Analysis
-
max time kernel
108s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:36
Static task
static1
Behavioral task
behavioral1
Sample
0fbe9f6d5082594112e49b1bcb336d1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0fbe9f6d5082594112e49b1bcb336d1c.exe
Resource
win10v2004-20230220-en
General
-
Target
0fbe9f6d5082594112e49b1bcb336d1c.exe
-
Size
689KB
-
MD5
0fbe9f6d5082594112e49b1bcb336d1c
-
SHA1
cf85b27cf92a0b5ac20c68eaf8f3c22ffbcf50a2
-
SHA256
f7adad79623135943b39e437b5931814e60ddf828f69062c53d6dec7c791501a
-
SHA512
6f785b509621a55b8e47e5ce1937552b32edb0d2ed73407a856a495d9b3764e0376de32ed531dc2574265bc95c0220408ff94f4a91df2df9cefa330b817bbe33
-
SSDEEP
12288:XMr1y90bb7fYBpT1tXp4y+65hLuaHyMSKE3qnFdGIv+6WvmFdVfig8g/9XlPx:GyYqT7XDlfaaHyLt3qG6WidVag8g/9XT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-191-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-192-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-194-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-196-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-198-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-200-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-202-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-204-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-206-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-208-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-210-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-212-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-214-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-216-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-218-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-220-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-222-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-224-0x0000000003B80000-0x0000000003BBF000-memory.dmp family_redline behavioral2/memory/2836-285-0x0000000006100000-0x0000000006110000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un550535.exepro7186.exequ2640.exesi554333.exepid process 1828 un550535.exe 2256 pro7186.exe 2836 qu2640.exe 2252 si554333.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7186.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0fbe9f6d5082594112e49b1bcb336d1c.exeun550535.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0fbe9f6d5082594112e49b1bcb336d1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0fbe9f6d5082594112e49b1bcb336d1c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un550535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un550535.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2224 2256 WerFault.exe pro7186.exe 4728 2836 WerFault.exe qu2640.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7186.exequ2640.exesi554333.exepid process 2256 pro7186.exe 2256 pro7186.exe 2836 qu2640.exe 2836 qu2640.exe 2252 si554333.exe 2252 si554333.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7186.exequ2640.exesi554333.exedescription pid process Token: SeDebugPrivilege 2256 pro7186.exe Token: SeDebugPrivilege 2836 qu2640.exe Token: SeDebugPrivilege 2252 si554333.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0fbe9f6d5082594112e49b1bcb336d1c.exeun550535.exedescription pid process target process PID 4132 wrote to memory of 1828 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe un550535.exe PID 4132 wrote to memory of 1828 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe un550535.exe PID 4132 wrote to memory of 1828 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe un550535.exe PID 1828 wrote to memory of 2256 1828 un550535.exe pro7186.exe PID 1828 wrote to memory of 2256 1828 un550535.exe pro7186.exe PID 1828 wrote to memory of 2256 1828 un550535.exe pro7186.exe PID 1828 wrote to memory of 2836 1828 un550535.exe qu2640.exe PID 1828 wrote to memory of 2836 1828 un550535.exe qu2640.exe PID 1828 wrote to memory of 2836 1828 un550535.exe qu2640.exe PID 4132 wrote to memory of 2252 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe si554333.exe PID 4132 wrote to memory of 2252 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe si554333.exe PID 4132 wrote to memory of 2252 4132 0fbe9f6d5082594112e49b1bcb336d1c.exe si554333.