Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe
Resource
win10v2004-20230220-en
General
-
Target
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe
-
Size
700KB
-
MD5
5323916590f6d2996a5aa2eca8d4ffab
-
SHA1
b3be78789c18dc0ac41b39474b5756818c26281a
-
SHA256
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969
-
SHA512
40351b2aaa72e65bec1e5325ef4715cad61b8598cc788c434b957df9fa36bdaa3101ea966d707eaf0482659cb8612226db24b9359816ff8d10e6dabaf7eb67aa
-
SSDEEP
12288:6Mruy90xoMzlpW2k8WR5ujJxuQbDXanC3F81ei2EZNwPghLA3M7Y9IFqNk8:Uywzl8/5ulUQbDKnC2xBZNAgxcM7Y9Gk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6055.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4080-189-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-188-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-191-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-193-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-195-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-197-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-199-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-201-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-203-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-205-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-207-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-212-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-215-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-217-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-219-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-221-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-223-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/4080-225-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1468 un591297.exe 1240 pro6055.exe 4080 qu5700.exe 3432 si699205.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6055.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un591297.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un591297.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 396 1240 WerFault.exe 84 5000 4080 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1240 pro6055.exe 1240 pro6055.exe 4080 qu5700.exe 4080 qu5700.exe 3432 si699205.exe 3432 si699205.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1240 pro6055.exe Token: SeDebugPrivilege 4080 qu5700.exe Token: SeDebugPrivilege 3432 si699205.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1468 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 83 PID 1444 wrote to memory of 1468 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 83 PID 1444 wrote to memory of 1468 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 83 PID 1468 wrote to memory of 1240 1468 un591297.exe 84 PID 1468 wrote to memory of 1240 1468 un591297.exe 84 PID 1468 wrote to memory of 1240 1468 un591297.exe 84 PID 1468 wrote to memory of 4080 1468 un591297.exe 87 PID 1468 wrote to memory of 4080 1468 un591297.exe 87 PID 1468 wrote to memory of 4080 1468 un591297.exe 87 PID 1444 wrote to memory of 3432 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 91 PID 1444 wrote to memory of 3432 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 91 PID 1444 wrote to memory of 3432 1444 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe"C:\Users\Admin\AppData\Local\Temp\72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un591297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un591297.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6055.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6055.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10844⤵
- Program crash
PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5700.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5700.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13284⤵
- Program crash
PID:5000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699205.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699205.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1240 -ip 12401⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4080 -ip 40801⤵PID:5084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5aa48b3139148b781a463fc31f85e524d
SHA1c1a1d3ceb9c2900f6d326dc9286fba33c3c62613
SHA256c516d90850e747376f89ea5ee4c28bf8492c683b1842df4deead2c5f3131bced
SHA51249718be1745c83384b2b77933f983630b9d58de051db31faad7f1f1b01991310a4f08c916e8ec06b63ecd093c84d723441ff0b09f67c015b1892e53a2a5ef0a0
-
Filesize
175KB
MD5aa48b3139148b781a463fc31f85e524d
SHA1c1a1d3ceb9c2900f6d326dc9286fba33c3c62613
SHA256c516d90850e747376f89ea5ee4c28bf8492c683b1842df4deead2c5f3131bced
SHA51249718be1745c83384b2b77933f983630b9d58de051db31faad7f1f1b01991310a4f08c916e8ec06b63ecd093c84d723441ff0b09f67c015b1892e53a2a5ef0a0
-
Filesize
558KB
MD5a4ff460c93ef82b563eaedd34fda4e3a
SHA1654ae9f11fca4ab08c365e32bad250bc4ccae85f
SHA256e8d9284fd6e9e87213b54ae02453f388cc6d6fda19a86772986ca030f4a0670a
SHA5127d97f1ed6f4eb73ff65f6326475b22d5b17bd15b5838a20cb0f82e94661896dde4e05aaf2961aa21cb695f65e22e1b83e36bc5eb9d72c9aa104f19868772f89b
-
Filesize
558KB
MD5a4ff460c93ef82b563eaedd34fda4e3a
SHA1654ae9f11fca4ab08c365e32bad250bc4ccae85f
SHA256e8d9284fd6e9e87213b54ae02453f388cc6d6fda19a86772986ca030f4a0670a
SHA5127d97f1ed6f4eb73ff65f6326475b22d5b17bd15b5838a20cb0f82e94661896dde4e05aaf2961aa21cb695f65e22e1b83e36bc5eb9d72c9aa104f19868772f89b
-
Filesize
307KB
MD5877ff81b5e2eb817c8a60af3c5bf5d1a
SHA1220aea98931da761cd8c0e753dae26ab12c93875
SHA256b0bc365068984301b5fc4c720af07615801eff13dbce9f3b8c0a97811c04ca39
SHA512cdbe788854397550b580cd313a6c3fe7332f98c497205006e041717ea46a31f88280dcf06213715bf8cd25f1959c119b90de74610871a8c578b108330fbb76d2
-
Filesize
307KB
MD5877ff81b5e2eb817c8a60af3c5bf5d1a
SHA1220aea98931da761cd8c0e753dae26ab12c93875
SHA256b0bc365068984301b5fc4c720af07615801eff13dbce9f3b8c0a97811c04ca39
SHA512cdbe788854397550b580cd313a6c3fe7332f98c497205006e041717ea46a31f88280dcf06213715bf8cd25f1959c119b90de74610871a8c578b108330fbb76d2
-
Filesize
366KB
MD525526b7310af385e9af6021721941205
SHA10261c40d0429580c3bd5b1de3f53643bfa672ee2
SHA256b02a42b95bb5ff08d1657072b37e2302433754e0cd4cc773b1c4dbb7d6c2fddd
SHA512e9897b785c86c96bed6078ade61cfd26541ce562efe9425b32ebf5e1292bcbed408d512a8b0eee29d4e70b0aa1567254b65a2e9b595d174cf9660ddc6102f51c
-
Filesize
366KB
MD525526b7310af385e9af6021721941205
SHA10261c40d0429580c3bd5b1de3f53643bfa672ee2
SHA256b02a42b95bb5ff08d1657072b37e2302433754e0cd4cc773b1c4dbb7d6c2fddd
SHA512e9897b785c86c96bed6078ade61cfd26541ce562efe9425b32ebf5e1292bcbed408d512a8b0eee29d4e70b0aa1567254b65a2e9b595d174cf9660ddc6102f51c