Analysis
-
max time kernel
99s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe
Resource
win10v2004-20230221-en
General
-
Target
e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe
-
Size
688KB
-
MD5
fa6d16d00f96ab70dd3536d7ae190494
-
SHA1
e2a0ccc89b3e4db7e540b0ce52bd621c665dece9
-
SHA256
e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f
-
SHA512
a1dff961698b6315cd5e005065746bd8ab80dd7153e13e993ea1f63a68066f0ed0ecf42c097f4934ee7bfde058a547ffdcb6f088cc74760be129aaa3cac6023c
-
SSDEEP
12288:CMrPy90oWrGEqO1GDfwvyy65hLuHuxXYnAPSsZiumJMvaFhefigDmvcAtz:5y/Wy/BfwKhfaOaNumJMmheagivcAtz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1310.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1310.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2844-190-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-191-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-193-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-195-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-197-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-199-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-201-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-203-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-205-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-207-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-209-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-211-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-213-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-215-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-217-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-219-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-221-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline behavioral1/memory/2844-223-0x00000000065B0000-0x00000000065EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un180696.exepro1310.exequ3432.exesi504473.exepid process 1124 un180696.exe 1324 pro1310.exe 2844 qu3432.exe 2184 si504473.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1310.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1310.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un180696.exee99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un180696.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un180696.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5064 1324 WerFault.exe pro1310.exe 3856 2844 WerFault.exe qu3432.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1310.exequ3432.exesi504473.exepid process 1324 pro1310.exe 1324 pro1310.exe 2844 qu3432.exe 2844 qu3432.exe 2184 si504473.exe 2184 si504473.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1310.exequ3432.exesi504473.exedescription pid process Token: SeDebugPrivilege 1324 pro1310.exe Token: SeDebugPrivilege 2844 qu3432.exe Token: SeDebugPrivilege 2184 si504473.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exeun180696.exedescription pid process target process PID 3492 wrote to memory of 1124 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe un180696.exe PID 3492 wrote to memory of 1124 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe un180696.exe PID 3492 wrote to memory of 1124 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe un180696.exe PID 1124 wrote to memory of 1324 1124 un180696.exe pro1310.exe PID 1124 wrote to memory of 1324 1124 un180696.exe pro1310.exe PID 1124 wrote to memory of 1324 1124 un180696.exe pro1310.exe PID 1124 wrote to memory of 2844 1124 un180696.exe qu3432.exe PID 1124 wrote to memory of 2844 1124 un180696.exe qu3432.exe PID 1124 wrote to memory of 2844 1124 un180696.exe qu3432.exe PID 3492 wrote to memory of 2184 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe si504473.exe PID 3492 wrote to memory of 2184 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe si504473.exe PID 3492 wrote to memory of 2184 3492 e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe si504473.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe"C:\Users\Admin\AppData\Local\Temp\e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 10804⤵
- Program crash
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 13284⤵
- Program crash
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1324 -ip 13241⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2844 -ip 28441⤵PID:3152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59940e4ea89ea2f89c015cdad5e4e69d3
SHA1d29a4418d49048456baec0c4971ccdbfcd457367
SHA25644fddcc7d56a7ae7e6c79db897f95cb4b7146eaf1c214bda73f567f77c64196b
SHA512ffd74c9c751f1e344a3c83504d4a541ebc68cba60174a57fcd80dfc47e1b8252fd6b188ceb99a6ec87fa8ce398e2bf0ac0433043941e396f16e26907c250818c
-
Filesize
175KB
MD59940e4ea89ea2f89c015cdad5e4e69d3
SHA1d29a4418d49048456baec0c4971ccdbfcd457367
SHA25644fddcc7d56a7ae7e6c79db897f95cb4b7146eaf1c214bda73f567f77c64196b
SHA512ffd74c9c751f1e344a3c83504d4a541ebc68cba60174a57fcd80dfc47e1b8252fd6b188ceb99a6ec87fa8ce398e2bf0ac0433043941e396f16e26907c250818c
-
Filesize
547KB
MD5f7b394b1f661d24e76de13a61869b6db
SHA11b99866fee67ce31ec06c3c411b8d5d6166f9927
SHA25663b02df92dc055191be3d541befc842d62c3ee23af78f0cbad5b2f1591736679
SHA512db30e17d6b4d6e6d69dfe19ca9c8c066a12b51493db3381825e0953470bdd655b4e86b94ff86690c8f023734e7e05e61065bee128d8d27f16b2b523b3e790b8b
-
Filesize
547KB
MD5f7b394b1f661d24e76de13a61869b6db
SHA11b99866fee67ce31ec06c3c411b8d5d6166f9927
SHA25663b02df92dc055191be3d541befc842d62c3ee23af78f0cbad5b2f1591736679
SHA512db30e17d6b4d6e6d69dfe19ca9c8c066a12b51493db3381825e0953470bdd655b4e86b94ff86690c8f023734e7e05e61065bee128d8d27f16b2b523b3e790b8b
-
Filesize
291KB
MD5e74d8c0ace5bbd8c1085afd8f90a5e81
SHA1c8c046f1991b88f81ec30f297896a2c35c6f6133
SHA2560ccbcfbecf8945fe7b2e16df0377bcb2f6f2175c714e18bc91fda8d4e49d6125
SHA5120c67afd19a6e94807341bca6fb162606d3c7f185ef1e2b0373b332489dad83c7157660a0287b3d4dd2582f0b5ab2145140eb68c26bdc8064257ff33e052eec33
-
Filesize
291KB
MD5e74d8c0ace5bbd8c1085afd8f90a5e81
SHA1c8c046f1991b88f81ec30f297896a2c35c6f6133
SHA2560ccbcfbecf8945fe7b2e16df0377bcb2f6f2175c714e18bc91fda8d4e49d6125
SHA5120c67afd19a6e94807341bca6fb162606d3c7f185ef1e2b0373b332489dad83c7157660a0287b3d4dd2582f0b5ab2145140eb68c26bdc8064257ff33e052eec33
-
Filesize
345KB
MD501ed183c2cec101b59231955bb810157
SHA1b84b3e23afa0e2049c98d100e4b81d17c10f9ab7
SHA256f7f308c1467a1be70d6a04a0804ba7adf638f9e5f06cdd8fafc335c4b25d4704
SHA5121512334566ef5b931ddbacfbc968322c105fb53d339f9d1bb9de8d94964ac89906ce11774fe39d96f082bd22f8315160019006500bc309d217205ab4e93c76fe
-
Filesize
345KB
MD501ed183c2cec101b59231955bb810157
SHA1b84b3e23afa0e2049c98d100e4b81d17c10f9ab7
SHA256f7f308c1467a1be70d6a04a0804ba7adf638f9e5f06cdd8fafc335c4b25d4704
SHA5121512334566ef5b931ddbacfbc968322c105fb53d339f9d1bb9de8d94964ac89906ce11774fe39d96f082bd22f8315160019006500bc309d217205ab4e93c76fe