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fbe9f6d5082594112e49b1bcb336d1c.exe"C:\Users\Admin\AppData\Local\Temp\0fbe9f6d5082594112e49b1bcb336d1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550535.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 10964⤵
- Program crash
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2640.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2640.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 13284⤵
- Program crash
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si554333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si554333.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2256 -ip 22561⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2836 -ip 28361⤵PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a4e03103246970d134c9f9d2cd8a5990
SHA110e26a07fe248964ca8073bd03b66f000accf117
SHA2563615f0f55db5fe1c0f2a5bfc2898d50aebe994f570daab09ce3c1b665f6d8bf3
SHA512c882012171e5b6092775e0d78cfeddc4a5c9cf2144cff0696ce0eebb6614d0d13cf4580b950bce94d57641a80af1e3bb44958f91bf813cd706e1bbdbea98c8a8
-
Filesize
175KB
MD5a4e03103246970d134c9f9d2cd8a5990
SHA110e26a07fe248964ca8073bd03b66f000accf117
SHA2563615f0f55db5fe1c0f2a5bfc2898d50aebe994f570daab09ce3c1b665f6d8bf3
SHA512c882012171e5b6092775e0d78cfeddc4a5c9cf2144cff0696ce0eebb6614d0d13cf4580b950bce94d57641a80af1e3bb44958f91bf813cd706e1bbdbea98c8a8
-
Filesize
547KB
MD5823291bf59deba9e45fe4391dbffeb5e
SHA1c5669e81f1138853b5d59dd285336515dce89f33
SHA256faeedf95afbb03306ffc30fdd619cfbab1ce4f437e5d4fde4aba01cd3853458d
SHA5122e02c252d110355bf6610b820d9179f41004cd14733b600cd03173232e43ff79007c86796c1a91e8de4c2cdb0c7ff8752a147f52f9d6127357d5b68b598348b5
-
Filesize
547KB
MD5823291bf59deba9e45fe4391dbffeb5e
SHA1c5669e81f1138853b5d59dd285336515dce89f33
SHA256faeedf95afbb03306ffc30fdd619cfbab1ce4f437e5d4fde4aba01cd3853458d
SHA5122e02c252d110355bf6610b820d9179f41004cd14733b600cd03173232e43ff79007c86796c1a91e8de4c2cdb0c7ff8752a147f52f9d6127357d5b68b598348b5
-
Filesize
291KB
MD5e40a7a9b147f16fdab233d94986a13bf
SHA1287bea0cca72120e58f470746ef2ced2ead51550
SHA25672586efd148dfb236c8c5b88bbafcbf97494361a604c652da88e340247b2789f
SHA5127480bc33aa6e5ed5bd5ed277add482b55a99baacb87ab9516435a700e49aabba841fe45e24a3db2f20f6f3b4c2403472831d3f5c5903aed27afe0c882de6f740
-
Filesize
291KB
MD5e40a7a9b147f16fdab233d94986a13bf
SHA1287bea0cca72120e58f470746ef2ced2ead51550
SHA25672586efd148dfb236c8c5b88bbafcbf97494361a604c652da88e340247b2789f
SHA5127480bc33aa6e5ed5bd5ed277add482b55a99baacb87ab9516435a700e49aabba841fe45e24a3db2f20f6f3b4c2403472831d3f5c5903aed27afe0c882de6f740
-
Filesize
345KB
MD5ae50deb676feba1cd9a6fcb516ecb5ba
SHA14a6c03af361f8405c937ab39a7696d6bd8800998
SHA256dfaa5b15dda10bf7faf859886b86010a0cde431c4bacee63fa6a2ce4143ee6a9
SHA512f11d4e2410a1638e4c79a6c6e932da0f1c94e7d12b6d0f4f47d6f63905af2d948e9f2eacdc0daaecb77031789b2191f7c3459c8f7ac81fd6b417a4677c34f0c1
-
Filesize
345KB
MD5ae50deb676feba1cd9a6fcb516ecb5ba
SHA14a6c03af361f8405c937ab39a7696d6bd8800998
SHA256dfaa5b15dda10bf7faf859886b86010a0cde431c4bacee63fa6a2ce4143ee6a9
SHA512f11d4e2410a1638e4c79a6c6e932da0f1c94e7d12b6d0f4f47d6f63905af2d948e9f2eacdc0daaecb77031789b2191f7c3459c8f7ac81fd6b417a4677c34f0c1