Analysis
-
max time kernel
138s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:18
Static task
static1
Behavioral task
behavioral1
Sample
4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe
Resource
win10v2004-20230220-en
General
-
Target
4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe
-
Size
690KB
-
MD5
17de2ba6c6adbf66899f593e3d5dccf5
-
SHA1
e0c01884edf908756a783bedec266d4deed9a2b2
-
SHA256
4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c
-
SHA512
b5702bd7c9eccd7907896e67b7d7278f4445e1af5b66122ffadc2082e546f5b3b7506e64412b5f97fcc1f7eab21e9c5b733457f6a68a87965108e0f51cca45ba
-
SSDEEP
12288:yMrEy90fQGB0oGMvy8YeyL65hLuSVJFkOxy8tRngLvYFkmfign/TgOZOi:yy1NoGMvkbWfaaagyERgLwkmagEOd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0174.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2600-189-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-190-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-194-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-192-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-197-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-201-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-204-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-206-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-208-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-210-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-212-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-214-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-216-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-218-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-220-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-222-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-224-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/2600-226-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 768 un642294.exe 4124 pro0174.exe 2600 qu2552.exe 2116 si937012.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0174.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un642294.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un642294.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4936 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4284 4124 WerFault.exe 80 3960 2600 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4124 pro0174.exe 4124 pro0174.exe 2600 qu2552.exe 2600 qu2552.exe 2116 si937012.exe 2116 si937012.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4124 pro0174.exe Token: SeDebugPrivilege 2600 qu2552.exe Token: SeDebugPrivilege 2116 si937012.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4608 wrote to memory of 768 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 79 PID 4608 wrote to memory of 768 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 79 PID 4608 wrote to memory of 768 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 79 PID 768 wrote to memory of 4124 768 un642294.exe 80 PID 768 wrote to memory of 4124 768 un642294.exe 80 PID 768 wrote to memory of 4124 768 un642294.exe 80 PID 768 wrote to memory of 2600 768 un642294.exe 88 PID 768 wrote to memory of 2600 768 un642294.exe 88 PID 768 wrote to memory of 2600 768 un642294.exe 88 PID 4608 wrote to memory of 2116 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 92 PID 4608 wrote to memory of 2116 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 92 PID 4608 wrote to memory of 2116 4608 4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe"C:\Users\Admin\AppData\Local\Temp\4a0aedb6aab771d87dc6e1f2c67ec9681bdfa6f5cf92b5a97a0c4495bc495c9c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642294.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0174.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10084⤵
- Program crash
PID:4284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2552.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 17884⤵
- Program crash
PID:3960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si937012.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si937012.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4124 -ip 41241⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2600 -ip 26001⤵PID:4696
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dc9afefc46707dc0da9746be9a36117b
SHA1965ffc093130ce8981a87d32adbbde5e884844c4
SHA256d5c70f207b8bfa787b97e168a3fb1c14cbddb2ae1971b6896fa2b804c47483fb
SHA512c9114f080c6f45186e65b7ab0df95b50d7d63584253d181f07cf518c7ba8f837967027a6067e417d12ec331d5a048f58c5f6f4a156a22690cac13ef37d1f37ba
-
Filesize
175KB
MD5dc9afefc46707dc0da9746be9a36117b
SHA1965ffc093130ce8981a87d32adbbde5e884844c4
SHA256d5c70f207b8bfa787b97e168a3fb1c14cbddb2ae1971b6896fa2b804c47483fb
SHA512c9114f080c6f45186e65b7ab0df95b50d7d63584253d181f07cf518c7ba8f837967027a6067e417d12ec331d5a048f58c5f6f4a156a22690cac13ef37d1f37ba
-
Filesize
548KB
MD5324aa937aee5199a4b77acb1c307904f
SHA176a8773a24edfb6aa50051f3e2456f7b9d922aa0
SHA256b1d77601fdc262d6e173c2fd91eaa67d4734e9629c37cf1390687753840199db
SHA512af806aadebf18674ae3ecda02ebcb8d0378d50f5c4490db4da7891474121486835a0c4f9bc90b39c70df30f9413bdd3205f4e34531ff0ea3bdbb7bfffab5f6e9
-
Filesize
548KB
MD5324aa937aee5199a4b77acb1c307904f
SHA176a8773a24edfb6aa50051f3e2456f7b9d922aa0
SHA256b1d77601fdc262d6e173c2fd91eaa67d4734e9629c37cf1390687753840199db
SHA512af806aadebf18674ae3ecda02ebcb8d0378d50f5c4490db4da7891474121486835a0c4f9bc90b39c70df30f9413bdd3205f4e34531ff0ea3bdbb7bfffab5f6e9
-
Filesize
291KB
MD5b0804df2ecbeefd631fe2da90c4a5e09
SHA127bcf01d4ba627524467af357537f53263d1f9ab
SHA2567f555089995c96ae64e5f7dfb179a44786c553c339473c92a405000040a9dd5f
SHA5120e557c7abfefc972d8573fc774012bc5559640f1657c7cd28517e85cd1455eaa7c37ef1dc8f8316971eed1c705cc9bc8712eecab19c3dc1155d0bf465cf0b1dd
-
Filesize
291KB
MD5b0804df2ecbeefd631fe2da90c4a5e09
SHA127bcf01d4ba627524467af357537f53263d1f9ab
SHA2567f555089995c96ae64e5f7dfb179a44786c553c339473c92a405000040a9dd5f
SHA5120e557c7abfefc972d8573fc774012bc5559640f1657c7cd28517e85cd1455eaa7c37ef1dc8f8316971eed1c705cc9bc8712eecab19c3dc1155d0bf465cf0b1dd
-
Filesize
345KB
MD54e200205f61220323ecb570b74f59cb8
SHA12749ffd070736dcf2efede67e38c922dcd1d7937
SHA256f34404b2ce6c381945b97b4b0ca8d15c5d98af03092199b6d5667cebb5d928e1
SHA5126ee580b6db8727ebe97a0348892953d3c670a47c4b18229178fb28244973ebb322e3016d62f0bc27e824738ff55ac23b560df07a1c508821d74faedbf14ef1cf
-
Filesize
345KB
MD54e200205f61220323ecb570b74f59cb8
SHA12749ffd070736dcf2efede67e38c922dcd1d7937
SHA256f34404b2ce6c381945b97b4b0ca8d15c5d98af03092199b6d5667cebb5d928e1
SHA5126ee580b6db8727ebe97a0348892953d3c670a47c4b18229178fb28244973ebb322e3016d62f0bc27e824738ff55ac23b560df07a1c508821d74faedbf14ef1cf