Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:46
Static task
static1
Behavioral task
behavioral1
Sample
ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe
Resource
win10v2004-20230221-en
General
-
Target
ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe
-
Size
689KB
-
MD5
2f5c28d6f1a67d6c4776291c227a08d2
-
SHA1
10dd45578d5ffb65fb81b6fcce12bc0f0b721456
-
SHA256
ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e
-
SHA512
f2549059e7c89f32279c6659fce3ba0ba8662db44e830cce147b574cfe3c8b10a3f61c849eded3e0e12367df96b299ff3b64edade742d2696d39efb285dedb9d
-
SSDEEP
12288:LMrvy90lPBOwzw12my665hLuLYUJEK3luSBPSmJ4vNFRBfig9lL+J7QGx:UyKcwzw12zJfaLJEK1uo6mJ4vRBag9cD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7896.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7896.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7896.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2228-190-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-191-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-193-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-196-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-200-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-203-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-199-0x0000000006060000-0x0000000006070000-memory.dmp family_redline behavioral1/memory/2228-205-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-207-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-209-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-211-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-213-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-215-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-217-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-219-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-221-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-223-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-225-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/2228-227-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un320991.exepro7896.exequ3511.exesi308919.exepid process 2624 un320991.exe 4324 pro7896.exe 2228 qu3511.exe 5028 si308919.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7896.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7896.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exeun320991.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un320991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un320991.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2728 4324 WerFault.exe pro7896.exe 4056 2228 WerFault.exe qu3511.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7896.exequ3511.exesi308919.exepid process 4324 pro7896.exe 4324 pro7896.exe 2228 qu3511.exe 2228 qu3511.exe 5028 si308919.exe 5028 si308919.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7896.exequ3511.exesi308919.exedescription pid process Token: SeDebugPrivilege 4324 pro7896.exe Token: SeDebugPrivilege 2228 qu3511.exe Token: SeDebugPrivilege 5028 si308919.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exeun320991.exedescription pid process target process PID 4488 wrote to memory of 2624 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe un320991.exe PID 4488 wrote to memory of 2624 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe un320991.exe PID 4488 wrote to memory of 2624 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe un320991.exe PID 2624 wrote to memory of 4324 2624 un320991.exe pro7896.exe PID 2624 wrote to memory of 4324 2624 un320991.exe pro7896.exe PID 2624 wrote to memory of 4324 2624 un320991.exe pro7896.exe PID 2624 wrote to memory of 2228 2624 un320991.exe qu3511.exe PID 2624 wrote to memory of 2228 2624 un320991.exe qu3511.exe PID 2624 wrote to memory of 2228 2624 un320991.exe qu3511.exe PID 4488 wrote to memory of 5028 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe si308919.exe PID 4488 wrote to memory of 5028 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe si308919.exe PID 4488 wrote to memory of 5028 4488 ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe si308919.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe"C:\Users\Admin\AppData\Local\Temp\ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10804⤵
- Program crash
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 13564⤵
- Program crash
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4324 -ip 43241⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2228 -ip 22281⤵PID:4480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c1634d2c3231bf220b4f790b47909b7f
SHA18cd724bce619e21d544dd60b3d2c5f50299dd1d7
SHA256571d2e0daf7e4eb57f5ab58e52eac84aa933bdcb1156f6a20b1a7664ca0a5e5e
SHA5121f1bbd55a49dc254917d089567eb7ce53ebd4d89b85f34759ee57c6e4dd942f1435f01d473d4abeda3acc94eb32696c44e6b3d857c6386b2a387e80959e888d6
-
Filesize
175KB
MD5c1634d2c3231bf220b4f790b47909b7f
SHA18cd724bce619e21d544dd60b3d2c5f50299dd1d7
SHA256571d2e0daf7e4eb57f5ab58e52eac84aa933bdcb1156f6a20b1a7664ca0a5e5e
SHA5121f1bbd55a49dc254917d089567eb7ce53ebd4d89b85f34759ee57c6e4dd942f1435f01d473d4abeda3acc94eb32696c44e6b3d857c6386b2a387e80959e888d6
-
Filesize
547KB
MD5aeb16aedb02a6f748f5176059bd2ac3c
SHA1b7a77ee3c992b0fb1db6e7c31e333c74d899a544
SHA2562473c8c4a3d5943ff2561a6bdee46a3ce07e503a1f4dc8d396064cf83f822511
SHA512dbd60c7dede703156a8c84fc8aff04530d2990e7e895c8f867b2abf41c0f03fe0e26fd4894d8589597c7470ed45eecda8402442e704043359f7d7fcbf0dfe766
-
Filesize
547KB
MD5aeb16aedb02a6f748f5176059bd2ac3c
SHA1b7a77ee3c992b0fb1db6e7c31e333c74d899a544
SHA2562473c8c4a3d5943ff2561a6bdee46a3ce07e503a1f4dc8d396064cf83f822511
SHA512dbd60c7dede703156a8c84fc8aff04530d2990e7e895c8f867b2abf41c0f03fe0e26fd4894d8589597c7470ed45eecda8402442e704043359f7d7fcbf0dfe766
-
Filesize
291KB
MD5aa69471d64edc771aa1e8ace9ff72307
SHA14d76e0e1b4a3f1b511439fb384bf22b71d7d5d88
SHA256f0bdd05b38f6389790e78593b5c22c2d630b4df134c2674628d8adab687a9042
SHA51206013b7f8d6dec1a3c0479237ec5e12c34ed202ebcd19887c225064e06387428b6f45ebd14a2afb9d343155bf8524f90b89627d5eddd27225f21173a53573f8f
-
Filesize
291KB
MD5aa69471d64edc771aa1e8ace9ff72307
SHA14d76e0e1b4a3f1b511439fb384bf22b71d7d5d88
SHA256f0bdd05b38f6389790e78593b5c22c2d630b4df134c2674628d8adab687a9042
SHA51206013b7f8d6dec1a3c0479237ec5e12c34ed202ebcd19887c225064e06387428b6f45ebd14a2afb9d343155bf8524f90b89627d5eddd27225f21173a53573f8f
-
Filesize
345KB
MD53d31e13d32f3890df584c2dc0412b7de
SHA1106181e0cc5552608a0b7292eb8a74faff0be04c
SHA256038bd8e3bc86ad915a34fbd2667d73746c1bd6f055a470646c6d553f269b59d9
SHA512f4a80c03323d06605b5cf2584d04875b0b316dac78f74026a8306b09e3f5db44166259691a636d3c54dc478340783adad7e267ab861164aaae311b6b03e75234
-
Filesize
345KB
MD53d31e13d32f3890df584c2dc0412b7de
SHA1106181e0cc5552608a0b7292eb8a74faff0be04c
SHA256038bd8e3bc86ad915a34fbd2667d73746c1bd6f055a470646c6d553f269b59d9
SHA512f4a80c03323d06605b5cf2584d04875b0b316dac78f74026a8306b09e3f5db44166259691a636d3c54dc478340783adad7e267ab861164aaae311b6b03e75234