Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:21
Static task
static1
Behavioral task
behavioral1
Sample
51cf01a1b30d1835442e273ad768b7ff.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
51cf01a1b30d1835442e273ad768b7ff.exe
Resource
win10v2004-20230220-en
General
-
Target
51cf01a1b30d1835442e273ad768b7ff.exe
-
Size
700KB
-
MD5
51cf01a1b30d1835442e273ad768b7ff
-
SHA1
24b6271e5a77d6ea10b7d98598ecf61b69408638
-
SHA256
e7ab05b31c06d3b408344aca29a87032eea3b77e7734e4b8c30e593dbef095cb
-
SHA512
6c201e09d64f5eb54bc143cad3fd0c5af210adb27cad042ddf581dcd9a20ec0095db706ddcff00ce5d5de0612a11eebe9292101c137216c127106bfd8cbc97a8
-
SSDEEP
12288:+Mrny90T5X+h+NhIQSXu9DukcAoMiKwwpT7ZXv1SJjCAERzU:Ry5+4QSXkoMdww1jKj8RzU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6077.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6077.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/4472-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-198-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-202-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-214-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-216-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-218-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-220-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-222-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-224-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral2/memory/4472-244-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un730014.exepro6077.exequ7597.exesi880483.exepid process 2832 un730014.exe 1776 pro6077.exe 4472 qu7597.exe 1812 si880483.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6077.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6077.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
51cf01a1b30d1835442e273ad768b7ff.exeun730014.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 51cf01a1b30d1835442e273ad768b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 51cf01a1b30d1835442e273ad768b7ff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un730014.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un730014.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4328 1776 WerFault.exe pro6077.exe 4744 4472 WerFault.exe qu7597.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6077.exequ7597.exesi880483.exepid process 1776 pro6077.exe 1776 pro6077.exe 4472 qu7597.exe 4472 qu7597.exe 1812 si880483.exe 1812 si880483.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6077.exequ7597.exesi880483.exedescription pid process Token: SeDebugPrivilege 1776 pro6077.exe Token: SeDebugPrivilege 4472 qu7597.exe Token: SeDebugPrivilege 1812 si880483.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
51cf01a1b30d1835442e273ad768b7ff.exeun730014.exedescription pid process target process PID 5028 wrote to memory of 2832 5028 51cf01a1b30d1835442e273ad768b7ff.exe un730014.exe PID 5028 wrote to memory of 2832 5028 51cf01a1b30d1835442e273ad768b7ff.exe un730014.exe PID 5028 wrote to memory of 2832 5028 51cf01a1b30d1835442e273ad768b7ff.exe un730014.exe PID 2832 wrote to memory of 1776 2832 un730014.exe pro6077.exe PID 2832 wrote to memory of 1776 2832 un730014.exe pro6077.exe PID 2832 wrote to memory of 1776 2832 un730014.exe pro6077.exe PID 2832 wrote to memory of 4472 2832 un730014.exe qu7597.exe PID 2832 wrote to memory of 4472 2832 un730014.exe qu7597.exe PID 2832 wrote to memory of 4472 2832 un730014.exe qu7597.exe PID 5028 wrote to memory of 1812 5028 51cf01a1b30d1835442e273ad768b7ff.exe si880483.exe PID 5028 wrote to memory of 1812 5028 51cf01a1b30d1835442e273ad768b7ff.exe si880483.exe PID 5028 wrote to memory of 1812 5028 51cf01a1b30d1835442e273ad768b7ff.exe si880483.