Analysis
-
max time kernel
129s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe
Resource
win10v2004-20230220-en
General
-
Target
12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe
-
Size
689KB
-
MD5
392df10a262d849d35c36f95c8c70f72
-
SHA1
ede5b3deda6ff77671ba7ff96db31e6e6d32bf3b
-
SHA256
12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc
-
SHA512
12bda56abfdf35e85505f6c648d541778037e2522b1716a19440bdb1acbeb0bd296d91b543954e182e4fe6965a3059466ab740aa55f9c02dd1cfb1f6ed3f37ae
-
SSDEEP
12288:5Mruy908KKyFM1ctruyG65hLuAV9ahyVdRmJovRF8yfigK/P1IWsY55:nyT4NhNfaWaIdmJoD8yag8Is5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1582.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1582.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4864-190-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-191-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-193-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-195-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-197-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-199-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-201-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-203-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-205-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-207-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-209-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-211-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-213-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-215-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-219-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-221-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-217-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-223-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/4864-1107-0x0000000006210000-0x0000000006220000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un023443.exepro1582.exequ7530.exesi155959.exepid process 1060 un023443.exe 3744 pro1582.exe 4864 qu7530.exe 3464 si155959.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1582.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1582.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exeun023443.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un023443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un023443.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4224 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2168 3744 WerFault.exe pro1582.exe 668 4864 WerFault.exe qu7530.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1582.exequ7530.exesi155959.exepid process 3744 pro1582.exe 3744 pro1582.exe 4864 qu7530.exe 4864 qu7530.exe 3464 si155959.exe 3464 si155959.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1582.exequ7530.exesi155959.exedescription pid process Token: SeDebugPrivilege 3744 pro1582.exe Token: SeDebugPrivilege 4864 qu7530.exe Token: SeDebugPrivilege 3464 si155959.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exeun023443.exedescription pid process target process PID 4908 wrote to memory of 1060 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe un023443.exe PID 4908 wrote to memory of 1060 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe un023443.exe PID 4908 wrote to memory of 1060 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe un023443.exe PID 1060 wrote to memory of 3744 1060 un023443.exe pro1582.exe PID 1060 wrote to memory of 3744 1060 un023443.exe pro1582.exe PID 1060 wrote to memory of 3744 1060 un023443.exe pro1582.exe PID 1060 wrote to memory of 4864 1060 un023443.exe qu7530.exe PID 1060 wrote to memory of 4864 1060 un023443.exe qu7530.exe PID 1060 wrote to memory of 4864 1060 un023443.exe qu7530.exe PID 4908 wrote to memory of 3464 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe si155959.exe PID 4908 wrote to memory of 3464 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe si155959.exe PID 4908 wrote to memory of 3464 4908 12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe si155959.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe"C:\Users\Admin\AppData\Local\Temp\12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 10804⤵
- Program crash
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 13484⤵
- Program crash
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3744 -ip 37441⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4864 -ip 48641⤵PID:1168
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5144b29c437f153084628a551f9eca79e
SHA13575ccc63375dda5bf7e4d1a4ea11e2c20924400
SHA25603c8f1b974eac0097cbe6c4f49457db725dc4d2e0a2c8c3889f8d039d0c62ba0
SHA512297b4f0467480d059d018f198b897323ffa0391b1095deac1097286b06158954aba9830b4fa7a9b7d5751499d82164f175a9134715d46ee90f9bb6334d5a390d
-
Filesize
175KB
MD5144b29c437f153084628a551f9eca79e
SHA13575ccc63375dda5bf7e4d1a4ea11e2c20924400
SHA25603c8f1b974eac0097cbe6c4f49457db725dc4d2e0a2c8c3889f8d039d0c62ba0
SHA512297b4f0467480d059d018f198b897323ffa0391b1095deac1097286b06158954aba9830b4fa7a9b7d5751499d82164f175a9134715d46ee90f9bb6334d5a390d
-
Filesize
547KB
MD53cd38f7e3402207bdff420087abd518f
SHA133a9042273592b65682039c55d73577156fdc82a
SHA256136c012fb834d428d0f5a65efcd5ca4f641496d9787d3bc7953ab833a14cedbc
SHA5121f9742bc26456d726be8156518401fea3167ab3c5464c64e21c9e48a9c8761a5b982ac4cfec2a6c7457e99baeed217a18da835f7a1acb9be55b52f05e81cc1d4
-
Filesize
547KB
MD53cd38f7e3402207bdff420087abd518f
SHA133a9042273592b65682039c55d73577156fdc82a
SHA256136c012fb834d428d0f5a65efcd5ca4f641496d9787d3bc7953ab833a14cedbc
SHA5121f9742bc26456d726be8156518401fea3167ab3c5464c64e21c9e48a9c8761a5b982ac4cfec2a6c7457e99baeed217a18da835f7a1acb9be55b52f05e81cc1d4
-
Filesize
291KB
MD5a5a13e1be3a4fa5bdc9fe32362393aaa
SHA12d6547943fb350a97ccd5d79c3cc2c7cdba3d6fc
SHA2564c59e82b07a12bb495912fa54f4e1f41a205f5bb9e275f0febcadca887230232
SHA5125d9ee70dcd6c55f36a2c6e77f0f71f5f9bdfb1830f04b7651fe1d5c4a8259b4058a48b07c9df826b8a48826762571b7c66e921cb1a4ab3cfd4106d006677ef09
-
Filesize
291KB
MD5a5a13e1be3a4fa5bdc9fe32362393aaa
SHA12d6547943fb350a97ccd5d79c3cc2c7cdba3d6fc
SHA2564c59e82b07a12bb495912fa54f4e1f41a205f5bb9e275f0febcadca887230232
SHA5125d9ee70dcd6c55f36a2c6e77f0f71f5f9bdfb1830f04b7651fe1d5c4a8259b4058a48b07c9df826b8a48826762571b7c66e921cb1a4ab3cfd4106d006677ef09
-
Filesize
345KB
MD5d9cdecc926dde40baedc9fd7f277fdf5
SHA1a1518b811b1ed492dd11d3450cb00c78b1f1ae26
SHA256a441cc02a0bf5f4dc3db240482e31a5ab449fcabce0da3e89254878954207093
SHA512b474b00c84488207d0cb41a126cdba3a761f3313f7b3efc1841254bf2bbc263580eeeee22fde8e8cdc1366a70f4a793b853d7b03bcaa68e498bee383fae49b21
-
Filesize
345KB
MD5d9cdecc926dde40baedc9fd7f277fdf5
SHA1a1518b811b1ed492dd11d3450cb00c78b1f1ae26
SHA256a441cc02a0bf5f4dc3db240482e31a5ab449fcabce0da3e89254878954207093
SHA512b474b00c84488207d0cb41a126cdba3a761f3313f7b3efc1841254bf2bbc263580eeeee22fde8e8cdc1366a70f4a793b853d7b03bcaa68e498bee383fae49b21