Analysis
-
max time kernel
68s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:14
Static task
static1
Behavioral task
behavioral1
Sample
62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe
Resource
win10v2004-20230220-en
General
-
Target
62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe
-
Size
700KB
-
MD5
d901336f71f1b1dd47cb93737e6505a0
-
SHA1
503fd7043794c77cc44a87165245cf19bb06f6af
-
SHA256
62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711
-
SHA512
12319c8fa74c70b6275bc479eb9ad817ac8347a398a5460c2b3c67d2ac3550626b6d7e75e7da6fcf749c701b8640f7eeaf12e279d95f93c8d45085077f628619
-
SSDEEP
12288:iMr6y90jdp5B/KM21Gqq1Ay9D5ScAg4NkNPq1DgTQLhe4mFywPkbjqz:wyedpf1f1og4QqkOGpkbOz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5127.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5127.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/956-191-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-192-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-194-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-196-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-198-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-200-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-202-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-204-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-206-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-208-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-210-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-212-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-214-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-216-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-218-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-220-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-222-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-224-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/956-319-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5116 un900808.exe 380 pro5127.exe 956 qu0814.exe 3668 si656936.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5127.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un900808.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un900808.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 228 380 WerFault.exe 84 2072 956 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 380 pro5127.exe 380 pro5127.exe 956 qu0814.exe 956 qu0814.exe 3668 si656936.exe 3668 si656936.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 380 pro5127.exe Token: SeDebugPrivilege 956 qu0814.exe Token: SeDebugPrivilege 3668 si656936.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4456 wrote to memory of 5116 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 83 PID 4456 wrote to memory of 5116 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 83 PID 4456 wrote to memory of 5116 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 83 PID 5116 wrote to memory of 380 5116 un900808.exe 84 PID 5116 wrote to memory of 380 5116 un900808.exe 84 PID 5116 wrote to memory of 380 5116 un900808.exe 84 PID 5116 wrote to memory of 956 5116 un900808.exe 91 PID 5116 wrote to memory of 956 5116 un900808.exe 91 PID 5116 wrote to memory of 956 5116 un900808.exe 91 PID 4456 wrote to memory of 3668 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 95 PID 4456 wrote to memory of 3668 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 95 PID 4456 wrote to memory of 3668 4456 62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe"C:\Users\Admin\AppData\Local\Temp\62b15797b62e0ad2466719c1d52a7c418b9348bd01ffce79c7836d4e22fa4711.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900808.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un900808.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5127.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5127.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 10804⤵
- Program crash
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0814.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 13324⤵
- Program crash
PID:2072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656936.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 380 -ip 3801⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 956 -ip 9561⤵PID:2108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c068a04500cfcf9eea13a9deca760768
SHA139e7e5b1284b8ba083ba86278a3b2792b12fe80a
SHA256794655cbe4137c82b407cefcfc29e5eafe419370ff29c3b4748498af13afd532
SHA512e2ea81095338979abedd7afe5ff46c3dab8b446184c13d4c2e59b67e7a2de4d978017f49ed472f0a6a33d58affa729df6f1fdfa57c2ff324153fc05473db1cfb
-
Filesize
175KB
MD5c068a04500cfcf9eea13a9deca760768
SHA139e7e5b1284b8ba083ba86278a3b2792b12fe80a
SHA256794655cbe4137c82b407cefcfc29e5eafe419370ff29c3b4748498af13afd532
SHA512e2ea81095338979abedd7afe5ff46c3dab8b446184c13d4c2e59b67e7a2de4d978017f49ed472f0a6a33d58affa729df6f1fdfa57c2ff324153fc05473db1cfb
-
Filesize
558KB
MD5baede30076c23ed22ed134c9e7a1bad2
SHA1b75f2000a6074d4c0345b0ccebacd80f7c02eabc
SHA2564e24d889282c62859a24490f672e2a408b71818cdecc0724cf5fe68ea4432f78
SHA5121bb2eccccf2d4ccee74bfa4eb05c53229916eddbfa07ce71e4fd04b4ea1ae089196330f5a2d2236a4e7dc144444dcc723d4a6c8cece1424e30f5104b48941010
-
Filesize
558KB
MD5baede30076c23ed22ed134c9e7a1bad2
SHA1b75f2000a6074d4c0345b0ccebacd80f7c02eabc
SHA2564e24d889282c62859a24490f672e2a408b71818cdecc0724cf5fe68ea4432f78
SHA5121bb2eccccf2d4ccee74bfa4eb05c53229916eddbfa07ce71e4fd04b4ea1ae089196330f5a2d2236a4e7dc144444dcc723d4a6c8cece1424e30f5104b48941010
-
Filesize
307KB
MD50739e760e28de216b5c116d0ae33992b
SHA1df0e97f4b55966280b6c79334244845251a4c12b
SHA25688461f25030338f3a3e7d54fed59714af24781b62fe4359bb92b022eb2ef35da
SHA5128ca817add986c60c418a76578c3ccdd07049f882f9bdd3fa1c7f9875322f8ccc26082b095c4b478fee4d77676a04056213a30e501f903cda0a1721c24afd0340
-
Filesize
307KB
MD50739e760e28de216b5c116d0ae33992b
SHA1df0e97f4b55966280b6c79334244845251a4c12b
SHA25688461f25030338f3a3e7d54fed59714af24781b62fe4359bb92b022eb2ef35da
SHA5128ca817add986c60c418a76578c3ccdd07049f882f9bdd3fa1c7f9875322f8ccc26082b095c4b478fee4d77676a04056213a30e501f903cda0a1721c24afd0340
-
Filesize
365KB
MD5382ab14c3bf4ff2a683ba3408f52d64b
SHA1e9c072c6fc5844341651b54d969044c13e2e09cc
SHA256d7b2d8c44a70c9f318e25a136b10267eabedbbd663a790c1799a4ca6fb459eba
SHA512ac5b704790d1ff6fb6a9a8665780051736a994a706dbfca0c894f4ef606a3cc29d1b07c11cea27ad8b934eef42bc6e41029cd71475089ef68abe3eb66b62ab96
-
Filesize
365KB
MD5382ab14c3bf4ff2a683ba3408f52d64b
SHA1e9c072c6fc5844341651b54d969044c13e2e09cc
SHA256d7b2d8c44a70c9f318e25a136b10267eabedbbd663a790c1799a4ca6fb459eba
SHA512ac5b704790d1ff6fb6a9a8665780051736a994a706dbfca0c894f4ef606a3cc29d1b07c11cea27ad8b934eef42bc6e41029cd71475089ef68abe3eb66b62ab96