Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe
Resource
win10v2004-20230220-en
General
-
Target
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe
-
Size
689KB
-
MD5
c682ea1c8cc3f2b71811fa851fc15ba1
-
SHA1
1daad07ac57b0340c5cefdd8145fb5fbae27535a
-
SHA256
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e
-
SHA512
c16e3ad93256527037ec01bba33a692e07a74f1043eaaf6b9b17249a4260c8080af9b59d52940824c905f907dfe21769bb1c6bf75f1f0107f49697b7e8b4e7f3
-
SSDEEP
12288:7Mryy90u4XCLY/hzCraEulyV65hLuNw+odqgy0xK6YvvOFgnfigFnZVxSgAKW:hy8XCQumZMIfaGByh6YvqgnagjnW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1018.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2264-191-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-192-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-194-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-196-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-198-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-200-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-202-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-204-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-206-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-208-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-210-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-212-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-214-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-216-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-218-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-220-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-222-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-224-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2264-269-0x0000000006020000-0x0000000006030000-memory.dmp family_redline behavioral1/memory/2264-1109-0x0000000006020000-0x0000000006030000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3816 un218863.exe 2872 pro1018.exe 2264 qu0940.exe 4888 si422783.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1018.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un218863.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un218863.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5076 2872 WerFault.exe 85 2964 2264 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 pro1018.exe 2872 pro1018.exe 2264 qu0940.exe 2264 qu0940.exe 4888 si422783.exe 4888 si422783.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2872 pro1018.exe Token: SeDebugPrivilege 2264 qu0940.exe Token: SeDebugPrivilege 4888 si422783.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3816 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 84 PID 1400 wrote to memory of 3816 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 84 PID 1400 wrote to memory of 3816 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 84 PID 3816 wrote to memory of 2872 3816 un218863.exe 85 PID 3816 wrote to memory of 2872 3816 un218863.exe 85 PID 3816 wrote to memory of 2872 3816 un218863.exe 85 PID 3816 wrote to memory of 2264 3816 un218863.exe 91 PID 3816 wrote to memory of 2264 3816 un218863.exe 91 PID 3816 wrote to memory of 2264 3816 un218863.exe 91 PID 1400 wrote to memory of 4888 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 95 PID 1400 wrote to memory of 4888 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 95 PID 1400 wrote to memory of 4888 1400 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe"C:\Users\Admin\AppData\Local\Temp\4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218863.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218863.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1018.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1018.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 10884⤵
- Program crash
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 13644⤵
- Program crash
PID:2964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422783.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2872 -ip 28721⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2264 -ip 22641⤵PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5b55c37ffeb8b799baa8d90cb24973f
SHA174dd0c046885c0d3eaa75c81f20bf9b4aaa82e89
SHA25670f8b36ec84c85ea3c7352ee1e019373860cca884011e030e1957a3a2d08220c
SHA5127e293bdceba55854144ce75f832bffe7af1b02472ed11daaaa079abb5f74af1ffea3093fa7a99f64f697e9fc765d42adfa44a64ff818dec3f81baf9262eee600
-
Filesize
175KB
MD5a5b55c37ffeb8b799baa8d90cb24973f
SHA174dd0c046885c0d3eaa75c81f20bf9b4aaa82e89
SHA25670f8b36ec84c85ea3c7352ee1e019373860cca884011e030e1957a3a2d08220c
SHA5127e293bdceba55854144ce75f832bffe7af1b02472ed11daaaa079abb5f74af1ffea3093fa7a99f64f697e9fc765d42adfa44a64ff818dec3f81baf9262eee600
-
Filesize
548KB
MD5fc67516aae181da768c2f1dbaade3f98
SHA147792fac9fc105bbf8988e14530408ac0534d672
SHA256dd5c42619ac2d0922e5e6b89a5630d3706103ea67e0e9822382841aaf1fff9af
SHA5122a5d5ac76188f238a446a984d1c2cff02b1ce7b5f59a0060b7746289c72f0a58eb753b1008af4d187817aa5e04b3095678cba0e8f40064d5e4c679d8e0b31d49
-
Filesize
548KB
MD5fc67516aae181da768c2f1dbaade3f98
SHA147792fac9fc105bbf8988e14530408ac0534d672
SHA256dd5c42619ac2d0922e5e6b89a5630d3706103ea67e0e9822382841aaf1fff9af
SHA5122a5d5ac76188f238a446a984d1c2cff02b1ce7b5f59a0060b7746289c72f0a58eb753b1008af4d187817aa5e04b3095678cba0e8f40064d5e4c679d8e0b31d49
-
Filesize
291KB
MD5c72f8f076bb983c6330de4431a3f84df
SHA145712ea3683c4ee31792ec3df23ccfcbdbb6148a
SHA256e759ab21fb5459580f7b5ad3a8119ba3256fdbd99575e8cad0b7498452779dae
SHA512b17a85948c5babb53aff50dfcb52add86c75911d81042b1b5695086ae77cd02c51daa7d4a73d6b8de698887f9193fdb8e5ff68559a1b87ea0db33415909943af
-
Filesize
291KB
MD5c72f8f076bb983c6330de4431a3f84df
SHA145712ea3683c4ee31792ec3df23ccfcbdbb6148a
SHA256e759ab21fb5459580f7b5ad3a8119ba3256fdbd99575e8cad0b7498452779dae
SHA512b17a85948c5babb53aff50dfcb52add86c75911d81042b1b5695086ae77cd02c51daa7d4a73d6b8de698887f9193fdb8e5ff68559a1b87ea0db33415909943af
-
Filesize
345KB
MD538f1395e7e5cd9ef6e604363ae99ab50
SHA1cc8c638e11151e228b55256ec543380ac8c41818
SHA256d19e587c7005427fb68b877cc83a644f0d45c5a31fc05f034c0b6738ea472938
SHA51284f5bd9d6eed19c57414756349e3a35f97d3b22e620be7e40bd588e5814e881f45456c1f9b9aaecf2dcfd380e2e37156829b726c8cb7805c803f1faf0d1f27f1
-
Filesize
345KB
MD538f1395e7e5cd9ef6e604363ae99ab50
SHA1cc8c638e11151e228b55256ec543380ac8c41818
SHA256d19e587c7005427fb68b877cc83a644f0d45c5a31fc05f034c0b6738ea472938
SHA51284f5bd9d6eed19c57414756349e3a35f97d3b22e620be7e40bd588e5814e881f45456c1f9b9aaecf2dcfd380e2e37156829b726c8cb7805c803f1faf0d1f27f1