Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:33
Static task
static1
Behavioral task
behavioral1
Sample
6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe
Resource
win10v2004-20230220-en
General
-
Target
6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe
-
Size
689KB
-
MD5
715225559a26e9b3cc23c12f9aa6ec27
-
SHA1
62b5d66c76c56ed2fbcc883b3f1d948fec6f3b46
-
SHA256
6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9
-
SHA512
5b832ae76d6bf41c1ca4da7d911dbcf360e88397facba91505a2f53c9caf0960b9751c9ce9a258d97c25bd2eb761e440ff0b4e94de8c3471a69e23240c25457b
-
SSDEEP
12288:AMr0y90JdUcA1KYXQyx65hLuOHw2odbPc3skBvGFuffigQwgJlM7SW2rFFfB:EyudpA1LhcfajbGjBCufagK+7bgFNB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9070.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9070.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9070.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1180-191-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-192-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-194-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-196-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-198-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-200-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-202-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-204-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-206-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-208-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-210-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-212-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-214-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-216-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-218-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-220-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-222-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/1180-224-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un688065.exepro9070.exequ5215.exesi501228.exepid process 4268 un688065.exe 2660 pro9070.exe 1180 qu5215.exe 2256 si501228.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9070.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9070.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exeun688065.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un688065.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un688065.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1040 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1832 2660 WerFault.exe pro9070.exe 4396 1180 WerFault.exe qu5215.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9070.exequ5215.exesi501228.exepid process 2660 pro9070.exe 2660 pro9070.exe 1180 qu5215.exe 1180 qu5215.exe 2256 si501228.exe 2256 si501228.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9070.exequ5215.exesi501228.exedescription pid process Token: SeDebugPrivilege 2660 pro9070.exe Token: SeDebugPrivilege 1180 qu5215.exe Token: SeDebugPrivilege 2256 si501228.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exeun688065.exedescription pid process target process PID 1128 wrote to memory of 4268 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe un688065.exe PID 1128 wrote to memory of 4268 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe un688065.exe PID 1128 wrote to memory of 4268 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe un688065.exe PID 4268 wrote to memory of 2660 4268 un688065.exe pro9070.exe PID 4268 wrote to memory of 2660 4268 un688065.exe pro9070.exe PID 4268 wrote to memory of 2660 4268 un688065.exe pro9070.exe PID 4268 wrote to memory of 1180 4268 un688065.exe qu5215.exe PID 4268 wrote to memory of 1180 4268 un688065.exe qu5215.exe PID 4268 wrote to memory of 1180 4268 un688065.exe qu5215.exe PID 1128 wrote to memory of 2256 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe si501228.exe PID 1128 wrote to memory of 2256 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe si501228.exe PID 1128 wrote to memory of 2256 1128 6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe si501228.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe"C:\Users\Admin\AppData\Local\Temp\6b4ad7650c184eb17dad6aa362b726cc1a6b8ce1fe1da05e6ae67915587b20a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un688065.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un688065.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9070.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10284⤵
- Program crash
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5215.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5215.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 13404⤵
- Program crash
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501228.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501228.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2660 -ip 26601⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1180 -ip 11801⤵PID:944
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bd02a371a5961ca2127de166d25bf7ab
SHA1496dab0660d1ac8f61f73e707f9c815a65d4f2cf
SHA2568585dfc9dd7828f63063ad1aa548c576aff86acff19072a5827b2819dc79e3b0
SHA5123e343daa81a3db0e1413ec43fc183d4b05c4152d0d82489d0fec7209d46769626781b42c90a60bdf3f6c6af017960d47bafb648fe818c55f1983f936cf3b6888
-
Filesize
175KB
MD5bd02a371a5961ca2127de166d25bf7ab
SHA1496dab0660d1ac8f61f73e707f9c815a65d4f2cf
SHA2568585dfc9dd7828f63063ad1aa548c576aff86acff19072a5827b2819dc79e3b0
SHA5123e343daa81a3db0e1413ec43fc183d4b05c4152d0d82489d0fec7209d46769626781b42c90a60bdf3f6c6af017960d47bafb648fe818c55f1983f936cf3b6888
-
Filesize
547KB
MD5ebf74a212a17c366304c703ef4e1d54f
SHA1b2baf0ed52f23ae00c8924e0644c73e1ef0fa20f
SHA2569eccfeadb48f524c4ebe931e764205a246224b124eb9ec4dfb79d9e36d9b20e7
SHA512f4f08dd44d9b11751581437ca546262f13ccce1328b7f969c3eabd844bc8352db6d15475291d0e98de20bcf3f94fb003ed3214764c77af8f2a24bc0e79b56405
-
Filesize
547KB
MD5ebf74a212a17c366304c703ef4e1d54f
SHA1b2baf0ed52f23ae00c8924e0644c73e1ef0fa20f
SHA2569eccfeadb48f524c4ebe931e764205a246224b124eb9ec4dfb79d9e36d9b20e7
SHA512f4f08dd44d9b11751581437ca546262f13ccce1328b7f969c3eabd844bc8352db6d15475291d0e98de20bcf3f94fb003ed3214764c77af8f2a24bc0e79b56405
-
Filesize
291KB
MD55f81d124bf8ae24983912ab3b9b32fd8
SHA1dbb7ae856cc24dafc74b457801c45c7227d895e4
SHA256a1c50911f0d8729a9128c0794ba801090fe915c5f09cedbab5675cca35e8e9fa
SHA512bf030e4c39c0dd5f6cb959b7114a370ab2eb2a2803593490d397ecaab317354a9cec318ed55a056c398fe2a2c8e6a55cadf06792f67f6cd4f5849ee44dfa4e6c
-
Filesize
291KB
MD55f81d124bf8ae24983912ab3b9b32fd8
SHA1dbb7ae856cc24dafc74b457801c45c7227d895e4
SHA256a1c50911f0d8729a9128c0794ba801090fe915c5f09cedbab5675cca35e8e9fa
SHA512bf030e4c39c0dd5f6cb959b7114a370ab2eb2a2803593490d397ecaab317354a9cec318ed55a056c398fe2a2c8e6a55cadf06792f67f6cd4f5849ee44dfa4e6c
-
Filesize
345KB
MD569839ff71a3156a1494c1e93315035cc
SHA1cc70f99c0631b74f5fd8a28bd7c4e42eec2fc841
SHA256476f47dcc0135c5209e5a648a03a6d4a1d5107b51b55e87dc498b5c69d55e608
SHA512c3e6dd6ad02674f5e8b5ab053910d1653af40c1dbc7d7acfc229d82afe23f8dc65e6312c87914b913b8d8a035bce31914178b7c4a8a9361a13e24e0f00a577f7
-
Filesize
345KB
MD569839ff71a3156a1494c1e93315035cc
SHA1cc70f99c0631b74f5fd8a28bd7c4e42eec2fc841
SHA256476f47dcc0135c5209e5a648a03a6d4a1d5107b51b55e87dc498b5c69d55e608
SHA512c3e6dd6ad02674f5e8b5ab053910d1653af40c1dbc7d7acfc229d82afe23f8dc65e6312c87914b913b8d8a035bce31914178b7c4a8a9361a13e24e0f00a577f7