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51cf01a1b30d1835442e273ad768b7ff.exe"C:\Users\Admin\AppData\Local\Temp\51cf01a1b30d1835442e273ad768b7ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730014.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730014.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 10884⤵
- Program crash
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7597.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7597.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13484⤵
- Program crash
PID:4744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880483.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1776 -ip 17761⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4472 -ip 44721⤵PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d5e4c45ee0d8f38b9bef529923c62d8
SHA1ae52fb0a557f6b2a0bcebca35712ed7e8f88cd38
SHA2564d728d888d172a52f4525249287178b1754affe474f607f019b4957186ca6b8a
SHA5124be62a90eedd0cd3dbb8ad29446909f2af188310059fe5191e0c48e3eedaec21e8b0ab0d2827ab37cc1df200f7607d566c1f02693acc3070fa6f6a3ec2388d2e
-
Filesize
175KB
MD50d5e4c45ee0d8f38b9bef529923c62d8
SHA1ae52fb0a557f6b2a0bcebca35712ed7e8f88cd38
SHA2564d728d888d172a52f4525249287178b1754affe474f607f019b4957186ca6b8a
SHA5124be62a90eedd0cd3dbb8ad29446909f2af188310059fe5191e0c48e3eedaec21e8b0ab0d2827ab37cc1df200f7607d566c1f02693acc3070fa6f6a3ec2388d2e
-
Filesize
558KB
MD55db3924e6aac342a5d6bde6527871e86
SHA10fdac73db5532b40212c1a37718ed8f3de031128
SHA25603b83f84e5077b76bc6d71b7056df8ebd14e3cc16bbd8bfac29dd1db46a7b7e8
SHA5128e6a3a294539f7299e5dae37359919c60e07b9ea34a1fcc235dbee3d1a67b78e5e499c9e75536bb3f1b04aba4f8223cf41fec681786cb633e3e0b57ff6536e6e
-
Filesize
558KB
MD55db3924e6aac342a5d6bde6527871e86
SHA10fdac73db5532b40212c1a37718ed8f3de031128
SHA25603b83f84e5077b76bc6d71b7056df8ebd14e3cc16bbd8bfac29dd1db46a7b7e8
SHA5128e6a3a294539f7299e5dae37359919c60e07b9ea34a1fcc235dbee3d1a67b78e5e499c9e75536bb3f1b04aba4f8223cf41fec681786cb633e3e0b57ff6536e6e
-
Filesize
307KB
MD59a91cd22e62655b9a228ec17edf0a1da
SHA11d2188fd90c061bb7edc6694d0724a155f424a26
SHA256b3fa333f4c69d12726d4192910261e4e5fa175a21e0c4f6eb8863eed1e7ae04f
SHA512fa35876587944d6d67f8928f2800c9b8db92e073993a027a1d27daeaab6b2e0515aa266108be2f4cdb45c5b4f33338c004bb6570eebf1def1a19e3422a06bdc2
-
Filesize
307KB
MD59a91cd22e62655b9a228ec17edf0a1da
SHA11d2188fd90c061bb7edc6694d0724a155f424a26
SHA256b3fa333f4c69d12726d4192910261e4e5fa175a21e0c4f6eb8863eed1e7ae04f
SHA512fa35876587944d6d67f8928f2800c9b8db92e073993a027a1d27daeaab6b2e0515aa266108be2f4cdb45c5b4f33338c004bb6570eebf1def1a19e3422a06bdc2
-
Filesize
365KB
MD57078a79ec92c748cd458ae8386abf0a7
SHA189b086f9b3bc2b1fa4b5cb75013acb3d89febac1
SHA25619ef0da4f14858991e181bd446609a197423ff7bc70e8a9ae99d683f6197843d
SHA5121b8154020389fceb5a42e90253fd6975eed4e0581a7bcf1b8cd571efb22fa7cb854790bb07957705920f49bb1ecf42cdada5c250f0ab2ed831f9477c84c464c0
-
Filesize
365KB
MD57078a79ec92c748cd458ae8386abf0a7
SHA189b086f9b3bc2b1fa4b5cb75013acb3d89febac1
SHA25619ef0da4f14858991e181bd446609a197423ff7bc70e8a9ae99d683f6197843d
SHA5121b8154020389fceb5a42e90253fd6975eed4e0581a7bcf1b8cd571efb22fa7cb854790bb07957705920f49bb1ecf42cdada5c250f0ab2ed831f9477c84c464c0