Analysis
-
max time kernel
76s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
91b2d727b8117ad492600d92b46d2bb0
-
SHA1
89304ec2f654ce86b9e56d6cccb21019bf0ee2fd
-
SHA256
a7f78b36d51957d3826f1433142ca10123c9ae9ad7f6c0c8a4562af181de9ea8
-
SHA512
b061c6a19d6b1748d679d20a82ddede91e00cf8541686ccff7934a671da46c31b57fa8eaefd1d8624837d217368263c453d020d5d43fa3087ec235ef36a16da3
-
SSDEEP
12288:0MrSy90iiY8hjHwdT9DVicAuN9qOVZ3Gptw336DWn:GyiY8BQwqqqGkaDm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5345.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5345.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral2/memory/1520-191-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-192-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-194-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-196-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-198-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-200-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-202-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-204-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-206-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-208-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-210-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-212-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-214-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-216-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-218-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-220-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-222-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-224-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral2/memory/1520-276-0x0000000004F10000-0x0000000004F20000-memory.dmp family_redline behavioral2/memory/1520-1111-0x0000000004F10000-0x0000000004F20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un735299.exepro5345.exequ4240.exesi324365.exepid process 4608 un735299.exe 220 pro5345.exe 1520 qu4240.exe 2848 si324365.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5345.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5345.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5345.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
setup.exeun735299.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un735299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un735299.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3648 220 WerFault.exe pro5345.exe 1940 1520 WerFault.exe qu4240.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5345.exequ4240.exesi324365.exepid process 220 pro5345.exe 220 pro5345.exe 1520 qu4240.exe 1520 qu4240.exe 2848 si324365.exe 2848 si324365.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5345.exequ4240.exesi324365.exedescription pid process Token: SeDebugPrivilege 220 pro5345.exe Token: SeDebugPrivilege 1520 qu4240.exe Token: SeDebugPrivilege 2848 si324365.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
setup.exeun735299.exedescription pid process target process PID 2616 wrote to memory of 4608 2616 setup.exe un735299.exe PID 2616 wrote to memory of 4608 2616 setup.exe un735299.exe PID 2616 wrote to memory of 4608 2616 setup.exe un735299.exe PID 4608 wrote to memory of 220 4608 un735299.exe pro5345.exe PID 4608 wrote to memory of 220 4608 un735299.exe pro5345.exe PID 4608 wrote to memory of 220 4608 un735299.exe pro5345.exe PID 4608 wrote to memory of 1520 4608 un735299.exe qu4240.exe PID 4608 wrote to memory of 1520 4608 un735299.exe qu4240.exe PID 4608 wrote to memory of 1520 4608 un735299.exe qu4240.exe PID 2616 wrote to memory of 2848 2616 setup.exe si324365.exe PID 2616 wrote to memory of 2848 2616 setup.exe si324365.exe PID 2616 wrote to memory of 2848 2616 setup.exe si324365.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735299.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735299.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10164⤵
- Program crash
PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4240.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 14764⤵
- Program crash
PID:1940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si324365.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si324365.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 220 -ip 2201⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1520 -ip 15201⤵PID:3612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50c6bbc941b32441d0484c032f2bced54
SHA10fe2c9daccadd968a6db2eea1b43338b18385aa9
SHA2560c8ff0599a226a5737d8b7161cf0394a32c6dff19598ec302062c733cae69240
SHA512d0416e97915764cc49973fb368829efe2cc4f66c4d4a75a7d4df7905ea910c8ab6ff22129ab8c9e8c92f3e1aec996849f3a77692964503a90073f7507eac4e44
-
Filesize
175KB
MD50c6bbc941b32441d0484c032f2bced54
SHA10fe2c9daccadd968a6db2eea1b43338b18385aa9
SHA2560c8ff0599a226a5737d8b7161cf0394a32c6dff19598ec302062c733cae69240
SHA512d0416e97915764cc49973fb368829efe2cc4f66c4d4a75a7d4df7905ea910c8ab6ff22129ab8c9e8c92f3e1aec996849f3a77692964503a90073f7507eac4e44
-
Filesize
558KB
MD54ac703772ad858bfb18f64ef7eec4b05
SHA1aaccacaa03a73f539327c668de29205de5647546
SHA256118d1a080167be414d73d12cd453eb73a2729c13a9c9abcf0e4b74385874ae18
SHA512f8ae02350ab46d31ce30dc0969c8d84e9d94c068ededf27391b0080ddf9e2f04d4e5581829d5214acbb43438b2885f54a0d4fc9d26fba194a4ac1615ad7aae18
-
Filesize
558KB
MD54ac703772ad858bfb18f64ef7eec4b05
SHA1aaccacaa03a73f539327c668de29205de5647546
SHA256118d1a080167be414d73d12cd453eb73a2729c13a9c9abcf0e4b74385874ae18
SHA512f8ae02350ab46d31ce30dc0969c8d84e9d94c068ededf27391b0080ddf9e2f04d4e5581829d5214acbb43438b2885f54a0d4fc9d26fba194a4ac1615ad7aae18
-
Filesize
307KB
MD59b6d712ca30d69c543807665bea6cf80
SHA1624b8e0521d6be9e7930962a9ce331856c23ac3b
SHA2567b5064206dcdc3f723fa2e2b1fc41c86726601b77f1907ddf173518ed74590d4
SHA512ccbdb97a16cb3aafafc0476225ae10b9d781f18d8649ca8714640f92296b0163751adc20085545282b5daf32101f9695d84e8a76ab59ca62971b9ca60d9f9481
-
Filesize
307KB
MD59b6d712ca30d69c543807665bea6cf80
SHA1624b8e0521d6be9e7930962a9ce331856c23ac3b
SHA2567b5064206dcdc3f723fa2e2b1fc41c86726601b77f1907ddf173518ed74590d4
SHA512ccbdb97a16cb3aafafc0476225ae10b9d781f18d8649ca8714640f92296b0163751adc20085545282b5daf32101f9695d84e8a76ab59ca62971b9ca60d9f9481
-
Filesize
365KB
MD5f3f404ff1aa4575c39f0eabccdec404a
SHA1340416ce7ec3c80c2fab33866f43c32df0859752
SHA256ae5190792d47cf646c8e65d665d765fe6a31cf561cd9a89063067dfb0c95dd06
SHA51252b49757f01df32d3e699800e170c60031a6a03805aa401d92cf43714eff0490dfe9ba829b237b0acc8d3fbd5d65f3eda7fbdafe9b349a2e6ff8539d08afc3bf
-
Filesize
365KB
MD5f3f404ff1aa4575c39f0eabccdec404a
SHA1340416ce7ec3c80c2fab33866f43c32df0859752
SHA256ae5190792d47cf646c8e65d665d765fe6a31cf561cd9a89063067dfb0c95dd06
SHA51252b49757f01df32d3e699800e170c60031a6a03805aa401d92cf43714eff0490dfe9ba829b237b0acc8d3fbd5d65f3eda7fbdafe9b349a2e6ff8539d08afc3bf