Analysis
-
max time kernel
62s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:36
Static task
static1
Behavioral task
behavioral1
Sample
fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe
Resource
win10v2004-20230220-en
General
-
Target
fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe
-
Size
689KB
-
MD5
d2ccd51e1053c16efc79b45e2b498664
-
SHA1
d4f9e105b76770a3f105b588fd91ad2be49c82c0
-
SHA256
fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b
-
SHA512
0280d27384929bfe902cfa04efd2d00e68636f929749c0a348653235501e9ebc83d85c241ab995e00177ac06e4ba0c45f3b7408928e9d04f8d023cdc6e61c413
-
SSDEEP
12288:BMrWy90jOs+EIyixJoCjaWNlyn65hLutvhQ3pfJ/G6vTF4Cfig1V0g81MAoURR9:TyaHMAMaWq6fajqJ/G6p4CagGrRL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5750.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5750.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2576-192-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-191-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-194-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-196-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-198-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-200-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-202-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-204-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-206-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-208-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-210-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-212-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-214-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-216-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-218-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-220-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-222-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/2576-224-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1836 un971795.exe 1216 pro5750.exe 2576 qu0434.exe 4252 si848793.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5750.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5750.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un971795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un971795.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2428 1216 WerFault.exe 84 3400 2576 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1216 pro5750.exe 1216 pro5750.exe 2576 qu0434.exe 2576 qu0434.exe 4252 si848793.exe 4252 si848793.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1216 pro5750.exe Token: SeDebugPrivilege 2576 qu0434.exe Token: SeDebugPrivilege 4252 si848793.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1836 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 83 PID 2864 wrote to memory of 1836 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 83 PID 2864 wrote to memory of 1836 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 83 PID 1836 wrote to memory of 1216 1836 un971795.exe 84 PID 1836 wrote to memory of 1216 1836 un971795.exe 84 PID 1836 wrote to memory of 1216 1836 un971795.exe 84 PID 1836 wrote to memory of 2576 1836 un971795.exe 90 PID 1836 wrote to memory of 2576 1836 un971795.exe 90 PID 1836 wrote to memory of 2576 1836 un971795.exe 90 PID 2864 wrote to memory of 4252 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 94 PID 2864 wrote to memory of 4252 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 94 PID 2864 wrote to memory of 4252 2864 fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe"C:\Users\Admin\AppData\Local\Temp\fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10804⤵
- Program crash
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 13284⤵
- Program crash
PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1216 -ip 12161⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2576 -ip 25761⤵PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51edd2043da1bc3d925c36dacac486f1a
SHA1a29bbfcdc1ba019f4060eed7385368a77822ac15
SHA2568bbe19f458ae79b5494b67b0aaebba895df1e49b3f5bde918b3e5c4b187efd5e
SHA512a5dfaa0b48b2bd27be6d7152981a205fb588e920626d73114e2b5552621a84770ecaea3d42f8fdd6359a4843bec28bcf92305807e97361d9955b67ca5afd5fde
-
Filesize
175KB
MD51edd2043da1bc3d925c36dacac486f1a
SHA1a29bbfcdc1ba019f4060eed7385368a77822ac15
SHA2568bbe19f458ae79b5494b67b0aaebba895df1e49b3f5bde918b3e5c4b187efd5e
SHA512a5dfaa0b48b2bd27be6d7152981a205fb588e920626d73114e2b5552621a84770ecaea3d42f8fdd6359a4843bec28bcf92305807e97361d9955b67ca5afd5fde
-
Filesize
547KB
MD5c27d0e88c4343146c5fb8c9cc8d73924
SHA14ea15d376827274f475f47906a800bbd0230819a
SHA256ddcab9c3eddea3a91277e457d6cf409c88bf1f198e8a4ee935e58157891081be
SHA51253e73516de6093b4125dc103bfa5cb471ea372c0e9ed8eeb28906bb1cc258900a397d6b7b30742af55a53b761b2815ef8e57561f929b6efc63c25932ef2c3688
-
Filesize
547KB
MD5c27d0e88c4343146c5fb8c9cc8d73924
SHA14ea15d376827274f475f47906a800bbd0230819a
SHA256ddcab9c3eddea3a91277e457d6cf409c88bf1f198e8a4ee935e58157891081be
SHA51253e73516de6093b4125dc103bfa5cb471ea372c0e9ed8eeb28906bb1cc258900a397d6b7b30742af55a53b761b2815ef8e57561f929b6efc63c25932ef2c3688
-
Filesize
291KB
MD5c0d41b9139a7fd3727e724d2f487c3c9
SHA1187792e3dddf548738d91b3abdd586d31235fb03
SHA25656b606c268912ef7618543ad1668b8c360775df0a0ff90e77222690d6ad46a4c
SHA5127516a6c2b12ab3c8f2fc2721ec5b703a32c37d61b12065a7fb9f162d71a6cb72e42dddb44ec6ec35cb9d38d5138e415fd58fddb2622ccdcfc45c0f1305a85fe2
-
Filesize
291KB
MD5c0d41b9139a7fd3727e724d2f487c3c9
SHA1187792e3dddf548738d91b3abdd586d31235fb03
SHA25656b606c268912ef7618543ad1668b8c360775df0a0ff90e77222690d6ad46a4c
SHA5127516a6c2b12ab3c8f2fc2721ec5b703a32c37d61b12065a7fb9f162d71a6cb72e42dddb44ec6ec35cb9d38d5138e415fd58fddb2622ccdcfc45c0f1305a85fe2
-
Filesize
345KB
MD5e30e7c901acddc07059203f5800083da
SHA1cde85f55045258cbad60aed3794e67b06f668a7a
SHA256650f34e815d412a174fee13174c50f8bf71697b92279d4d02b9c5dcd8c9fc92c
SHA5122a51a1f039751545716b4fe5ee5ec895379452f0ae8a7c471aadaba0c95dee81a94c2f5723b063adae8000e97a0a2fac1e8a9e1c0be1d2391062aa34577d4274
-
Filesize
345KB
MD5e30e7c901acddc07059203f5800083da
SHA1cde85f55045258cbad60aed3794e67b06f668a7a
SHA256650f34e815d412a174fee13174c50f8bf71697b92279d4d02b9c5dcd8c9fc92c
SHA5122a51a1f039751545716b4fe5ee5ec895379452f0ae8a7c471aadaba0c95dee81a94c2f5723b063adae8000e97a0a2fac1e8a9e1c0be1d2391062aa34577d4274