0638c
SHA18779e12d1659fe1f46083bca5844defd239a191a
SHA256ab963f7930849c99048946e5ac4a95ee82825ebd57c608edada6de3731ce9381
SHA512f580f41ee925bc7f0cebb1987e3ec838e3c71ae9820fb1b324d7450e5839a6e2949bcbd275e617fb2673750330b43d44ad0e422a2661d6fdcd8739cb02c6241e
-
Filesize
534KB
MD5b48e9e08c04cebd448976ef2254d6199
SHA1363a00d74ec99686455d9b9628bd954676399ee4
SHA256373159b369a2a5ca728dcf3b064b38b34c40a24878519f31fbfcaf54c49b7d0a
SHA5121a510b353ed3ad1a12fa48dc3382d68004af1240c7173e00ab3fa9e18a79120f3bfd5f7f0be3046f538549229ec9456b4913d4dbfc844eba4f6655f6bc25d527
-
Filesize
534KB
MD5b48e9e08c04cebd448976ef2254d6199
SHA1363a00d74ec99686455d9b9628bd954676399ee4
SHA256373159b369a2a5ca728dcf3b064b38b34c40a24878519f31fbfcaf54c49b7d0a
SHA5121a510b353ed3ad1a12fa48dc3382d68004af1240c7173e00ab3fa9e18a79120f3bfd5f7f0be3046f538549229ec9456b4913d4dbfc844eba4f6655f6bc25d527
-
Filesize
272KB
MD5a1f0d4e3d667ede15048192711a59431
SHA1fec9318aef38b94ba172e8474691303596bb4b25
SHA256cf28fecdcfb8cea611abf64529d8dbecfdb0f535e829a091428966a00d793db7
SHA512ce160408045d225f73165d08e4fbe8d29a62dd44d640d3d87875bd725c07ce4b533ebc7d803bae99a61d5e8ee6fa4faaca216061fb6a4204e609b7d968ae32bc
-
Filesize
272KB
MD5a1f0d4e3d667ede15048192711a59431
SHA1fec9318aef38b94ba172e8474691303596bb4b25
SHA256cf28fecdcfb8cea611abf64529d8dbecfdb0f535e829a091428966a00d793db7
SHA512ce160408045d225f73165d08e4fbe8d29a62dd44d640d3d87875bd725c07ce4b533ebc7d803bae99a61d5e8ee6fa4faaca216061fb6a4204e609b7d968ae32bc
-
Filesize
331KB
MD5042d564da9f06dfb11d1fa05335d8833
SHA1d780f9d7a05a82707bdceec66b7a74f645913c1b
SHA256cc3b05e872c158664337b56386bed1b0730f8e35aca3a4b1156afb737d211c22
SHA512208081080fe62fa1d5809c69ac5e7c7cfd1a02aeb53ca887c90f90f78066b7bedb4f978c1181eb391b88c0c2e482b88c95e27e8e8b2a7a2d617f287c13725c0e
-
Filesize
331KB
MD5042d564da9f06dfb11d1fa05335d8833
SHA1d780f9d7a05a82707bdceec66b7a74f645913c1b
SHA256cc3b05e872c158664337b56386bed1b0730f8e35aca3a4b1156afb737d211c22
SHA512208081080fe62fa1d5809c69ac5e7c7cfd1a02aeb53ca887c90f90f78066b7bedb4f978c1181eb391b88c0c2e482b88c95e27e8e8b2a7a2d617f287c13725c0e