Analysis
-
max time kernel
68s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:09
Static task
static1
Behavioral task
behavioral1
Sample
0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe
Resource
win10v2004-20230220-en
General
-
Target
0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe
-
Size
700KB
-
MD5
18e016572ad335c949db52af6fc373f9
-
SHA1
95f60fec3a995514bdc5aeef53db591891beb652
-
SHA256
0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f
-
SHA512
86c26042c12ddf3f91db0f2e011441df1447b1e7480ce3b85dcd7182ab1693a47dd5c8611db4722563cf273e5976c7d3423d19e4c3cb479b72467a26b20224ed
-
SSDEEP
12288:bMrly90qLGvnPF0OyreXsI+jyRkgrMcNwPY2LqkLIMtaf2:6yTCnPyO1cI+jyRhrMcNAYEqeW2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7162.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7162.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4916-191-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-192-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-194-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-196-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-198-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-200-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-202-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-204-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-210-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-212-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-208-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-215-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-219-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-206-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-221-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-223-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-225-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/4916-227-0x00000000026C0000-0x00000000026FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3728 un979848.exe 380 pro7162.exe 4916 qu9750.exe 2500 si544616.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7162.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7162.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un979848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un979848.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 224 380 WerFault.exe 84 4708 4916 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 380 pro7162.exe 380 pro7162.exe 4916 qu9750.exe 4916 qu9750.exe 2500 si544616.exe 2500 si544616.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 380 pro7162.exe Token: SeDebugPrivilege 4916 qu9750.exe Token: SeDebugPrivilege 2500 si544616.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3728 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 83 PID 4456 wrote to memory of 3728 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 83 PID 4456 wrote to memory of 3728 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 83 PID 3728 wrote to memory of 380 3728 un979848.exe 84 PID 3728 wrote to memory of 380 3728 un979848.exe 84 PID 3728 wrote to memory of 380 3728 un979848.exe 84 PID 3728 wrote to memory of 4916 3728 un979848.exe 91 PID 3728 wrote to memory of 4916 3728 un979848.exe 91 PID 3728 wrote to memory of 4916 3728 un979848.exe 91 PID 4456 wrote to memory of 2500 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 95 PID 4456 wrote to memory of 2500 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 95 PID 4456 wrote to memory of 2500 4456 0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe"C:\Users\Admin\AppData\Local\Temp\0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 10844⤵
- Program crash
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 14724⤵
- Program crash
PID:4708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 380 -ip 3801⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4916 -ip 49161⤵PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD539d0d5b8b112c8d1c8aeca058015cad5
SHA1073596bcb73297eae510faf86040e7c76a52b595
SHA2568b7cd6465a9f8e99d47b7b7783aa768bf1c03ad910c3899c55630485235652d0
SHA512a676b8297a44824c2baf8c0e4e9b64f561ad35587cdac18e9c060a725d8c1f077a9c7f2271b376372b80e3c4ddb51676d8fb3ad967505ad5907ce0e178d35411
-
Filesize
175KB
MD539d0d5b8b112c8d1c8aeca058015cad5
SHA1073596bcb73297eae510faf86040e7c76a52b595
SHA2568b7cd6465a9f8e99d47b7b7783aa768bf1c03ad910c3899c55630485235652d0
SHA512a676b8297a44824c2baf8c0e4e9b64f561ad35587cdac18e9c060a725d8c1f077a9c7f2271b376372b80e3c4ddb51676d8fb3ad967505ad5907ce0e178d35411
-
Filesize
557KB
MD54eef7c2859c5e01b220bbe53c004868b
SHA1827b455d1822842031ba078f16f5c2e0c0f8f480
SHA256292838c9277e6cd2589968ef783b53077d7858f049c2cffbcb135aef27a7f4c8
SHA51251ee4110da200c9fd6d3bb785a0d10bc06c001cdcce962573064ca052d51d7fb27eb748137f0e14ab3e3cfb3d9326a75824bfcf6b1d8269d49721c0b36126411
-
Filesize
557KB
MD54eef7c2859c5e01b220bbe53c004868b
SHA1827b455d1822842031ba078f16f5c2e0c0f8f480
SHA256292838c9277e6cd2589968ef783b53077d7858f049c2cffbcb135aef27a7f4c8
SHA51251ee4110da200c9fd6d3bb785a0d10bc06c001cdcce962573064ca052d51d7fb27eb748137f0e14ab3e3cfb3d9326a75824bfcf6b1d8269d49721c0b36126411
-
Filesize
307KB
MD5b0b1156aabfd5f099c15ef1ce33a7396
SHA1225e1e49989e0eb7dd99e000f985c9ff6c5cf9bd
SHA256820f147d5410bdadd071bcce7117788b0529e776a913e5c4f50c91b37c3b103c
SHA512d633721eb7ed6cc083cdfe943b6dbb0c64f0ddc6b44bddb4b413025ac3c43db42a5e83fc871a186849ac5ad30518fc405a6028984912f74429bb9a025727b56a
-
Filesize
307KB
MD5b0b1156aabfd5f099c15ef1ce33a7396
SHA1225e1e49989e0eb7dd99e000f985c9ff6c5cf9bd
SHA256820f147d5410bdadd071bcce7117788b0529e776a913e5c4f50c91b37c3b103c
SHA512d633721eb7ed6cc083cdfe943b6dbb0c64f0ddc6b44bddb4b413025ac3c43db42a5e83fc871a186849ac5ad30518fc405a6028984912f74429bb9a025727b56a
-
Filesize
366KB
MD58478b017e4a600a9f66a5481e3fd6639
SHA11bf97a528a1f95edfa8cb08a9370d3354babb835
SHA2568966afbe40afc33c5e795bdd2c239aaa1ecd651318c564aca9238fe3ca4c3e6d
SHA512d9d53d10a456530c871e4637fc40b2a6d76d9f177508b8ae23cd2b395e087e09ae2092b1d60e6e99191c5154069c6a9c8687ad24d3019716e8cdf71145ae6c9b
-
Filesize
366KB
MD58478b017e4a600a9f66a5481e3fd6639
SHA11bf97a528a1f95edfa8cb08a9370d3354babb835
SHA2568966afbe40afc33c5e795bdd2c239aaa1ecd651318c564aca9238fe3ca4c3e6d
SHA512d9d53d10a456530c871e4637fc40b2a6d76d9f177508b8ae23cd2b395e087e09ae2092b1d60e6e99191c5154069c6a9c8687ad24d3019716e8cdf71145ae6c9b