Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:46
Static task
static1
Behavioral task
behavioral1
Sample
716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe
Resource
win10v2004-20230220-en
General
-
Target
716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe
-
Size
691KB
-
MD5
e9f2e758de0cce9935ae20eb1a12d3ac
-
SHA1
2df61413256fd159c930263881a2b356f4c5bec5
-
SHA256
716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d
-
SHA512
7e91472d915be5697649a11daa94675f9d909339ea9dd257a549584ac51ca3d1ba8bb0689e0e972df265c95946ca819c87e275c9630284eb1b3d73ae9913e34f
-
SSDEEP
12288:ZMrAy90wu6GaZHqe+QsRSi46XQ7kl7zf8oPNyVKmRb/3I+lBJQ0R77EKZk:Vy9u7gq1NXp1yV5R/hBa2gsk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2323.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2323.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4444-191-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-192-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-194-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-196-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-198-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-200-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-202-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-204-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-206-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-210-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-214-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-216-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-218-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-220-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-222-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-224-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-226-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4444-228-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4420 un740187.exe 1264 pro2323.exe 4444 qu9289.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2323.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un740187.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un740187.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4520 1264 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1264 pro2323.exe 1264 pro2323.exe 4444 qu9289.exe 4444 qu9289.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1264 pro2323.exe Token: SeDebugPrivilege 4444 qu9289.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4420 3196 716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe 84 PID 3196 wrote to memory of 4420 3196 716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe 84 PID 3196 wrote to memory of 4420 3196 716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe 84 PID 4420 wrote to memory of 1264 4420 un740187.exe 85 PID 4420 wrote to memory of 1264 4420 un740187.exe 85 PID 4420 wrote to memory of 1264 4420 un740187.exe 85 PID 4420 wrote to memory of 4444 4420 un740187.exe 92 PID 4420 wrote to memory of 4444 4420 un740187.exe 92 PID 4420 wrote to memory of 4444 4420 un740187.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe"C:\Users\Admin\AppData\Local\Temp\716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740187.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740187.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2323.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2323.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10844⤵
- Program crash
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9289.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9289.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1264 -ip 12641⤵PID:4140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD5b96d1bebc0fb567991d8654a8321eb82
SHA10b04e243e4a55a4d7ba1ff1b358bc79d3eb6f165
SHA2568af00acaa5b91e8d2ea3fec3a72987f08b2ccb616ca1d4fe7e42e7fe8b42fdae
SHA512cd443522bcbb09b22115d196ca42342a7d5444e69b3424f7d5a94393362bbddd1f991db6bd79d5cdf6d7c1cd8bf3c21ab570d973e5227276a88bbf2f3720e3f9
-
Filesize
549KB
MD5b96d1bebc0fb567991d8654a8321eb82
SHA10b04e243e4a55a4d7ba1ff1b358bc79d3eb6f165
SHA2568af00acaa5b91e8d2ea3fec3a72987f08b2ccb616ca1d4fe7e42e7fe8b42fdae
SHA512cd443522bcbb09b22115d196ca42342a7d5444e69b3424f7d5a94393362bbddd1f991db6bd79d5cdf6d7c1cd8bf3c21ab570d973e5227276a88bbf2f3720e3f9
-
Filesize
291KB
MD5dc5cc51a00836b795b33beff3c345722
SHA1738178f789782ed8d510c3e01680342cf3579c25
SHA2567f64aeab791d278aa7074a8e85c0443d2d7d42f015e6ca576ba39075540d961c
SHA512667a38d6b39a5a0062e578d49843d45522dd46e7f6a4df0fbffd5cda880ede44b05afe537d75272a75cd6b3bbba82171afaaee5b7541cea7d140addd5daa0bb2
-
Filesize
291KB
MD5dc5cc51a00836b795b33beff3c345722
SHA1738178f789782ed8d510c3e01680342cf3579c25
SHA2567f64aeab791d278aa7074a8e85c0443d2d7d42f015e6ca576ba39075540d961c
SHA512667a38d6b39a5a0062e578d49843d45522dd46e7f6a4df0fbffd5cda880ede44b05afe537d75272a75cd6b3bbba82171afaaee5b7541cea7d140addd5daa0bb2
-
Filesize
350KB
MD5b6be52b7412a2121a9d4d959304cd778
SHA1cd0a63a9f9a99d5854456a6ba4dfcd5cde2cd698
SHA25668e15db770aa1e597c440463f0fe29330bfe5f31daaab2b274ef67c25317e029
SHA512fb705c33fedc287d9a6f3f692fb2117e77988ca41365edb8869c21bfbb533b0869e9eed56031ff550c70111a331068ee031f9e3677536a26a231468c202cfb05
-
Filesize
350KB
MD5b6be52b7412a2121a9d4d959304cd778
SHA1cd0a63a9f9a99d5854456a6ba4dfcd5cde2cd698
SHA25668e15db770aa1e597c440463f0fe29330bfe5f31daaab2b274ef67c25317e029
SHA512fb705c33fedc287d9a6f3f692fb2117e77988ca41365edb8869c21bfbb533b0869e9eed56031ff550c70111a331068ee031f9e3677536a26a231468c202cfb05