Analysis
-
max time kernel
86s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe
Resource
win10v2004-20230220-en
General
-
Target
c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe
-
Size
690KB
-
MD5
0e311c3ecd949d87fc484b6161d38ac7
-
SHA1
6a541dde37b478987c93356385fb4dee910e45be
-
SHA256
c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692
-
SHA512
28fb2fb77c2ec1c23063caf3b40b71b173ce1c8246a6bb85c211cca985a4098dee2db7ab642eb0c7114bc02b39db9fac31dabfa4d84e4ec9566eb54ab34450d7
-
SSDEEP
12288:/Mr4y90ExaZK1ojDvq7qFPzyw65hLuAmXN4MmHvoF2IfigYjy/h2E7+WL:fy/MLrqMPuPfa3yMmHw2IagPDL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9238.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/736-188-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-189-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-191-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-193-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-195-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-197-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-199-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-201-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-203-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-205-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-207-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-209-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-211-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-213-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-215-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-217-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-219-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/736-221-0x0000000006000000-0x000000000603F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4212 un502934.exe 2920 pro9238.exe 736 qu3454.exe 3328 si956061.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9238.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un502934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un502934.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4084 2920 WerFault.exe 84 796 736 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2920 pro9238.exe 2920 pro9238.exe 736 qu3454.exe 736 qu3454.exe 3328 si956061.exe 3328 si956061.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2920 pro9238.exe Token: SeDebugPrivilege 736 qu3454.exe Token: SeDebugPrivilege 3328 si956061.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4212 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 83 PID 2708 wrote to memory of 4212 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 83 PID 2708 wrote to memory of 4212 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 83 PID 4212 wrote to memory of 2920 4212 un502934.exe 84 PID 4212 wrote to memory of 2920 4212 un502934.exe 84 PID 4212 wrote to memory of 2920 4212 un502934.exe 84 PID 4212 wrote to memory of 736 4212 un502934.exe 92 PID 4212 wrote to memory of 736 4212 un502934.exe 92 PID 4212 wrote to memory of 736 4212 un502934.exe 92 PID 2708 wrote to memory of 3328 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 97 PID 2708 wrote to memory of 3328 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 97 PID 2708 wrote to memory of 3328 2708 c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe"C:\Users\Admin\AppData\Local\Temp\c0090156b0d8d5354da0ad43c555c9e70006aa0bfb7c8274003eeb2336153692.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9238.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10804⤵
- Program crash
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3454.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 11924⤵
- Program crash
PID:796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956061.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2920 -ip 29201⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 736 -ip 7361⤵PID:3392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cf6f29982b7c3af76dad484defc62aac
SHA14a3aae0f9deb51586db5460352a37924406ba24c
SHA256eec917f924548625e9efe454ed1cbaf27e48e2ac3b19b0f54ce5d7bfbe650258
SHA5122350cb464d057fa6f79afbf9636e00292721bb737930f19dc2d38b52b913380fad412e73c58de7d161c34cefb1de76e36fcb8e3e555422d5dda728c31aa9495d
-
Filesize
175KB
MD5cf6f29982b7c3af76dad484defc62aac
SHA14a3aae0f9deb51586db5460352a37924406ba24c
SHA256eec917f924548625e9efe454ed1cbaf27e48e2ac3b19b0f54ce5d7bfbe650258
SHA5122350cb464d057fa6f79afbf9636e00292721bb737930f19dc2d38b52b913380fad412e73c58de7d161c34cefb1de76e36fcb8e3e555422d5dda728c31aa9495d
-
Filesize
548KB
MD5ea07fd3cb0ed415262d70849d1a58028
SHA15e29e0ff65363c37d35c7e7a8278e1229ea70008
SHA2564c80932bc90ce1f805f6bfacc396c64f2bd4bdca4e5463184b29c76956efea70
SHA512ce490c13df7059e5ea0c5022da067c7ff521d56e6dd7e75036c5da726c08a0f2d1bff33ecd783f9b5c8a73d49838f177f52aec0c79305147f4b1d5a08f6ca9aa
-
Filesize
548KB
MD5ea07fd3cb0ed415262d70849d1a58028
SHA15e29e0ff65363c37d35c7e7a8278e1229ea70008
SHA2564c80932bc90ce1f805f6bfacc396c64f2bd4bdca4e5463184b29c76956efea70
SHA512ce490c13df7059e5ea0c5022da067c7ff521d56e6dd7e75036c5da726c08a0f2d1bff33ecd783f9b5c8a73d49838f177f52aec0c79305147f4b1d5a08f6ca9aa
-
Filesize
291KB
MD5f3f4f8a030af0551beb461a03260b321
SHA17e4f611be94ff01157c59c824e9802595ff4d69a
SHA256ce436e7d6ca7b5f313c6a300d8bac9a2594cbc5ac47991fcdffe2ec00b08275b
SHA512bf1628e18742c76c8ec855c5097d83cbe9e1d4d5b84a6330be2ebd4df4a47dfdadad71ce053c04ed873090ccce6fbe058c36f92caef8aa8e53314b3c91029ad5
-
Filesize
291KB
MD5f3f4f8a030af0551beb461a03260b321
SHA17e4f611be94ff01157c59c824e9802595ff4d69a
SHA256ce436e7d6ca7b5f313c6a300d8bac9a2594cbc5ac47991fcdffe2ec00b08275b
SHA512bf1628e18742c76c8ec855c5097d83cbe9e1d4d5b84a6330be2ebd4df4a47dfdadad71ce053c04ed873090ccce6fbe058c36f92caef8aa8e53314b3c91029ad5
-
Filesize
345KB
MD589904f077ead15f7a06f8d2533bd77a5
SHA1c77e4aa71b6373f25f1f5772f65f5689711629f8
SHA256d9e508e633de774d81fe576c666b44b440bb283631e804ff47d19c38ebedf505
SHA512b56e452494742669eb257f062e0c6df4c5c4a7f9694acae15ddf8d0253c159234de1c594d8c709daeb9d675bacf8988a5ffc2f134211a4712f81261940a4ca08
-
Filesize
345KB
MD589904f077ead15f7a06f8d2533bd77a5
SHA1c77e4aa71b6373f25f1f5772f65f5689711629f8
SHA256d9e508e633de774d81fe576c666b44b440bb283631e804ff47d19c38ebedf505
SHA512b56e452494742669eb257f062e0c6df4c5c4a7f9694acae15ddf8d0253c159234de1c594d8c709daeb9d675bacf8988a5ffc2f134211a4712f81261940a4ca08