Analysis
-
max time kernel
55s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:00
Static task
static1
Behavioral task
behavioral1
Sample
0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe
Resource
win10v2004-20230220-en
General
-
Target
0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe
-
Size
675KB
-
MD5
00fbed0ca9b05c95a48cae163047ce19
-
SHA1
9931de3b681db5ebc7db702c5d7386af1f86804e
-
SHA256
0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a
-
SHA512
93dd146f4b513f8715c3dfc1ecdab766095cc64a60d2795bb97758bb51e6b741a429f98fdfb04933ddc2bbb123a2d6bcf7849182f8bb40b87e4b9198d6030648
-
SSDEEP
12288:SMrry90Ih3vKhKdYpgv7Pau27k1wrHCYGtIRcRRyEk1ZzrawEEJUureLjw:VyXdlbrR27swbCWRuIEkDrahxLjw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0704.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2256-188-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-189-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-199-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-201-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-203-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-205-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-207-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-219-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-221-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/2256-1108-0x0000000004DC0000-0x0000000004DD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5104 un872111.exe 1640 pro0704.exe 2256 qu1261.exe 4892 si082912.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0704.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un872111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un872111.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1736 1640 WerFault.exe 84 3888 2256 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1640 pro0704.exe 1640 pro0704.exe 2256 qu1261.exe 2256 qu1261.exe 4892 si082912.exe 4892 si082912.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1640 pro0704.exe Token: SeDebugPrivilege 2256 qu1261.exe Token: SeDebugPrivilege 4892 si082912.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 552 wrote to memory of 5104 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 83 PID 552 wrote to memory of 5104 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 83 PID 552 wrote to memory of 5104 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 83 PID 5104 wrote to memory of 1640 5104 un872111.exe 84 PID 5104 wrote to memory of 1640 5104 un872111.exe 84 PID 5104 wrote to memory of 1640 5104 un872111.exe 84 PID 5104 wrote to memory of 2256 5104 un872111.exe 90 PID 5104 wrote to memory of 2256 5104 un872111.exe 90 PID 5104 wrote to memory of 2256 5104 un872111.exe 90 PID 552 wrote to memory of 4892 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 94 PID 552 wrote to memory of 4892 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 94 PID 552 wrote to memory of 4892 552 0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe"C:\Users\Admin\AppData\Local\Temp\0fa2e269f892fb8cc9a232942af82a55b0f2037e2b426086da907b09713dd70a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0704.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10804⤵
- Program crash
PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1261.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 13484⤵
- Program crash
PID:3888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si082912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si082912.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1640 -ip 16401⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2256 -ip 22561⤵PID:3756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59d1662ea01303a077f714e14804b6ec6
SHA16506fb86f9f0d61cd787851b0936723d62f82757
SHA256223bcd7e7954eb58879420ec48a7181f541e3da0ec954db1e8f06d341f6f24a8
SHA512be1a3f98a308f893c7f1f95ba876bac484abfb8324fd711bb1c17ca84b3b8235e2292a5febd9dc7605f7ff6845f177445328b96f98c20dd2af37e8173f35b641
-
Filesize
175KB
MD59d1662ea01303a077f714e14804b6ec6
SHA16506fb86f9f0d61cd787851b0936723d62f82757
SHA256223bcd7e7954eb58879420ec48a7181f541e3da0ec954db1e8f06d341f6f24a8
SHA512be1a3f98a308f893c7f1f95ba876bac484abfb8324fd711bb1c17ca84b3b8235e2292a5febd9dc7605f7ff6845f177445328b96f98c20dd2af37e8173f35b641
-
Filesize
533KB
MD5b3ae229456743776844e392325593cea
SHA1aa9328bacdc6646bb3d7552342a7b1d498b33823
SHA256bcb067c2afe95fdddf2245581ec29a455ed6d7a7b2f6fd959d9363710e7fc071
SHA5126aa09e3cf6e8db6dc78bcc969c1b52d87ff1c9af15fe43673995498f0e5bb1c0b1ed6e438ea929669cfa2d55648d28c3817e88291bbe216729ea2b8f514c3ea5
-
Filesize
533KB
MD5b3ae229456743776844e392325593cea
SHA1aa9328bacdc6646bb3d7552342a7b1d498b33823
SHA256bcb067c2afe95fdddf2245581ec29a455ed6d7a7b2f6fd959d9363710e7fc071
SHA5126aa09e3cf6e8db6dc78bcc969c1b52d87ff1c9af15fe43673995498f0e5bb1c0b1ed6e438ea929669cfa2d55648d28c3817e88291bbe216729ea2b8f514c3ea5
-
Filesize
272KB
MD54cf7f8bc3def7230a83f981922fe24b1
SHA1dfc42499f54febd9c28e254857f69980930024ec
SHA2566751dc9522155c423f32d4c82eba4889e26f845f609f4c7fe6134250c5961f77
SHA5120b5e9e06c6522610bbd151afae65ba0767d0cfa32d810fe211de96c1e80ae7478d8564ea7656ab80f7e8649d35a3ed62d2c374408bc5b2808891100c4ce08660
-
Filesize
272KB
MD54cf7f8bc3def7230a83f981922fe24b1
SHA1dfc42499f54febd9c28e254857f69980930024ec
SHA2566751dc9522155c423f32d4c82eba4889e26f845f609f4c7fe6134250c5961f77
SHA5120b5e9e06c6522610bbd151afae65ba0767d0cfa32d810fe211de96c1e80ae7478d8564ea7656ab80f7e8649d35a3ed62d2c374408bc5b2808891100c4ce08660
-
Filesize
331KB
MD5bd43cd78eb793f1cd2b73328c1ffea68
SHA158aea561ea9a2a4892bdb2af2d1db2c4dbd32cba
SHA2563eca28e4fbf36b1823136210ad9177e0fcbf96aa33fbedf2af08b21d40f684a2
SHA51238f43e3b1ce378ec4064ccdfc6c2c7d0435a10cb1b551798e34e6aa4f37332ceb0cae88c26df46e7f914cee9d3757f60a6c6ac07152d3a9127c70e8f93ed91f5
-
Filesize
331KB
MD5bd43cd78eb793f1cd2b73328c1ffea68
SHA158aea561ea9a2a4892bdb2af2d1db2c4dbd32cba
SHA2563eca28e4fbf36b1823136210ad9177e0fcbf96aa33fbedf2af08b21d40f684a2
SHA51238f43e3b1ce378ec4064ccdfc6c2c7d0435a10cb1b551798e34e6aa4f37332ceb0cae88c26df46e7f914cee9d3757f60a6c6ac07152d3a9127c70e8f93ed91f5