Analysis
-
max time kernel
93s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe
Resource
win10v2004-20230220-en
General
-
Target
0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe
-
Size
689KB
-
MD5
719dbaf91099132827a59f330a83e749
-
SHA1
b69bff08f10272e9b6b79446d21728a36b8a9f45
-
SHA256
0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e
-
SHA512
ac33dbcf6886cbeb80162d28510f6a2558f7ddd44c0c56ce2e73e3d42efb40f6219bfb89bf300a7b69268871c32ce08f63efc03afcc850190dc2c530453559af
-
SSDEEP
12288:BMrmy90577tlRPulRM6szyv65hLuE+K3huSvdvRvNipvXqmJsvVFxtfigaP2/S1B:7yWplEDMtuifa7KRuqCvamJsnxtagapB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2602.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2602.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1432-192-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-194-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-191-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-196-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-198-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-200-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-202-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-204-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-206-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-208-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-210-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-212-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-214-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-216-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-218-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-220-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-222-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-224-0x00000000037C0000-0x00000000037FF000-memory.dmp family_redline behavioral1/memory/1432-337-0x00000000061E0000-0x00000000061F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 564 un423333.exe 4380 pro2602.exe 1432 qu1979.exe 4172 si715957.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2602.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un423333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un423333.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3688 4380 WerFault.exe 85 5048 1432 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4380 pro2602.exe 4380 pro2602.exe 1432 qu1979.exe 1432 qu1979.exe 4172 si715957.exe 4172 si715957.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4380 pro2602.exe Token: SeDebugPrivilege 1432 qu1979.exe Token: SeDebugPrivilege 4172 si715957.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 544 wrote to memory of 564 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 84 PID 544 wrote to memory of 564 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 84 PID 544 wrote to memory of 564 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 84 PID 564 wrote to memory of 4380 564 un423333.exe 85 PID 564 wrote to memory of 4380 564 un423333.exe 85 PID 564 wrote to memory of 4380 564 un423333.exe 85 PID 564 wrote to memory of 1432 564 un423333.exe 91 PID 564 wrote to memory of 1432 564 un423333.exe 91 PID 564 wrote to memory of 1432 564 un423333.exe 91 PID 544 wrote to memory of 4172 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 95 PID 544 wrote to memory of 4172 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 95 PID 544 wrote to memory of 4172 544 0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe"C:\Users\Admin\AppData\Local\Temp\0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 10844⤵
- Program crash
PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 13684⤵
- Program crash
PID:5048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4380 -ip 43801⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1432 -ip 14321⤵PID:3804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD562a2831abfb957029016295090ec06fc
SHA10a25a9066f0f18cd4d2e23f58bdeb6cfe6a7d901
SHA256e3c3606d0180a879155d5774d1b9d3709ae55f77460c6796c2030dc824a50dfb
SHA512abafd9dcd595e6e6dc1a144c4cfeff0fb043f8ff7e5f3c679bea49d7cf93c3bea2d084486735b3a995c17b2da39045c39bf2701098e681b036243553e851ab8a
-
Filesize
175KB
MD562a2831abfb957029016295090ec06fc
SHA10a25a9066f0f18cd4d2e23f58bdeb6cfe6a7d901
SHA256e3c3606d0180a879155d5774d1b9d3709ae55f77460c6796c2030dc824a50dfb
SHA512abafd9dcd595e6e6dc1a144c4cfeff0fb043f8ff7e5f3c679bea49d7cf93c3bea2d084486735b3a995c17b2da39045c39bf2701098e681b036243553e851ab8a
-
Filesize
547KB
MD5aa327e4b1777ae96905c19b3b546a82c
SHA1c27a34ab9e504d99c70b9feb8a0ba20aeb35acd0
SHA256ea9cf266fbc66142fff6e014cf2c3151318ae9971cee8420abf03ca7f70d5230
SHA5124fa64f422fe13a223a9b5fac4bf4d506baf919e9a7117732ce9f7ce8656701589d448d32ca5cccdb084bea52ca200bb457e7a901e88d4d2954db5b7f2f3bfc78
-
Filesize
547KB
MD5aa327e4b1777ae96905c19b3b546a82c
SHA1c27a34ab9e504d99c70b9feb8a0ba20aeb35acd0
SHA256ea9cf266fbc66142fff6e014cf2c3151318ae9971cee8420abf03ca7f70d5230
SHA5124fa64f422fe13a223a9b5fac4bf4d506baf919e9a7117732ce9f7ce8656701589d448d32ca5cccdb084bea52ca200bb457e7a901e88d4d2954db5b7f2f3bfc78
-
Filesize
291KB
MD531df8caf762592c6b2108f3c6fbb9456
SHA1aabe5376bcf6b202ce4b2332c7d682704b8a7568
SHA25683cd41d11145c68f0a6129b8d9e563279ecebe2e6079077993cfb67443300b05
SHA512c71896b79b92585805f07cc07d9fecdf6baca7b9a202a88864623367ba347a8a2cf68c5b07c1a887ee54602066db12c17c06b247a29ee7a621a8c37ce2141e29
-
Filesize
291KB
MD531df8caf762592c6b2108f3c6fbb9456
SHA1aabe5376bcf6b202ce4b2332c7d682704b8a7568
SHA25683cd41d11145c68f0a6129b8d9e563279ecebe2e6079077993cfb67443300b05
SHA512c71896b79b92585805f07cc07d9fecdf6baca7b9a202a88864623367ba347a8a2cf68c5b07c1a887ee54602066db12c17c06b247a29ee7a621a8c37ce2141e29
-
Filesize
345KB
MD5d703a1179d379a4ad775c5eeb2dcf516
SHA1f34f72246386b7891b6036f1dfd97a3d3f872aa4
SHA256a27036f00ec6c6821aa50974d08c770a2e9fa8c5094922ee1669ba202f2a2e0a
SHA512dba55667f8f2386e7722c16e91399078a570dad0f6d068099023654abe4208a4afa896dc8a86332bbcbbf1fd194e5d8471ddde7da6f25d47e5949908fc3f32f7
-
Filesize
345KB
MD5d703a1179d379a4ad775c5eeb2dcf516
SHA1f34f72246386b7891b6036f1dfd97a3d3f872aa4
SHA256a27036f00ec6c6821aa50974d08c770a2e9fa8c5094922ee1669ba202f2a2e0a
SHA512dba55667f8f2386e7722c16e91399078a570dad0f6d068099023654abe4208a4afa896dc8a86332bbcbbf1fd194e5d8471ddde7da6f25d47e5949908fc3f32f7