Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:41
Static task
static1
Behavioral task
behavioral1
Sample
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe
Resource
win10v2004-20230220-en
General
-
Target
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe
-
Size
690KB
-
MD5
18dd54cf38ed9d12d03073a8b29fa347
-
SHA1
3c646221303c3c258934796922a7aa2c18bb843d
-
SHA256
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4
-
SHA512
a741a6f3b2af66fcfee2361c83c05a301abeb85b9663b71d6995cf91cfdd23a7ae76400c8e7aedef02d856769ebf6dd1f8558d34b67a744324055cb1e626801d
-
SSDEEP
12288:VMrqy90wbFXE5f1n80ZR5bsrrIq0Ulj/e5mWXFHqbRfdNoUQhhTjgy:Hyble8C4rkqh7UmWCIBhhT8y
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Processes:
pro1418.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1418.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1418.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1418.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1418.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1418.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1418.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-194-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-195-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-199-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-197-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-201-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-203-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-205-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-207-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-209-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-211-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-213-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-217-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-215-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-219-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-221-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-223-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-225-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/2180-227-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
un958577.exepro1418.exequ1782.exepid process 1620 un958577.exe 4852 pro1418.exe 2180 qu1782.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1418.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1418.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1418.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exeun958577.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un958577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un958577.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2832 4852 WerFault.exe pro1418.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
pro1418.exequ1782.exepid process 4852 pro1418.exe 4852 pro1418.exe 2180 qu1782.exe 2180 qu1782.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1418.exequ1782.exedescription pid process Token: SeDebugPrivilege 4852 pro1418.exe Token: SeDebugPrivilege 2180 qu1782.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exeun958577.exedescription pid process target process PID 1760 wrote to memory of 1620 1760 8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe un958577.exe PID 1760 wrote to memory of 1620 1760 8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe un958577.exe PID 1760 wrote to memory of 1620 1760 8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe un958577.exe PID 1620 wrote to memory of 4852 1620 un958577.exe pro1418.exe PID 1620 wrote to memory of 4852 1620 un958577.exe pro1418.exe PID 1620 wrote to memory of 4852 1620 un958577.exe pro1418.exe PID 1620 wrote to memory of 2180 1620 un958577.exe qu1782.exe PID 1620 wrote to memory of 2180 1620 un958577.exe qu1782.exe PID 1620 wrote to memory of 2180 1620 un958577.exe qu1782.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe"C:\Users\Admin\AppData\Local\Temp\8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1418.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 10844⤵
- Program crash
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1782.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4852 -ip 48521⤵PID:3684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD54482c075e8e3c8e1daae8386908235fc
SHA1b1df800f4b56288ec65b4a6490156ec543ed67e8
SHA256c6d0bfd8ed6f7724949ceb81c43b82eac3e47ce39693fc02629ce339c4540faf
SHA5122905ea3dcfd85672489639ccfacbeafca980d91b8b5be74efdb239c6f7399377d4caaea7d2f7292a7de1654f2d3ec46030214e8e31d59c9757b882fc71911eb5
-
Filesize
549KB
MD54482c075e8e3c8e1daae8386908235fc
SHA1b1df800f4b56288ec65b4a6490156ec543ed67e8
SHA256c6d0bfd8ed6f7724949ceb81c43b82eac3e47ce39693fc02629ce339c4540faf
SHA5122905ea3dcfd85672489639ccfacbeafca980d91b8b5be74efdb239c6f7399377d4caaea7d2f7292a7de1654f2d3ec46030214e8e31d59c9757b882fc71911eb5
-
Filesize
291KB
MD534cd6b6387390489459fef85dc68e1ca
SHA166940014ee16bb59ac3598e00f31b284fd5c6198
SHA2565acaeef4f31ac06a733563b4c6e1eed2337b850abdf54d11686c909073477221
SHA512d98a80812f87bc669131ab628f0432c472e13b160f752a1bdb1dd0aa3bcee56dfa3dbb57343352d0c4aa95045f8094ab7345af19cc7bb4e1a30ad25c1cae0369
-
Filesize
291KB
MD534cd6b6387390489459fef85dc68e1ca
SHA166940014ee16bb59ac3598e00f31b284fd5c6198
SHA2565acaeef4f31ac06a733563b4c6e1eed2337b850abdf54d11686c909073477221
SHA512d98a80812f87bc669131ab628f0432c472e13b160f752a1bdb1dd0aa3bcee56dfa3dbb57343352d0c4aa95045f8094ab7345af19cc7bb4e1a30ad25c1cae0369
-
Filesize
350KB
MD537f79014c812d6796f6f65476ca2e45d
SHA1f6f57930a12c73abb7b211bfd25f84dbb2abeb70
SHA2567635ad0bf24f1a41eac13367e8451528e034de2399119694710365fcb15c94bf
SHA5126e6b02fe1dbebe13fa8bedd2b2f45a093c48fc21f3fc1dae7d29f06ef1202f6a5d3b95984a2cecfe3b5bfa4f95f52a52af21b3cb73046cb532b9ad68b5fdc354
-
Filesize
350KB
MD537f79014c812d6796f6f65476ca2e45d
SHA1f6f57930a12c73abb7b211bfd25f84dbb2abeb70
SHA2567635ad0bf24f1a41eac13367e8451528e034de2399119694710365fcb15c94bf
SHA5126e6b02fe1dbebe13fa8bedd2b2f45a093c48fc21f3fc1dae7d29f06ef1202f6a5d3b95984a2cecfe3b5bfa4f95f52a52af21b3cb73046cb532b9ad68b5fdc354