Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:57
Static task
static1
Behavioral task
behavioral1
Sample
49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe
Resource
win10v2004-20230220-en
General
-
Target
49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe
-
Size
690KB
-
MD5
2ed9f520c1d4d29c50ddbb7f142049ce
-
SHA1
80aa4fca4c979a38d1cd5b1bc6e3ea79503effda
-
SHA256
49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c
-
SHA512
7a7ce9a8002eba7158f0fc16e4eaade9feed5177439a0e63283fef67fd48ed1ad8f099fdcae5813c8a05dbb3fc28f90b67df3b50f3ca492b95b1f03002989324
-
SSDEEP
12288:qMrWy90V4c4Jk1ZF0KuH9UG8OM3KInzSM/8IzPL8rHXF5oLI4jwecU:Iych4Juox9UmMrSa8ILKF5oMucU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8899.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8899.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8899.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8899.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8899.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8899.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1380-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-199-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-201-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-203-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-205-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-207-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-219-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-221-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-223-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-225-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/1380-284-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline behavioral1/memory/1380-1110-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4216 un201103.exe 1604 pro8899.exe 1380 qu2667.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8899.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8899.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un201103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un201103.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4116 1604 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1604 pro8899.exe 1604 pro8899.exe 1380 qu2667.exe 1380 qu2667.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1604 pro8899.exe Token: SeDebugPrivilege 1380 qu2667.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 800 wrote to memory of 4216 800 49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe 83 PID 800 wrote to memory of 4216 800 49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe 83 PID 800 wrote to memory of 4216 800 49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe 83 PID 4216 wrote to memory of 1604 4216 un201103.exe 84 PID 4216 wrote to memory of 1604 4216 un201103.exe 84 PID 4216 wrote to memory of 1604 4216 un201103.exe 84 PID 4216 wrote to memory of 1380 4216 un201103.exe 90 PID 4216 wrote to memory of 1380 4216 un201103.exe 90 PID 4216 wrote to memory of 1380 4216 un201103.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe"C:\Users\Admin\AppData\Local\Temp\49c2e881052b93ba70e12008918cd3055f87fe7bdb1fab1ead89ec5d1302563c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8899.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8899.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 10764⤵
- Program crash
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1604 -ip 16041⤵PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD53e52cebbd65cae8b4f38bc280d82abcd
SHA1c6c67c2bf6378b3ae2778a657f3b7116008b1bf4
SHA256fd61391bf30cdcbbaacb2ac78658fe14b1e067f8cf1a66f7f989993af08c2a7e
SHA5123466132e1334c0aa0d5b02f1f2477707b08ffd801d0f4669869d43e94eb6a787289d7533538acea3b16764061fdbac2ed5990b3396ff412697246ceec73d4271
-
Filesize
548KB
MD53e52cebbd65cae8b4f38bc280d82abcd
SHA1c6c67c2bf6378b3ae2778a657f3b7116008b1bf4
SHA256fd61391bf30cdcbbaacb2ac78658fe14b1e067f8cf1a66f7f989993af08c2a7e
SHA5123466132e1334c0aa0d5b02f1f2477707b08ffd801d0f4669869d43e94eb6a787289d7533538acea3b16764061fdbac2ed5990b3396ff412697246ceec73d4271
-
Filesize
291KB
MD5628a4f7a047cc1c84725d2095ffb2d2d
SHA14709f38b6df551f42c6352cf73524aba51ec1649
SHA256889806864dfc1c5d962cc064ac2ece81cf90d8912ff092cd22d89bbeac1429c8
SHA512ce55c7be8f2e16e39e2ca5eb1e43a3236497d703938d0d96d7e6b9840ccf98dcf1d67446a4bc06a4b081a099a1408f0d7441b7adde33f28ef3d518154f9a014f
-
Filesize
291KB
MD5628a4f7a047cc1c84725d2095ffb2d2d
SHA14709f38b6df551f42c6352cf73524aba51ec1649
SHA256889806864dfc1c5d962cc064ac2ece81cf90d8912ff092cd22d89bbeac1429c8
SHA512ce55c7be8f2e16e39e2ca5eb1e43a3236497d703938d0d96d7e6b9840ccf98dcf1d67446a4bc06a4b081a099a1408f0d7441b7adde33f28ef3d518154f9a014f
-
Filesize
350KB
MD51d100fe104af17211acea59264978bbc
SHA17dd0f277da14785b80744420264e497d9489bbcb
SHA2567ca32b0fa90ff657528870048271675e62b21ec7cd32b29841723a5425646d97
SHA512d7b0c62215c6aa81e419297976592d81571834820d6854b0de6fcd924f68b1aca07cfa394e5b65056c305a5420a56f4977206b14a1fd93ebe4102cc54649d91c
-
Filesize
350KB
MD51d100fe104af17211acea59264978bbc
SHA17dd0f277da14785b80744420264e497d9489bbcb
SHA2567ca32b0fa90ff657528870048271675e62b21ec7cd32b29841723a5425646d97
SHA512d7b0c62215c6aa81e419297976592d81571834820d6854b0de6fcd924f68b1aca07cfa394e5b65056c305a5420a56f4977206b14a1fd93ebe4102cc54649d91c