Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:06
Static task
static1
Behavioral task
behavioral1
Sample
9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe
Resource
win10v2004-20230221-en
General
-
Target
9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe
-
Size
698KB
-
MD5
23e6a225e7f41bb4893ef914d558d7de
-
SHA1
3ff010e9dbe1af96c4116717d95c5ab34930af2f
-
SHA256
9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2
-
SHA512
f4918c63a6ca528215206eff4a2a2c968049b3a771a19615bf14d9daf62378ef2d26cc0c6131966f644e72a29cf9641ae86bf1efefe215dc9fcda319792fc08c
-
SSDEEP
12288:vMrUy90xzkkhDyHQB7ZCa+OyrLseUWO9bhReMIzkPyIkrL+dQ7auotOS:jyQzkPHENIOpemclkPsrL+daa2S
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1060.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1060.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/888-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/888-1114-0x0000000004DD0000-0x0000000004DE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1524 un893578.exe 2692 pro1060.exe 888 qu7577.exe 2776 si314808.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1060.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un893578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un893578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1784 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4640 2692 WerFault.exe 84 2404 888 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 pro1060.exe 2692 pro1060.exe 888 qu7577.exe 888 qu7577.exe 2776 si314808.exe 2776 si314808.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro1060.exe Token: SeDebugPrivilege 888 qu7577.exe Token: SeDebugPrivilege 2776 si314808.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1524 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 83 PID 2640 wrote to memory of 1524 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 83 PID 2640 wrote to memory of 1524 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 83 PID 1524 wrote to memory of 2692 1524 un893578.exe 84 PID 1524 wrote to memory of 2692 1524 un893578.exe 84 PID 1524 wrote to memory of 2692 1524 un893578.exe 84 PID 1524 wrote to memory of 888 1524 un893578.exe 90 PID 1524 wrote to memory of 888 1524 un893578.exe 90 PID 1524 wrote to memory of 888 1524 un893578.exe 90 PID 2640 wrote to memory of 2776 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 94 PID 2640 wrote to memory of 2776 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 94 PID 2640 wrote to memory of 2776 2640 9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe"C:\Users\Admin\AppData\Local\Temp\9e02a3be1dcab01e9bd74806e470e7cc8886fb9af9367e6abcf7bd49edc211d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un893578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un893578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1060.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10844⤵
- Program crash
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7577.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 13484⤵
- Program crash
PID:2404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si314808.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si314808.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2692 -ip 26921⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 888 -ip 8881⤵PID:4752
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f0ba835bf7dca35ce54914e869a65be3
SHA194654f71f57978ff886f0af89585da0e82baefaf
SHA256022d09a3754b4f4b0fdf2070ebf48a0d065c9f1b9fbb218718dac5646dd7e102
SHA5123165bbf944e5ff6712b51f1e72435d85b7c6f1210bef378c19779db2f921904c9e6121ecedef68d701c0052c1ddccbcb79811adb11e9fd28daa3da37ebcc8973
-
Filesize
175KB
MD5f0ba835bf7dca35ce54914e869a65be3
SHA194654f71f57978ff886f0af89585da0e82baefaf
SHA256022d09a3754b4f4b0fdf2070ebf48a0d065c9f1b9fbb218718dac5646dd7e102
SHA5123165bbf944e5ff6712b51f1e72435d85b7c6f1210bef378c19779db2f921904c9e6121ecedef68d701c0052c1ddccbcb79811adb11e9fd28daa3da37ebcc8973
-
Filesize
556KB
MD5740bd5ba51a334a1d333c1491546cc49
SHA1285b8ddb05a4a53de8903008d389819125ea0cda
SHA25655a4b6bdd4b0b50358e1a6bafcadb5dbc779c2d5fa405694f28399407e413be8
SHA51298925f297c41e2aa1def882dd11504fe8e54f102655195656be45373f22f9aa717c7bf625601959430c254115d12cbbd43e606cf46e446217ef55468d167b304
-
Filesize
556KB
MD5740bd5ba51a334a1d333c1491546cc49
SHA1285b8ddb05a4a53de8903008d389819125ea0cda
SHA25655a4b6bdd4b0b50358e1a6bafcadb5dbc779c2d5fa405694f28399407e413be8
SHA51298925f297c41e2aa1def882dd11504fe8e54f102655195656be45373f22f9aa717c7bf625601959430c254115d12cbbd43e606cf46e446217ef55468d167b304
-
Filesize
307KB
MD5372a417d85928c9bd538b0ba6a9591d3
SHA15edc4d376ef1c0f46fa840cb32dcb434868dd297
SHA2560e1d8d08b0dee7170d1a3faaef16226c4bdb1719367ac1e98aba5a42eef5c60b
SHA5124cd5d7a2ec705b0f8007069193f47112c1cb43f3cc0a24d5d425654164d86fab085f092cd412c360a2a1ebc1acdbbe26c1a8e4928db3b8112a4be7fcaf4cbe7d
-
Filesize
307KB
MD5372a417d85928c9bd538b0ba6a9591d3
SHA15edc4d376ef1c0f46fa840cb32dcb434868dd297
SHA2560e1d8d08b0dee7170d1a3faaef16226c4bdb1719367ac1e98aba5a42eef5c60b
SHA5124cd5d7a2ec705b0f8007069193f47112c1cb43f3cc0a24d5d425654164d86fab085f092cd412c360a2a1ebc1acdbbe26c1a8e4928db3b8112a4be7fcaf4cbe7d
-
Filesize
331KB
MD56a5ec87fa5ae8a31ba81566c643aff4f
SHA1d5e9ef1c8a0cec97bb5e4a285a819ea5b5d230d2
SHA256b70fac3fc917e39da7171be4e43ab36a1dfa07b9ae293f0cad545e4515b21dd4
SHA512d5a59f4567d40570a2f1594394d0972bf59ac7643b3737856478018ae43f42523b557c5c499567b84f6947540886baab5307f9d4cc6c736737fae806c95f6ab4
-
Filesize
331KB
MD56a5ec87fa5ae8a31ba81566c643aff4f
SHA1d5e9ef1c8a0cec97bb5e4a285a819ea5b5d230d2
SHA256b70fac3fc917e39da7171be4e43ab36a1dfa07b9ae293f0cad545e4515b21dd4
SHA512d5a59f4567d40570a2f1594394d0972bf59ac7643b3737856478018ae43f42523b557c5c499567b84f6947540886baab5307f9d4cc6c736737fae806c95f6ab4