Analysis
-
max time kernel
106s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:04
Static task
static1
Behavioral task
behavioral1
Sample
7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe
Resource
win10v2004-20230220-en
General
-
Target
7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe
-
Size
699KB
-
MD5
fdd5446cb2af9c891dfb46ff1d800b3c
-
SHA1
fedfc754571dd757090dc2b7035f58cbe954b854
-
SHA256
7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2
-
SHA512
7dae2bb893e981cf8a1eb7ed37d31d65bc4959e059b65335ab69fe687d84bb05ea016ac048f635d34297effb97e69ad57179ed3c46d2f3d95776f4cd266ff909
-
SSDEEP
12288:nMrUy90tVK8Qluk7PjRNILDlEANJ9jUlPaZ3bMhbK5j7hcdyt4wlAC:DycVKBlugPjRNILDqANjU0ZQZK5Hhcd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0697.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0697.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0697.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5008-190-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-191-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-193-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-197-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-200-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-203-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-205-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-207-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-209-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-211-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-213-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-215-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-217-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-219-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-221-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-223-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-225-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/5008-227-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un994760.exepro0697.exequ2146.exesi035930.exepid process 4100 un994760.exe 4812 pro0697.exe 5008 qu2146.exe 4368 si035930.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0697.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0697.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0697.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exeun994760.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un994760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un994760.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4188 4812 WerFault.exe pro0697.exe 2376 5008 WerFault.exe qu2146.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0697.exequ2146.exesi035930.exepid process 4812 pro0697.exe 4812 pro0697.exe 5008 qu2146.exe 5008 qu2146.exe 4368 si035930.exe 4368 si035930.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0697.exequ2146.exesi035930.exedescription pid process Token: SeDebugPrivilege 4812 pro0697.exe Token: SeDebugPrivilege 5008 qu2146.exe Token: SeDebugPrivilege 4368 si035930.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exeun994760.exedescription pid process target process PID 4028 wrote to memory of 4100 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe un994760.exe PID 4028 wrote to memory of 4100 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe un994760.exe PID 4028 wrote to memory of 4100 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe un994760.exe PID 4100 wrote to memory of 4812 4100 un994760.exe pro0697.exe PID 4100 wrote to memory of 4812 4100 un994760.exe pro0697.exe PID 4100 wrote to memory of 4812 4100 un994760.exe pro0697.exe PID 4100 wrote to memory of 5008 4100 un994760.exe qu2146.exe PID 4100 wrote to memory of 5008 4100 un994760.exe qu2146.exe PID 4100 wrote to memory of 5008 4100 un994760.exe qu2146.exe PID 4028 wrote to memory of 4368 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe si035930.exe PID 4028 wrote to memory of 4368 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe si035930.exe PID 4028 wrote to memory of 4368 4028 7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe si035930.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe"C:\Users\Admin\AppData\Local\Temp\7b73a64ef1f6c3a2b2ceac9b85779a3c2187c67ce0b0d358c18adbb9e4655ac2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0697.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 10404⤵
- Program crash
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2146.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 13684⤵
- Program crash
PID:2376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si035930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si035930.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4812 -ip 48121⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5008 -ip 50081⤵PID:3204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57b7f1b71d42c0100c017e04e39f224cf
SHA1cb9ae69489b0632261bb8baf9071bda1876ba1d5
SHA256dce98b704f728af8d88c17485d64e66d0edead12e48989970947dd7c7a012263
SHA512d26b359bad08c65a051b5a99888859aea903183505428f289e8c69d06bd3fe7a7dbfafd89feb88f55b189f9dd8e1b8ef5b77cab4575f71ccc633c400606a6fb1
-
Filesize
175KB
MD57b7f1b71d42c0100c017e04e39f224cf
SHA1cb9ae69489b0632261bb8baf9071bda1876ba1d5
SHA256dce98b704f728af8d88c17485d64e66d0edead12e48989970947dd7c7a012263
SHA512d26b359bad08c65a051b5a99888859aea903183505428f289e8c69d06bd3fe7a7dbfafd89feb88f55b189f9dd8e1b8ef5b77cab4575f71ccc633c400606a6fb1
-
Filesize
557KB
MD5b5d061b86451f5332d8370da2303bd18
SHA12093433e687bd980eeb445e4b0e670dc73bdca42
SHA256274c0c9475730326d707968d5e81f931d575078284561f987199943cfd1f8586
SHA5128cc995c2ca15564948d3210aa10ea944f08896a056a0d964d05151e663106ce8e170cb41c2cf679af84c6a2ba5ef261c51ec558eb195b3749c02944090d52b72
-
Filesize
557KB
MD5b5d061b86451f5332d8370da2303bd18
SHA12093433e687bd980eeb445e4b0e670dc73bdca42
SHA256274c0c9475730326d707968d5e81f931d575078284561f987199943cfd1f8586
SHA5128cc995c2ca15564948d3210aa10ea944f08896a056a0d964d05151e663106ce8e170cb41c2cf679af84c6a2ba5ef261c51ec558eb195b3749c02944090d52b72
-
Filesize
307KB
MD5a3901fb6b24f0ed152c20b86d83d05d9
SHA1b65c8542a3e71f3251c847fa76f5dff7fcc6b2c6
SHA2564df8123005b48d5d146d9d91ac14247268c68085bd3bbff271eaaaae10c19988
SHA5128f44b9a73b89b16a4a9ad4a407bd26118fa542d3d003c923b9f616d2223e6c9a776a9d9a05fc86ba3aef62d872875aa66436adde41f6480e5378905afe3b54a8
-
Filesize
307KB
MD5a3901fb6b24f0ed152c20b86d83d05d9
SHA1b65c8542a3e71f3251c847fa76f5dff7fcc6b2c6
SHA2564df8123005b48d5d146d9d91ac14247268c68085bd3bbff271eaaaae10c19988
SHA5128f44b9a73b89b16a4a9ad4a407bd26118fa542d3d003c923b9f616d2223e6c9a776a9d9a05fc86ba3aef62d872875aa66436adde41f6480e5378905afe3b54a8
-
Filesize
365KB
MD52ec0d6f0c7de81ff0146772f9ddb097f
SHA10ac0bd553316a31d6442b1afce74016fd34c6455
SHA25696871f11c6949176bcf54baca4a9950e88466f8037e7574081f3dc26be66b3af
SHA512dfaa2e8ec911273bdd15912d62764c313ace8ff36b9c66803c012c4bca2a5283765d65ce408f6655614ecf85494a9848df5974965937fb5880daf1ed01923b75
-
Filesize
365KB
MD52ec0d6f0c7de81ff0146772f9ddb097f
SHA10ac0bd553316a31d6442b1afce74016fd34c6455
SHA25696871f11c6949176bcf54baca4a9950e88466f8037e7574081f3dc26be66b3af
SHA512dfaa2e8ec911273bdd15912d62764c313ace8ff36b9c66803c012c4bca2a5283765d65ce408f6655614ecf85494a9848df5974965937fb5880daf1ed01923b75