Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe
Resource
win10v2004-20230220-en
General
-
Target
34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe
-
Size
675KB
-
MD5
0d97f051deea7bdd0be816105b0fa03d
-
SHA1
4ab863673f93280b659ab6e9a0c1855c2b075ae5
-
SHA256
34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e
-
SHA512
3bf0f28ea6cd1626be6014c36c423a3ee6ee61c1d12c3be973cea09815116e0d4f2e7cbbed5a3575b7a9ea48a9b5313467fba4eb5d7ee2aa347e975cd7dcac75
-
SSDEEP
12288:AMrIy90uc+GvDShzWJZp3OJ2CHjMayT0zh6nm4X/k6ZOrdwmEJUvi+HDS:4y8+GLScJZMjpFx+/kbrd39O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7119.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4212-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4212-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4508 un779254.exe 2096 pro7119.exe 4212 qu3944.exe 2100 si225193.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7119.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7119.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un779254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un779254.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3832 2096 WerFault.exe 84 400 4212 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2096 pro7119.exe 2096 pro7119.exe 4212 qu3944.exe 4212 qu3944.exe 2100 si225193.exe 2100 si225193.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2096 pro7119.exe Token: SeDebugPrivilege 4212 qu3944.exe Token: SeDebugPrivilege 2100 si225193.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4508 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 83 PID 4088 wrote to memory of 4508 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 83 PID 4088 wrote to memory of 4508 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 83 PID 4508 wrote to memory of 2096 4508 un779254.exe 84 PID 4508 wrote to memory of 2096 4508 un779254.exe 84 PID 4508 wrote to memory of 2096 4508 un779254.exe 84 PID 4508 wrote to memory of 4212 4508 un779254.exe 93 PID 4508 wrote to memory of 4212 4508 un779254.exe 93 PID 4508 wrote to memory of 4212 4508 un779254.exe 93 PID 4088 wrote to memory of 2100 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 97 PID 4088 wrote to memory of 2100 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 97 PID 4088 wrote to memory of 2100 4088 34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe"C:\Users\Admin\AppData\Local\Temp\34873529b3b06a84d9ce5695bcce9fa3d75abac5ce4148f6e4264a55078fea9e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un779254.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un779254.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 10844⤵
- Program crash
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3944.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 10084⤵
- Program crash
PID:400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si225193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si225193.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2096 -ip 20961⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4212 -ip 42121⤵PID:2860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f82c6642e389e4d529454a316f75fdda
SHA1b511027d8f81c8a46d339730254fd90a1905ae54
SHA2563e79b88bdf7a27dc3452f6bc1e6e32774933df5a9fd6d7609cf10a5f0c260697
SHA512e3292a229cd54f5c72b2488b1934e5b1c71349f8eaba2f43640c2b2d0048bb8f86db42b5f6a71e351b59f547bf9111d24d12c7f930a060100b70f1576f991c6e
-
Filesize
175KB
MD5f82c6642e389e4d529454a316f75fdda
SHA1b511027d8f81c8a46d339730254fd90a1905ae54
SHA2563e79b88bdf7a27dc3452f6bc1e6e32774933df5a9fd6d7609cf10a5f0c260697
SHA512e3292a229cd54f5c72b2488b1934e5b1c71349f8eaba2f43640c2b2d0048bb8f86db42b5f6a71e351b59f547bf9111d24d12c7f930a060100b70f1576f991c6e
-
Filesize
533KB
MD50fdbe2032b4b1b0e3a54b460873fd15b
SHA1717837f6c55231b52327985158e816dd6781ad39
SHA2566cf08acb5ba49b4cf054d4faf27a8478647c0e50cec89626cf6b8df18a7f539d
SHA51228c3e8d16d75fc1218480d1e59d2853c5b88874e43184602f174a6861b9a7f6d6e01f9e07c2546b7691baf3c8e720141466ef0e099a4664ff4d0f66f6b8ca8d7
-
Filesize
533KB
MD50fdbe2032b4b1b0e3a54b460873fd15b
SHA1717837f6c55231b52327985158e816dd6781ad39
SHA2566cf08acb5ba49b4cf054d4faf27a8478647c0e50cec89626cf6b8df18a7f539d
SHA51228c3e8d16d75fc1218480d1e59d2853c5b88874e43184602f174a6861b9a7f6d6e01f9e07c2546b7691baf3c8e720141466ef0e099a4664ff4d0f66f6b8ca8d7
-
Filesize
272KB
MD5f693266bba4dc7e86124c8b7a5f19aa7
SHA16d1df6b2f595bd89d9a004baacc22fa6b1e28720
SHA256bdda447ae643967d8904d2f53867145c1c4dfa0abb24a869a23c76d70411b52d
SHA51222ba1253aee49f124ac786617900948b4b5f0c8fec600dd6523822c95f34042a9c71332e91d9b2d9a22d249da98a56d1908841876d1b80d87f8dda71fc4b31fc
-
Filesize
272KB
MD5f693266bba4dc7e86124c8b7a5f19aa7
SHA16d1df6b2f595bd89d9a004baacc22fa6b1e28720
SHA256bdda447ae643967d8904d2f53867145c1c4dfa0abb24a869a23c76d70411b52d
SHA51222ba1253aee49f124ac786617900948b4b5f0c8fec600dd6523822c95f34042a9c71332e91d9b2d9a22d249da98a56d1908841876d1b80d87f8dda71fc4b31fc
-
Filesize
331KB
MD50454366cb7907519c88711670436ff0e
SHA14b599c7a23316593b5cd2e6aeb548324c4693e28
SHA2568c732529d77d6f6cca76e54d420d4a2b61624073ddc2aa5faa5d837f29c974b8
SHA512eca9c105e2fa08ee9c186001a7675c0197e7e4fc0c50b4ba44f754d92adf7156c4c59b9f65180d33a4cb11a0440d589ad7062e18b328418296c05ed3cf1f82e0
-
Filesize
331KB
MD50454366cb7907519c88711670436ff0e
SHA14b599c7a23316593b5cd2e6aeb548324c4693e28
SHA2568c732529d77d6f6cca76e54d420d4a2b61624073ddc2aa5faa5d837f29c974b8
SHA512eca9c105e2fa08ee9c186001a7675c0197e7e4fc0c50b4ba44f754d92adf7156c4c59b9f65180d33a4cb11a0440d589ad7062e18b328418296c05ed3cf1f82e0