Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:50
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
700KB
-
MD5
a9e6cb93de76a9c22559672015523712
-
SHA1
da654f74cce262e166d1f26f36ef9f30d9a067b3
-
SHA256
a9b9204734b439a30e4dbab7c25bf9ab5e176c897ff987bd267583f12bb3fa7c
-
SHA512
7e85858d2df50b284b1c59abd44c9bd4225e54320f8ae79cbe1f6bab44e88be938557aa98d70d0ca4ff638b47539f425bfba2dab72349e3763bf20babf280eff
-
SSDEEP
12288:8Mrey904RLIe1Bo/63THmH9DSYcAX0NzfcxQ+1MjHJBVT9V/ec2w:ayHXDoATHmtXafceA4p7T9V8w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5110.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5110.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5110.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral2/memory/3056-191-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-192-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-194-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-196-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-198-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-200-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-202-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-204-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-206-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-208-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-210-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-212-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-214-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-216-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-218-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-220-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-222-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-224-0x00000000026B0000-0x00000000026EF000-memory.dmp family_redline behavioral2/memory/3056-353-0x0000000004F60000-0x0000000004F70000-memory.dmp family_redline behavioral2/memory/3056-359-0x0000000004F60000-0x0000000004F70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un333915.exepro5110.exequ8864.exesi118425.exepid process 4820 un333915.exe 3752 pro5110.exe 3056 qu8864.exe 3336 si118425.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5110.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5110.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
setup.exeun333915.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un333915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un333915.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3960 3752 WerFault.exe pro5110.exe 432 3056 WerFault.exe qu8864.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5110.exequ8864.exesi118425.exepid process 3752 pro5110.exe 3752 pro5110.exe 3056 qu8864.exe 3056 qu8864.exe 3336 si118425.exe 3336 si118425.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5110.exequ8864.exesi118425.exedescription pid process Token: SeDebugPrivilege 3752 pro5110.exe Token: SeDebugPrivilege 3056 qu8864.exe Token: SeDebugPrivilege 3336 si118425.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
setup.exeun333915.exedescription pid process target process PID 4132 wrote to memory of 4820 4132 setup.exe un333915.exe PID 4132 wrote to memory of 4820 4132 setup.exe un333915.exe PID 4132 wrote to memory of 4820 4132 setup.exe un333915.exe PID 4820 wrote to memory of 3752 4820 un333915.exe pro5110.exe PID 4820 wrote to memory of 3752 4820 un333915.exe pro5110.exe PID 4820 wrote to memory of 3752 4820 un333915.exe pro5110.exe PID 4820 wrote to memory of 3056 4820 un333915.exe qu8864.exe PID 4820 wrote to memory of 3056 4820 un333915.exe qu8864.exe PID 4820 wrote to memory of 3056 4820 un333915.exe qu8864.exe PID 4132 wrote to memory of 3336 4132 setup.exe si118425.exe PID 4132 wrote to memory of 3336 4132 setup.exe si118425.exe PID 4132 wrote to memory of 3336 4132 setup.exe si118425.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333915.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5110.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 10844⤵
- Program crash
PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8864.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8864.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 16644⤵
- Program crash
PID:432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si118425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si118425.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3752 -ip 37521⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3056 -ip 30561⤵PID:1352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c2148e0abcf884dcc0484bfc9f0d446d
SHA1b064ea5c0a2c48023f8fd2c4a3793799e9634c5a
SHA256ba1954df2536b8c22b7a7325d7f603b9c068a2c3b44cb05e7114c02566d2c453
SHA51273c3d03612331f374a32d58abc82f58c1627b60351a80a5cafb1a3d8f314f6f643d7bb60b9d41164e83183d4f54a28c5ec90a1737c8ad6b74ab00b0bdc3b37c5
-
Filesize
175KB
MD5c2148e0abcf884dcc0484bfc9f0d446d
SHA1b064ea5c0a2c48023f8fd2c4a3793799e9634c5a
SHA256ba1954df2536b8c22b7a7325d7f603b9c068a2c3b44cb05e7114c02566d2c453
SHA51273c3d03612331f374a32d58abc82f58c1627b60351a80a5cafb1a3d8f314f6f643d7bb60b9d41164e83183d4f54a28c5ec90a1737c8ad6b74ab00b0bdc3b37c5
-
Filesize
558KB
MD58d5f11808585fd54b2916ed699debc40
SHA14507964ac0a52a54768314fcccbf25975c899af0
SHA256121756a64efcbc771921a2acde27066511267119726fd303f6c76d0acd2fc8c6
SHA51234f651734513250ee7dac7d10c36b6edc4c0c76b88c1cacef71b1690b49ffb58626d39d32f8147901d93114d4b43cf5b94ef48ec4fbe7e59a6c076bcb1a26e7b
-
Filesize
558KB
MD58d5f11808585fd54b2916ed699debc40
SHA14507964ac0a52a54768314fcccbf25975c899af0
SHA256121756a64efcbc771921a2acde27066511267119726fd303f6c76d0acd2fc8c6
SHA51234f651734513250ee7dac7d10c36b6edc4c0c76b88c1cacef71b1690b49ffb58626d39d32f8147901d93114d4b43cf5b94ef48ec4fbe7e59a6c076bcb1a26e7b
-
Filesize
307KB
MD50ff490fc7646c9cd86ad9aac80ce1634
SHA1a813ffc62fd99301d7747ec4114bdca758f6c16b
SHA256d25b2826a49a959cb1e3ca447fa52ead13074f5183596d72e02d87a57daca42d
SHA51234ee5c65f615c45d3c600ed1d0400d208318ffb98a48a300dbe15efa3393948299b8c7b639da220961673acc35c69d568a04ad800ad3fedbbc0b4c80e8938058
-
Filesize
307KB
MD50ff490fc7646c9cd86ad9aac80ce1634
SHA1a813ffc62fd99301d7747ec4114bdca758f6c16b
SHA256d25b2826a49a959cb1e3ca447fa52ead13074f5183596d72e02d87a57daca42d
SHA51234ee5c65f615c45d3c600ed1d0400d208318ffb98a48a300dbe15efa3393948299b8c7b639da220961673acc35c69d568a04ad800ad3fedbbc0b4c80e8938058
-
Filesize
365KB
MD57343d5a336b65057106804494a5475fc
SHA1d67efff055d08a15e7c4bad529bb4a3de9e7e72f
SHA256d0250e4052aa9c32c2d713354e2a87705d532b441f56203b7144bb82fa97c209
SHA512f08b1d209f0fe2803b3d14de83ac698d1c7d17f40d0edf605c93b161394aad0d506d9b55b9a4fb6390d3acd7a59f400616992ca5361bec18b61d21b63ecaac7f
-
Filesize
365KB
MD57343d5a336b65057106804494a5475fc
SHA1d67efff055d08a15e7c4bad529bb4a3de9e7e72f
SHA256d0250e4052aa9c32c2d713354e2a87705d532b441f56203b7144bb82fa97c209
SHA512f08b1d209f0fe2803b3d14de83ac698d1c7d17f40d0edf605c93b161394aad0d506d9b55b9a4fb6390d3acd7a59f400616992ca5361bec18b61d21b63ecaac7f