Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:47
Static task
static1
Behavioral task
behavioral1
Sample
afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe
Resource
win10v2004-20230220-en
General
-
Target
afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe
-
Size
690KB
-
MD5
7b66fd9705b2ee0038787a207e450e20
-
SHA1
2135de3207ebfe97618c47c6de4576420742f633
-
SHA256
afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d
-
SHA512
9bf3731856acb4e3c983e865548d360b047c0b4a53c6129c937b9e4b6100cc068477bfaaf4a8b7ac60b324ac6498d541325bdb468bebd69fff972961735270aa
-
SSDEEP
12288:IMrTy90gmgXaz0D+yJ65hLu7sK3huSl0F4NvhFZZfig06NKVFSudft+cZb:Ly0Oazc70faYKxuE08zZZagzHp+b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1924.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1924.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4816-189-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-188-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-191-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-193-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-195-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-197-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-199-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-201-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-203-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-205-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-207-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-209-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-211-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-213-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-215-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-217-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-219-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-221-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/4816-389-0x0000000003B30000-0x0000000003B40000-memory.dmp family_redline behavioral1/memory/4816-1108-0x0000000003B30000-0x0000000003B40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un388483.exepro1924.exequ3977.exesi596530.exepid process 4380 un388483.exe 3216 pro1924.exe 4816 qu3977.exe 4416 si596530.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1924.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1924.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exeun388483.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un388483.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un388483.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 112 3216 WerFault.exe pro1924.exe 4960 4816 WerFault.exe qu3977.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1924.exequ3977.exesi596530.exepid process 3216 pro1924.exe 3216 pro1924.exe 4816 qu3977.exe 4816 qu3977.exe 4416 si596530.exe 4416 si596530.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1924.exequ3977.exesi596530.exedescription pid process Token: SeDebugPrivilege 3216 pro1924.exe Token: SeDebugPrivilege 4816 qu3977.exe Token: SeDebugPrivilege 4416 si596530.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exeun388483.exedescription pid process target process PID 2172 wrote to memory of 4380 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe un388483.exe PID 2172 wrote to memory of 4380 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe un388483.exe PID 2172 wrote to memory of 4380 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe un388483.exe PID 4380 wrote to memory of 3216 4380 un388483.exe pro1924.exe PID 4380 wrote to memory of 3216 4380 un388483.exe pro1924.exe PID 4380 wrote to memory of 3216 4380 un388483.exe pro1924.exe PID 4380 wrote to memory of 4816 4380 un388483.exe qu3977.exe PID 4380 wrote to memory of 4816 4380 un388483.exe qu3977.exe PID 4380 wrote to memory of 4816 4380 un388483.exe qu3977.exe PID 2172 wrote to memory of 4416 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe si596530.exe PID 2172 wrote to memory of 4416 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe si596530.exe PID 2172 wrote to memory of 4416 2172 afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe si596530.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe"C:\Users\Admin\AppData\Local\Temp\afe1f0f8898a60793ae9a5454623269925548626f4ee59641cd42ee71bdfe85d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388483.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1924.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10804⤵
- Program crash
PID:112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3977.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 16124⤵
- Program crash
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596530.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3216 -ip 32161⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4816 -ip 48161⤵PID:4908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD569bae86235e4bafb90b67c8bfd8344f8
SHA110760f248ef1502f746a5424421a06797586181a
SHA256f39500e77501200054e5c9b16ff1fab313c89ecc604b76ae009d642537cda215
SHA5123cc703a7f44d302e16f022c5ad826f30d9d41404bf029c97ae28d8945b7aeb460e3538352c4597400fdd37cf90720b3c10bd66b776e503ad6399a417537b8b15
-
Filesize
175KB
MD569bae86235e4bafb90b67c8bfd8344f8
SHA110760f248ef1502f746a5424421a06797586181a
SHA256f39500e77501200054e5c9b16ff1fab313c89ecc604b76ae009d642537cda215
SHA5123cc703a7f44d302e16f022c5ad826f30d9d41404bf029c97ae28d8945b7aeb460e3538352c4597400fdd37cf90720b3c10bd66b776e503ad6399a417537b8b15
-
Filesize
548KB
MD51a2c61817ed3aa7bcfa16eb882587487
SHA16ec735800176197289cc603453bd70d481d4151e
SHA256ea9cf8c3704076fca83b65a9f3c5cef80c048ab553a400d4752a33577304280c
SHA512fdf57ba6e76b9e99e3e2576a152fe66d51fcfbf85802055c8c069cf723872eeedaa08c766e88c77e037b1a7df40515ef67c2942156e270ddf7e78b2a12aba67a
-
Filesize
548KB
MD51a2c61817ed3aa7bcfa16eb882587487
SHA16ec735800176197289cc603453bd70d481d4151e
SHA256ea9cf8c3704076fca83b65a9f3c5cef80c048ab553a400d4752a33577304280c
SHA512fdf57ba6e76b9e99e3e2576a152fe66d51fcfbf85802055c8c069cf723872eeedaa08c766e88c77e037b1a7df40515ef67c2942156e270ddf7e78b2a12aba67a
-
Filesize
291KB
MD5c90cb7f3f68cab36916d8fc84e3a4896
SHA163d3fe151faaace93a38bdaa042b921c408af660
SHA256ec6b1e3beeba792f4c9f2228ead0d0491839c2768e2cbda470e51cad7ca48cd5
SHA5125972333aaf34d2ecf0a37933cf41d946b0e9a24d19784cf81164cf00bb8347ddd1435ed3943dbb502c23a75a641b4c90db053787f6ad0ad445a484a30badf6c0
-
Filesize
291KB
MD5c90cb7f3f68cab36916d8fc84e3a4896
SHA163d3fe151faaace93a38bdaa042b921c408af660
SHA256ec6b1e3beeba792f4c9f2228ead0d0491839c2768e2cbda470e51cad7ca48cd5
SHA5125972333aaf34d2ecf0a37933cf41d946b0e9a24d19784cf81164cf00bb8347ddd1435ed3943dbb502c23a75a641b4c90db053787f6ad0ad445a484a30badf6c0
-
Filesize
345KB
MD5cd4093dd579cf65f099a24d0388aec75
SHA1839617772472e67f3a1d95e00d1cf2e147f8d70e
SHA25699a5d74e60cc6a8b8f5a88b5b25003bafa175e37ac3dbe59cfc038a72b20d80d
SHA5121af752868fa9d75398486ba8d79fe085ea540e73a0498832762667c8d50ecca525441badd173c7efba237e4766dfa2ff98a09c9226f7a555fb2fe81824cf24e2
-
Filesize
345KB
MD5cd4093dd579cf65f099a24d0388aec75
SHA1839617772472e67f3a1d95e00d1cf2e147f8d70e
SHA25699a5d74e60cc6a8b8f5a88b5b25003bafa175e37ac3dbe59cfc038a72b20d80d
SHA5121af752868fa9d75398486ba8d79fe085ea540e73a0498832762667c8d50ecca525441badd173c7efba237e4766dfa2ff98a09c9226f7a555fb2fe81824cf24e2