Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 00:59
Static task
static1
Behavioral task
behavioral1
Sample
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe
Resource
win10v2004-20230220-en
General
-
Target
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe
-
Size
691KB
-
MD5
927b65e902f1fb8adf45febb599694b3
-
SHA1
94d50e3119f01b742d478647cd6e9df49b6558bb
-
SHA256
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39
-
SHA512
753013fe81933f249c783d48fb160c386cd85381b26fd30795c5c5a404ea26b5c848f1fadc77755d574ce465a0699a49317c364010253265ab5280da3027f554
-
SSDEEP
12288:jMrcy902oigTatj558rGHOJJsyO65hLuVs0MSKI3VHvS0oT0WVzVRCGul:HyfgWT8rDtVfaVs0LZ3VHa0oTNVRCGul
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8980.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8980.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1992-191-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-192-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-194-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-196-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-198-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-200-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-202-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-204-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-206-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-208-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-210-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-212-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-214-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-216-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-218-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-220-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-222-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1992-224-0x0000000002660000-0x000000000269F000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1604 un769817.exe 648 pro8980.exe 1992 qu7237.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8980.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un769817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un769817.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4240 648 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 648 pro8980.exe 648 pro8980.exe 1992 qu7237.exe 1992 qu7237.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 648 pro8980.exe Token: SeDebugPrivilege 1992 qu7237.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1604 4420 86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe 84 PID 4420 wrote to memory of 1604 4420 86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe 84 PID 4420 wrote to memory of 1604 4420 86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe 84 PID 1604 wrote to memory of 648 1604 un769817.exe 85 PID 1604 wrote to memory of 648 1604 un769817.exe 85 PID 1604 wrote to memory of 648 1604 un769817.exe 85 PID 1604 wrote to memory of 1992 1604 un769817.exe 91 PID 1604 wrote to memory of 1992 1604 un769817.exe 91 PID 1604 wrote to memory of 1992 1604 un769817.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe"C:\Users\Admin\AppData\Local\Temp\86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 10804⤵
- Program crash
PID:4240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 648 -ip 6481⤵PID:3744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD5497a87b3f80f0c466013d84981583e32
SHA11f9cdb2396edc156fd432ce152cc67df594ef527
SHA256e3edc30945d8f5b9f123b091f2e4d2cb19a9643048a92f7b7558b4be15936c82
SHA51267ac6dfcb30cb9a5d938d70a8778451d08dfe262442df039ac54f41b8da87febc776e0c92844e0c8f84c438f59a1b8a29973ec47b5efd1475b9ba25c7b95f9e4
-
Filesize
549KB
MD5497a87b3f80f0c466013d84981583e32
SHA11f9cdb2396edc156fd432ce152cc67df594ef527
SHA256e3edc30945d8f5b9f123b091f2e4d2cb19a9643048a92f7b7558b4be15936c82
SHA51267ac6dfcb30cb9a5d938d70a8778451d08dfe262442df039ac54f41b8da87febc776e0c92844e0c8f84c438f59a1b8a29973ec47b5efd1475b9ba25c7b95f9e4
-
Filesize
291KB
MD50c5be6b8c768893b7055f093323b5a3f
SHA10583dbd8c0ad5711f2b93cd8d07578d46b3b4561
SHA256eca4cf5a08398a6b64fefc119af18acf5c3632b51ecfef7e0de9a4461d1ba679
SHA5126f82ffb92f39d39e9879ae2f50feed555876a3cda1086ffba19e8298fc25daccb12aec42c93a6ab56a2906fdae3cb9aaf519d7dd1253bc2db0a59723faac684b
-
Filesize
291KB
MD50c5be6b8c768893b7055f093323b5a3f
SHA10583dbd8c0ad5711f2b93cd8d07578d46b3b4561
SHA256eca4cf5a08398a6b64fefc119af18acf5c3632b51ecfef7e0de9a4461d1ba679
SHA5126f82ffb92f39d39e9879ae2f50feed555876a3cda1086ffba19e8298fc25daccb12aec42c93a6ab56a2906fdae3cb9aaf519d7dd1253bc2db0a59723faac684b
-
Filesize
350KB
MD5b0071dc638803a59057aec4c300168da
SHA1d33ef38ea6a85bd9bca818f1f57f165792f67849
SHA256916327d0f2a525bcc3045200d12731c27939a3dd37ef54ccc2aec6b02db3377d
SHA5126fd435a3bc38314cfe26ccbc95446b2ece1412cc865d128c96d618cbe1d313d07bf7b81b160c9d5350083d1a789475cbee83814c17c2ed37a9ad50dbb5f14dab
-
Filesize
350KB
MD5b0071dc638803a59057aec4c300168da
SHA1d33ef38ea6a85bd9bca818f1f57f165792f67849
SHA256916327d0f2a525bcc3045200d12731c27939a3dd37ef54ccc2aec6b02db3377d
SHA5126fd435a3bc38314cfe26ccbc95446b2ece1412cc865d128c96d618cbe1d313d07bf7b81b160c9d5350083d1a789475cbee83814c17c2ed37a9ad50dbb5f14dab