Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:36
Static task
static1
Behavioral task
behavioral1
Sample
7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe
Resource
win10v2004-20230220-en
General
-
Target
7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe
-
Size
689KB
-
MD5
e4161a8b20a823e8d96927c8a334f769
-
SHA1
c089ea0b91a0da737db761443b773bb224b8827d
-
SHA256
7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a
-
SHA512
348ef2ceb0805c8338a8a44bc52a21163b63950e6287f8dfb13845c48c46ff98532ce9ecb5be07758ae0a951ace9db25bead9e68d09ca9dc51a6ce8549d33b4b
-
SSDEEP
12288:eMrGy90Z2qc6we77px7WJ+eplgiFVjESQIBmJivTFqTfigjVu5y1W/:UyKe6RjS+epVRrBmJiJqTagjyqM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0863.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0863.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0863.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4352-191-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-192-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-194-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-196-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-198-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-200-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-202-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-204-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-206-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-210-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-214-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-218-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-220-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-216-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-222-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-224-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-226-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4352-228-0x0000000006010000-0x000000000604F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un444042.exepro0863.exequ8813.exesi763267.exepid process 4016 un444042.exe 2940 pro0863.exe 4352 qu8813.exe 2796 si763267.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0863.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0863.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exeun444042.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un444042.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un444042.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 428 2940 WerFault.exe pro0863.exe 4116 4352 WerFault.exe qu8813.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0863.exequ8813.exesi763267.exepid process 2940 pro0863.exe 2940 pro0863.exe 4352 qu8813.exe 4352 qu8813.exe 2796 si763267.exe 2796 si763267.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0863.exequ8813.exesi763267.exedescription pid process Token: SeDebugPrivilege 2940 pro0863.exe Token: SeDebugPrivilege 4352 qu8813.exe Token: SeDebugPrivilege 2796 si763267.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exeun444042.exedescription pid process target process PID 980 wrote to memory of 4016 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe un444042.exe PID 980 wrote to memory of 4016 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe un444042.exe PID 980 wrote to memory of 4016 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe un444042.exe PID 4016 wrote to memory of 2940 4016 un444042.exe pro0863.exe PID 4016 wrote to memory of 2940 4016 un444042.exe pro0863.exe PID 4016 wrote to memory of 2940 4016 un444042.exe pro0863.exe PID 4016 wrote to memory of 4352 4016 un444042.exe qu8813.exe PID 4016 wrote to memory of 4352 4016 un444042.exe qu8813.exe PID 4016 wrote to memory of 4352 4016 un444042.exe qu8813.exe PID 980 wrote to memory of 2796 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe si763267.exe PID 980 wrote to memory of 2796 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe si763267.exe PID 980 wrote to memory of 2796 980 7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe si763267.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe"C:\Users\Admin\AppData\Local\Temp\7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 10804⤵
- Program crash
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 20444⤵
- Program crash
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2940 -ip 29401⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4352 -ip 43521⤵PID:1908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58303990f09fa409a189b43674cbfeee9
SHA123db7481a4b652646852ef2a6caaee0629f3ca27
SHA2563b310aec6272f0ba5fb1d02899240d5b88be63e301cb25a286378894069ecd44
SHA51247941bf4692ab7679dd29548e1e5fd6165f1feba9f277c838ad9cff0d069094b329755f87d8b12b18a390e5ef2f998de70b56410a92d6f2348c50a4148702171
-
Filesize
175KB
MD58303990f09fa409a189b43674cbfeee9
SHA123db7481a4b652646852ef2a6caaee0629f3ca27
SHA2563b310aec6272f0ba5fb1d02899240d5b88be63e301cb25a286378894069ecd44
SHA51247941bf4692ab7679dd29548e1e5fd6165f1feba9f277c838ad9cff0d069094b329755f87d8b12b18a390e5ef2f998de70b56410a92d6f2348c50a4148702171
-
Filesize
547KB
MD5887d40d8bf74bd0c9c0a60ba75219d1d
SHA19c40cc167794fe5781510ecbf02d0aa9ce388d6f
SHA2568140cd3069c81d89d0f59e9d1091950a1299b3b96ab494b691f0ad6c5358437d
SHA51252ddc91857e074753178ce7f721479ec605cba6e3f95c8a3a0a7e7cd388b19d23b4daff60249d42905905245b5ce996956d3d6e39b0d839c2564c8ab98636199
-
Filesize
547KB
MD5887d40d8bf74bd0c9c0a60ba75219d1d
SHA19c40cc167794fe5781510ecbf02d0aa9ce388d6f
SHA2568140cd3069c81d89d0f59e9d1091950a1299b3b96ab494b691f0ad6c5358437d
SHA51252ddc91857e074753178ce7f721479ec605cba6e3f95c8a3a0a7e7cd388b19d23b4daff60249d42905905245b5ce996956d3d6e39b0d839c2564c8ab98636199
-
Filesize
291KB
MD5ea55399bdb8825f8bb9449f28d56ca3f
SHA15d23593eed0d7eb55755d4d53374767ac0044cc4
SHA25637f371cbe8f5b52cc62765390268921c4b76f92406b7115a6e50e5ec346b7444
SHA512e47709d0ea3d6d73756ac26ef440ea01d0c2659225533987ea357f76f3374cdf281378bca68087f69c1eebc3235f2d68c0563d87904a0c11cfada7f5e0197c67
-
Filesize
291KB
MD5ea55399bdb8825f8bb9449f28d56ca3f
SHA15d23593eed0d7eb55755d4d53374767ac0044cc4
SHA25637f371cbe8f5b52cc62765390268921c4b76f92406b7115a6e50e5ec346b7444
SHA512e47709d0ea3d6d73756ac26ef440ea01d0c2659225533987ea357f76f3374cdf281378bca68087f69c1eebc3235f2d68c0563d87904a0c11cfada7f5e0197c67
-
Filesize
345KB
MD54fb0bdeef221af27c54bc9b2fd75330d
SHA124dec0e00f42963986eee5afbf344684cd9a4562
SHA256bbe9b10595c604f19f10030642fe1e49eeec626b99fcd9036ca9ff58828004fa
SHA51228c0277a1cbea9968fd173562d5326133c76b8d747748ad770366a8765531fb310cd3acc94a92b82b4a17bbfdc0c2e34d37df9b414ba45988e57ab3f89612fbe
-
Filesize
345KB
MD54fb0bdeef221af27c54bc9b2fd75330d
SHA124dec0e00f42963986eee5afbf344684cd9a4562
SHA256bbe9b10595c604f19f10030642fe1e49eeec626b99fcd9036ca9ff58828004fa
SHA51228c0277a1cbea9968fd173562d5326133c76b8d747748ad770366a8765531fb310cd3acc94a92b82b4a17bbfdc0c2e34d37df9b414ba45988e57ab3f89612fbe