Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 23:25
Static task
static1
Behavioral task
behavioral1
Sample
b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe
Resource
win10v2004-20230220-en
General
-
Target
b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe
-
Size
696KB
-
MD5
53958239dd3eb50e0ef0e365243e559e
-
SHA1
2a0fc4dfd00fa043547f4efcd85c3001545bc115
-
SHA256
b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9
-
SHA512
d3c35508e11819c3ac236e030bd27b3da82045cf3b4075b3ab566c960b2f7040b41837ed057d415d7acf1562af61da3e51f17a5f22c149695b47d7cc453f256d
-
SSDEEP
12288:4Mrayy904fvu4sL5+GOFMs3NBB9aEfdl69/Vm2Xdu3WTmk0/o4c0fQ:dyJ34IxR9BB9pdl6y2j0w4c0Y
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zaza
176.113.115.145:4125
-
auth_value
48bf44c663fe3c1035fb4dd0b91fde5d
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5976.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4488-190-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-193-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-191-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-195-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-197-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-199-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-201-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-203-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-205-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-207-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-209-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-211-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-213-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-215-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-217-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-220-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-223-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-227-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4488-1110-0x00000000072A0000-0x00000000072B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2568 un033066.exe 4732 pro5976.exe 4488 qu9012.exe 2816 si563055.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5976.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un033066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un033066.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3052 4732 WerFault.exe 84 3880 4488 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4732 pro5976.exe 4732 pro5976.exe 4488 qu9012.exe 4488 qu9012.exe 2816 si563055.exe 2816 si563055.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4732 pro5976.exe Token: SeDebugPrivilege 4488 qu9012.exe Token: SeDebugPrivilege 2816 si563055.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2568 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 83 PID 5044 wrote to memory of 2568 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 83 PID 5044 wrote to memory of 2568 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 83 PID 2568 wrote to memory of 4732 2568 un033066.exe 84 PID 2568 wrote to memory of 4732 2568 un033066.exe 84 PID 2568 wrote to memory of 4732 2568 un033066.exe 84 PID 2568 wrote to memory of 4488 2568 un033066.exe 94 PID 2568 wrote to memory of 4488 2568 un033066.exe 94 PID 2568 wrote to memory of 4488 2568 un033066.exe 94 PID 5044 wrote to memory of 2816 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 99 PID 5044 wrote to memory of 2816 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 99 PID 5044 wrote to memory of 2816 5044 b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe"C:\Users\Admin\AppData\Local\Temp\b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 10804⤵
- Program crash
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 15884⤵
- Program crash
PID:3880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4732 -ip 47321⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4488 -ip 44881⤵PID:2424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD508c34fe2f2ce876701b5c40edc8bb192
SHA1f25f7ba3bc0fc0a1056bce572227212d05b027b8
SHA25648315b5b74a80922d9fcfa014ccf2c4b67ace4b847f8cb5ac345aa31e469882c
SHA512085845890a00976a030eea4da4f9dc88d8bd487c202050291baa859d9d5e4e2334f6ff31e0f700b8b511245ba460a74e05db1201e1b427910717cb5ece3078d9
-
Filesize
175KB
MD508c34fe2f2ce876701b5c40edc8bb192
SHA1f25f7ba3bc0fc0a1056bce572227212d05b027b8
SHA25648315b5b74a80922d9fcfa014ccf2c4b67ace4b847f8cb5ac345aa31e469882c
SHA512085845890a00976a030eea4da4f9dc88d8bd487c202050291baa859d9d5e4e2334f6ff31e0f700b8b511245ba460a74e05db1201e1b427910717cb5ece3078d9
-
Filesize
554KB
MD551380f0febd7a379c718c7b6bf38c62b
SHA10e8a67633040059490d29481ee7c195ca54b0d3a
SHA256b2b1039e3638c8a90ef67d5b1e2eb4fe758c47bb6d980c41f1cbb3aef77ad2eb
SHA512d417cf1d13e84c47148fca0cdbdafdcadb09612f7c063a3108d173d7f77f9fe2acb5adefbc09fed77a5337daa52af3770bd2dc139ed86dbd936186fcbe25a3e4
-
Filesize
554KB
MD551380f0febd7a379c718c7b6bf38c62b
SHA10e8a67633040059490d29481ee7c195ca54b0d3a
SHA256b2b1039e3638c8a90ef67d5b1e2eb4fe758c47bb6d980c41f1cbb3aef77ad2eb
SHA512d417cf1d13e84c47148fca0cdbdafdcadb09612f7c063a3108d173d7f77f9fe2acb5adefbc09fed77a5337daa52af3770bd2dc139ed86dbd936186fcbe25a3e4
-
Filesize
345KB
MD51ca92b5aa008b9dfe64154f199fa2504
SHA19e9761d0455512d0a8b3c27e6d60b29e8cd43ee7
SHA25652dfe0fe9fb674b5b79814162489cd384d8d60ae840ad3f5cb56c963a4cabb79
SHA512cf7a7f15fea183d27c3dc54ecd1b4344a75dcd82283621519ccbcbef1d94dd5571bea81151a38d7ac06fe0f48166c71a7bfb16b1b8eca93137bfd891c8ec21e9
-
Filesize
345KB
MD51ca92b5aa008b9dfe64154f199fa2504
SHA19e9761d0455512d0a8b3c27e6d60b29e8cd43ee7
SHA25652dfe0fe9fb674b5b79814162489cd384d8d60ae840ad3f5cb56c963a4cabb79
SHA512cf7a7f15fea183d27c3dc54ecd1b4344a75dcd82283621519ccbcbef1d94dd5571bea81151a38d7ac06fe0f48166c71a7bfb16b1b8eca93137bfd891c8ec21e9
-
Filesize
403KB
MD52e6a29edd42591d60f1a3f0fac1f79b8
SHA11027f710fc740461eb0eb64b3c0982f61153d113
SHA256c404637c08417f1ab326e5b20893f6d46c2bbc96991bdebd250d4c11ed0b39d5
SHA5120f11a9f80c3a8773d9d2231b62440d7051eb5dce64edac2e7b574d04ddbd3c17c4a773fd120903238ef7a647b32a0384e54046a6a5f49fea54582682d555ec5c
-
Filesize
403KB
MD52e6a29edd42591d60f1a3f0fac1f79b8
SHA11027f710fc740461eb0eb64b3c0982f61153d113
SHA256c404637c08417f1ab326e5b20893f6d46c2bbc96991bdebd250d4c11ed0b39d5
SHA5120f11a9f80c3a8773d9d2231b62440d7051eb5dce64edac2e7b574d04ddbd3c17c4a773fd120903238ef7a647b32a0384e54046a6a5f49fea54582682d555ec5c