Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe
Resource
win10v2004-20230220-en
General
-
Target
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe
-
Size
689KB
-
MD5
135b6c192bb576da14e79e6ce6bccbdf
-
SHA1
46bff8337b828acdcf29d0f905439d8595be54b6
-
SHA256
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65
-
SHA512
1863bae42e48a878430116008f91939452853fa0dce6f760f5c648db8901fe78c85a9be2f25cfd427d33a1563dca10480d46ff3d16ada9250516603da1d1bbc9
-
SSDEEP
12288:QMrRy90UpbLPFQjXCvBKct/yA65hLuC2K3auSH45hOesNlOvPF92fig06WKwFS0e:RyXbmjXCvwKa/faC2KKuuOIeqOF92agr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5957.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5957.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1704-192-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-191-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-194-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-196-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-202-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-204-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-200-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-198-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-206-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-208-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-210-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-214-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-212-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-216-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-218-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-220-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-222-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-224-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/1704-290-0x0000000005F70000-0x0000000005F80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1844 un270031.exe 3912 pro5957.exe 1704 qu0082.exe 4856 si817121.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5957.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un270031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un270031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4968 3912 WerFault.exe 86 1412 1704 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3912 pro5957.exe 3912 pro5957.exe 1704 qu0082.exe 1704 qu0082.exe 4856 si817121.exe 4856 si817121.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3912 pro5957.exe Token: SeDebugPrivilege 1704 qu0082.exe Token: SeDebugPrivilege 4856 si817121.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3944 wrote to memory of 1844 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 85 PID 3944 wrote to memory of 1844 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 85 PID 3944 wrote to memory of 1844 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 85 PID 1844 wrote to memory of 3912 1844 un270031.exe 86 PID 1844 wrote to memory of 3912 1844 un270031.exe 86 PID 1844 wrote to memory of 3912 1844 un270031.exe 86 PID 1844 wrote to memory of 1704 1844 un270031.exe 93 PID 1844 wrote to memory of 1704 1844 un270031.exe 93 PID 1844 wrote to memory of 1704 1844 un270031.exe 93 PID 3944 wrote to memory of 4856 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 98 PID 3944 wrote to memory of 4856 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 98 PID 3944 wrote to memory of 4856 3944 9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe"C:\Users\Admin\AppData\Local\Temp\9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10844⤵
- Program crash
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 16964⤵
- Program crash
PID:1412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3912 -ip 39121⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1704 -ip 17041⤵PID:4520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e90fed0e50944b3a7b256d1b356cf8e2
SHA1123ce789090d286137ae11770d32dbb854e601b9
SHA256d67be89cfc50cd4a7930142fb5e78524ce8d9ed2f6616c94a69a1f094df475cc
SHA5125267db8cd211f6f830e5411143bd99291ecfa1131733c472a2505cfe5e0b1b098a516e973813276be828573d3f1b2b5bfe58ad460c7257c9c5c806561aae0b7d
-
Filesize
175KB
MD5e90fed0e50944b3a7b256d1b356cf8e2
SHA1123ce789090d286137ae11770d32dbb854e601b9
SHA256d67be89cfc50cd4a7930142fb5e78524ce8d9ed2f6616c94a69a1f094df475cc
SHA5125267db8cd211f6f830e5411143bd99291ecfa1131733c472a2505cfe5e0b1b098a516e973813276be828573d3f1b2b5bfe58ad460c7257c9c5c806561aae0b7d
-
Filesize
548KB
MD5f4436c06de7d7e79126163d46b4ac1fb
SHA178f2ba2580c7209e3d3469b1c22ceeab04f3d807
SHA256992d7c4591b528ef5c18d4c571ff3c951a24f4c7f177db036a3346d24d5eb852
SHA5123f291fb3e85f7b2a9bfc5285af606599bd4d64aee4b80974487062175a17dcd8682eb859a393197a2f1da5edbe79083173e240780bf8145233bff88d973221a4
-
Filesize
548KB
MD5f4436c06de7d7e79126163d46b4ac1fb
SHA178f2ba2580c7209e3d3469b1c22ceeab04f3d807
SHA256992d7c4591b528ef5c18d4c571ff3c951a24f4c7f177db036a3346d24d5eb852
SHA5123f291fb3e85f7b2a9bfc5285af606599bd4d64aee4b80974487062175a17dcd8682eb859a393197a2f1da5edbe79083173e240780bf8145233bff88d973221a4
-
Filesize
291KB
MD5faf9682a4c3688df1b87d4f9b7df6b79
SHA19e7eb89efcb827764acb9e257af50c9a582b1d7b
SHA256b751fb805710101b900d2f714c69b562c644cd6afbf776f0edfdd4477f0f2e27
SHA5129939eae542f7077c8e6090cbfdb763ba0021d38cd36191dd3ea30da9b8937fcd0cad329628218c2b0eb081b164a879feb652e3040fff9786917671f988b02880
-
Filesize
291KB
MD5faf9682a4c3688df1b87d4f9b7df6b79
SHA19e7eb89efcb827764acb9e257af50c9a582b1d7b
SHA256b751fb805710101b900d2f714c69b562c644cd6afbf776f0edfdd4477f0f2e27
SHA5129939eae542f7077c8e6090cbfdb763ba0021d38cd36191dd3ea30da9b8937fcd0cad329628218c2b0eb081b164a879feb652e3040fff9786917671f988b02880
-
Filesize
345KB
MD5fe894eb2bff63c51aff6c58ab271fadd
SHA101a68d18ae6901a86d0c4be7969ddce7ed91a977
SHA256039507d27858e9ab8d089d14d7e111975ca9a558431e2c845f5bea5fb6e8f23e
SHA5125ad2957eb73acca84bd046b09ddff9b940c92b0cb9b0ff3ccaab88bf2ee1ea3cee6f1606440f6aed23b2172fdbbbd0675c8d11ccad5df2c5854fefce8cf55c8f
-
Filesize
345KB
MD5fe894eb2bff63c51aff6c58ab271fadd
SHA101a68d18ae6901a86d0c4be7969ddce7ed91a977
SHA256039507d27858e9ab8d089d14d7e111975ca9a558431e2c845f5bea5fb6e8f23e
SHA5125ad2957eb73acca84bd046b09ddff9b940c92b0cb9b0ff3ccaab88bf2ee1ea3cee6f1606440f6aed23b2172fdbbbd0675c8d11ccad5df2c5854fefce8cf55c8f