Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:24
Static task
static1
Behavioral task
behavioral1
Sample
ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe
Resource
win10v2004-20230221-en
General
-
Target
ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe
-
Size
690KB
-
MD5
a2aae0b671b1bc782097483a7fc32065
-
SHA1
7ab9f5c1ddb8df8abf3272df9884e960d14c655e
-
SHA256
ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209
-
SHA512
29f2819ee939918c39741ef036e3deb2c12562b5de88260e41e998d01e9b9278c99213eba10ebc20705ded4c79931e7d6ac2e929911581f19bcc0e176fed725f
-
SSDEEP
12288:wMrqy90AG4U9/biS46GfIyK65hLu7UXyxLuXd2D+vdFLlfigs/28pbDVdQ4:KyPyiSBGx5fa7UXS0cD+vLlagDkbD3b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5169.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5169.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1936-194-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-195-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-197-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-199-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-201-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-203-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-205-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-207-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-209-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-211-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-213-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-215-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-217-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-219-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-221-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-223-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-225-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/1936-227-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1436 un151934.exe 2072 pro5169.exe 1936 qu1113.exe 3940 si690482.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5169.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5169.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un151934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un151934.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1672 2072 WerFault.exe 88 4984 1936 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 pro5169.exe 2072 pro5169.exe 1936 qu1113.exe 1936 qu1113.exe 3940 si690482.exe 3940 si690482.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2072 pro5169.exe Token: SeDebugPrivilege 1936 qu1113.exe Token: SeDebugPrivilege 3940 si690482.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1436 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 87 PID 1756 wrote to memory of 1436 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 87 PID 1756 wrote to memory of 1436 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 87 PID 1436 wrote to memory of 2072 1436 un151934.exe 88 PID 1436 wrote to memory of 2072 1436 un151934.exe 88 PID 1436 wrote to memory of 2072 1436 un151934.exe 88 PID 1436 wrote to memory of 1936 1436 un151934.exe 97 PID 1436 wrote to memory of 1936 1436 un151934.exe 97 PID 1436 wrote to memory of 1936 1436 un151934.exe 97 PID 1756 wrote to memory of 3940 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 101 PID 1756 wrote to memory of 3940 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 101 PID 1756 wrote to memory of 3940 1756 ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe"C:\Users\Admin\AppData\Local\Temp\ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 10804⤵
- Program crash
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 13444⤵
- Program crash
PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2072 -ip 20721⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1936 -ip 19361⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ec4a8ebe6e4fb9ee986e74a2a2ff5a62
SHA1dec249256f12117f7ac955754ab6b348475f1be7
SHA25649f6827115fc2d7f554a98d632aa46471bd5bae11f2938b8fb67cf803cafca06
SHA512158e80950f27e003ec7df30907412cf429d0e4dc3fec9a48cdb4715e1399fcb7eea16d7c82f1e7644150b92aabdc9fb7469ae07412369894813d56e210a29fc7
-
Filesize
175KB
MD5ec4a8ebe6e4fb9ee986e74a2a2ff5a62
SHA1dec249256f12117f7ac955754ab6b348475f1be7
SHA25649f6827115fc2d7f554a98d632aa46471bd5bae11f2938b8fb67cf803cafca06
SHA512158e80950f27e003ec7df30907412cf429d0e4dc3fec9a48cdb4715e1399fcb7eea16d7c82f1e7644150b92aabdc9fb7469ae07412369894813d56e210a29fc7
-
Filesize
548KB
MD58b10c12939d91dff8af57d32a342ecc4
SHA1ca2ccef61b6979b1de7e1263e0014a06054d9a6a
SHA256fc6c973bec17dba026a723a36a44238c79593c3187719283ddcbfb6cf7a82014
SHA512bd4095ef2522ccda5b2353d1c734d0382c95fb8ce2b1af45fde8d611438e7778e6d0add9cc7c1e4c640704d7166bdbe6f5ff1f260b8502639d27bc508773d748
-
Filesize
548KB
MD58b10c12939d91dff8af57d32a342ecc4
SHA1ca2ccef61b6979b1de7e1263e0014a06054d9a6a
SHA256fc6c973bec17dba026a723a36a44238c79593c3187719283ddcbfb6cf7a82014
SHA512bd4095ef2522ccda5b2353d1c734d0382c95fb8ce2b1af45fde8d611438e7778e6d0add9cc7c1e4c640704d7166bdbe6f5ff1f260b8502639d27bc508773d748
-
Filesize
291KB
MD560a7f226ecc89c50834f7023811a447b
SHA18e3e28c1278ebb043d269872bbcb8e6aaa7ba2d1
SHA256af45dd49db3cfa275e35fe80c70971660c031b4edd98cf5d70ae374decb33f2d
SHA51248d30c78ecbd607f9e05983682ffdfade54b4b693acb6bcc68a5061c1eccb70d336e2951e17a6910fc90248d3f7120027f77f64a0a02a862f4d6dbae2adeba48
-
Filesize
291KB
MD560a7f226ecc89c50834f7023811a447b
SHA18e3e28c1278ebb043d269872bbcb8e6aaa7ba2d1
SHA256af45dd49db3cfa275e35fe80c70971660c031b4edd98cf5d70ae374decb33f2d
SHA51248d30c78ecbd607f9e05983682ffdfade54b4b693acb6bcc68a5061c1eccb70d336e2951e17a6910fc90248d3f7120027f77f64a0a02a862f4d6dbae2adeba48
-
Filesize
345KB
MD5827fc27d806f5a832cef552ed4ff9ea7
SHA1ccaed057bc9460c586b717573cf7739bb0a7244f
SHA256514592b2ca4472850a70e4ecf13edb0fda8eea1e39cdaf12715ad63bff0eaecc
SHA5121f260dd753f4cbd46714c3f9db22bc77119aaeaecbe1efa3f9a840e9908c0e1bc2123c1688bac84c2187f284f449357500ce0558123e20cd4b26bc5aac1f1f6f
-
Filesize
345KB
MD5827fc27d806f5a832cef552ed4ff9ea7
SHA1ccaed057bc9460c586b717573cf7739bb0a7244f
SHA256514592b2ca4472850a70e4ecf13edb0fda8eea1e39cdaf12715ad63bff0eaecc
SHA5121f260dd753f4cbd46714c3f9db22bc77119aaeaecbe1efa3f9a840e9908c0e1bc2123c1688bac84c2187f284f449357500ce0558123e20cd4b26bc5aac1f1f6f