Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:16
Static task
static1
Behavioral task
behavioral1
Sample
0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe
Resource
win10v2004-20230221-en
General
-
Target
0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe
-
Size
690KB
-
MD5
1b526aa866efbabb700696996b1cdf2f
-
SHA1
63e8ef3c8ef7b574c4b9927bb990c88f65bc4fd7
-
SHA256
0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5
-
SHA512
1b53d59ca4005f6b1367b45b8b0ccf90a7637dee40e729f99b4014a89d638860ac6b7dae08e5d8c4c5e6d9805ffd8c07e80b6f3d1e63a0d9cad172e62a1060ba
-
SSDEEP
12288:JMr4y9054ntlSgKm4tHdGMSP2sVCawyZAvlFS0figh5wzt2zhyr9VdW:Jyntl1deAMSTRBZA3S0ag3ot8w9VdW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2604-191-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-192-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-194-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-196-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-198-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-200-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-202-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-204-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-206-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-208-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-210-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-212-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-214-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-216-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-218-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-220-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-222-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-224-0x0000000005FE0000-0x000000000601F000-memory.dmp family_redline behavioral1/memory/2604-227-0x0000000006180000-0x0000000006190000-memory.dmp family_redline behavioral1/memory/2604-229-0x0000000006180000-0x0000000006190000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5060 un918430.exe 3628 pro2762.exe 2604 qu0627.exe 2664 si130030.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2762.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un918430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un918430.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3716 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4796 3628 WerFault.exe 86 3980 2604 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3628 pro2762.exe 3628 pro2762.exe 2604 qu0627.exe 2604 qu0627.exe 2664 si130030.exe 2664 si130030.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3628 pro2762.exe Token: SeDebugPrivilege 2604 qu0627.exe Token: SeDebugPrivilege 2664 si130030.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4640 wrote to memory of 5060 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 85 PID 4640 wrote to memory of 5060 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 85 PID 4640 wrote to memory of 5060 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 85 PID 5060 wrote to memory of 3628 5060 un918430.exe 86 PID 5060 wrote to memory of 3628 5060 un918430.exe 86 PID 5060 wrote to memory of 3628 5060 un918430.exe 86 PID 5060 wrote to memory of 2604 5060 un918430.exe 92 PID 5060 wrote to memory of 2604 5060 un918430.exe 92 PID 5060 wrote to memory of 2604 5060 un918430.exe 92 PID 4640 wrote to memory of 2664 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 96 PID 4640 wrote to memory of 2664 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 96 PID 4640 wrote to memory of 2664 4640 0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe"C:\Users\Admin\AppData\Local\Temp\0f2045b0ac8dbc2ef5e13a30afcd57e596ad90ccd9b1b50bc15d05b4605117d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un918430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un918430.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 10844⤵
- Program crash
PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0627.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 19124⤵
- Program crash
PID:3980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si130030.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3628 -ip 36281⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2604 -ip 26041⤵PID:5004
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD528df937a19df623ece89b6b8eba69440
SHA156fa01bb45a48bfacb2f56a6d5038dc7098e472e
SHA256261c11c27377273bed4713d9c611e73a5087b8d825b0acf165743708e6cece62
SHA512d44a7d91f94117782ceb79f61fd1cbeeabf0141fc749a0f6e32402f675fb3657dda6a797b4a53f1c39561ba49bf3a76399b617011eb49f34c4951ad14140329c
-
Filesize
175KB
MD528df937a19df623ece89b6b8eba69440
SHA156fa01bb45a48bfacb2f56a6d5038dc7098e472e
SHA256261c11c27377273bed4713d9c611e73a5087b8d825b0acf165743708e6cece62
SHA512d44a7d91f94117782ceb79f61fd1cbeeabf0141fc749a0f6e32402f675fb3657dda6a797b4a53f1c39561ba49bf3a76399b617011eb49f34c4951ad14140329c
-
Filesize
548KB
MD5106d4110682e85298d226c9e6eb4c852
SHA100c087b3794ecaa42e71d1cabc47b3818adb59ca
SHA25610b91c6c4437f0effd70104c31057babede50832f30aaa7009c8c8bed86ded7e
SHA5121b5a4af554561cfe725d34afb2bd9ba0e845b77e2ae2110679a97237f50b4d4bd3cf09fc76d635d7aa8663ad5d23a0d8edf51bc614fb4388b2d2530d7745d4e5
-
Filesize
548KB
MD5106d4110682e85298d226c9e6eb4c852
SHA100c087b3794ecaa42e71d1cabc47b3818adb59ca
SHA25610b91c6c4437f0effd70104c31057babede50832f30aaa7009c8c8bed86ded7e
SHA5121b5a4af554561cfe725d34afb2bd9ba0e845b77e2ae2110679a97237f50b4d4bd3cf09fc76d635d7aa8663ad5d23a0d8edf51bc614fb4388b2d2530d7745d4e5
-
Filesize
291KB
MD5a6d0c9e8b7a7224c1a1a4c99f0fd6668
SHA12f8211a6c716f42c47a379a15c5bf4cf8d2d6b46
SHA256defe26fc44ec10d26fd85e5eed56e3032c329ccbba89e6a849ab97aa1ab72807
SHA5121bbb810caec1f2b7211a42b08523bbbb866630eac265b572d852dd06c4c0b883e3cfb3fe5de04e2d0eebf6b09386df505642972bdf0cf9054cf9c049757dce25
-
Filesize
291KB
MD5a6d0c9e8b7a7224c1a1a4c99f0fd6668
SHA12f8211a6c716f42c47a379a15c5bf4cf8d2d6b46
SHA256defe26fc44ec10d26fd85e5eed56e3032c329ccbba89e6a849ab97aa1ab72807
SHA5121bbb810caec1f2b7211a42b08523bbbb866630eac265b572d852dd06c4c0b883e3cfb3fe5de04e2d0eebf6b09386df505642972bdf0cf9054cf9c049757dce25
-
Filesize
345KB
MD5e1091d8b10e1dd1505883724a0990736
SHA1d1804ccd46cacd1c247fd7cd59f4ba31748ef1cb
SHA256bac957dd3d46d9e75aaade10e549c1f33c9a2eb381fcfea77b03a4a3e50b1dc0
SHA5127a176a10470a402066695fac97002f35dd4d7b2b55b78631f938bf16e89e75f33edde0a15fe62fdd3612454963d2abd135d68fce1738ad6c7bda44e02a1ad280
-
Filesize
345KB
MD5e1091d8b10e1dd1505883724a0990736
SHA1d1804ccd46cacd1c247fd7cd59f4ba31748ef1cb
SHA256bac957dd3d46d9e75aaade10e549c1f33c9a2eb381fcfea77b03a4a3e50b1dc0
SHA5127a176a10470a402066695fac97002f35dd4d7b2b55b78631f938bf16e89e75f33edde0a15fe62fdd3612454963d2abd135d68fce1738ad6c7bda44e02a1ad280