Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:53
Static task
static1
Behavioral task
behavioral1
Sample
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe
Resource
win10v2004-20230220-en
General
-
Target
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe
-
Size
689KB
-
MD5
7b2da37d630c7e072bcacd89e6d38c63
-
SHA1
618f6972240ed84e788d309bcd9173ee9485f645
-
SHA256
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a
-
SHA512
2442cceef0810cab9c0c8904789169634ff5124a059a52d4d40c05494c9849f24727b6367427531dbfa805ecd7f137a38767e58a4887476f2bd37f72088f7e73
-
SSDEEP
12288:wMrgy90xH6DYmgiDqjie+y765hLudX0MSKI3VLuVZsK6L+uCv1FprfigQV0go18K:AyTi77mfad0LZ3VLu7sDL7C3pragBOVs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7813.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4792-191-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-190-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-193-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-195-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-197-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-199-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-201-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-203-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-205-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-207-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-209-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-211-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-213-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-215-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-217-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-219-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-221-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-223-0x00000000038E0000-0x000000000391F000-memory.dmp family_redline behavioral1/memory/4792-1111-0x0000000003600000-0x0000000003610000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4192 un067402.exe 2204 pro7813.exe 4792 qu6853.exe 4740 si004560.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7813.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un067402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un067402.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4392 2204 WerFault.exe 85 2204 4792 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2204 pro7813.exe 2204 pro7813.exe 4792 qu6853.exe 4792 qu6853.exe 4740 si004560.exe 4740 si004560.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2204 pro7813.exe Token: SeDebugPrivilege 4792 qu6853.exe Token: SeDebugPrivilege 4740 si004560.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4192 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 84 PID 4592 wrote to memory of 4192 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 84 PID 4592 wrote to memory of 4192 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 84 PID 4192 wrote to memory of 2204 4192 un067402.exe 85 PID 4192 wrote to memory of 2204 4192 un067402.exe 85 PID 4192 wrote to memory of 2204 4192 un067402.exe 85 PID 4192 wrote to memory of 4792 4192 un067402.exe 94 PID 4192 wrote to memory of 4792 4192 un067402.exe 94 PID 4192 wrote to memory of 4792 4192 un067402.exe 94 PID 4592 wrote to memory of 4740 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 99 PID 4592 wrote to memory of 4740 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 99 PID 4592 wrote to memory of 4740 4592 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe"C:\Users\Admin\AppData\Local\Temp\298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067402.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7813.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10804⤵
- Program crash
PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6853.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 13364⤵
- Program crash
PID:2204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004560.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004560.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2204 -ip 22041⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4792 -ip 47921⤵PID:2240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ad6b06a35e88c833f6eddbca8b390c7d
SHA1bc6f8494a2e4d69ed7dc497a6ee0900fa08e3e8d
SHA256f0608cdd737728a074eacaf98afb8e5626968c4f0321abd6a4c51cc4db374c43
SHA51247e7196f0aae376276a9dbb97f4cf9202241218d1d1f2907fb6f5cb5a72b85cf631a81d663ffb15300ada769fa090eae593d060cf4060f8ce453890214a8f920
-
Filesize
175KB
MD5ad6b06a35e88c833f6eddbca8b390c7d
SHA1bc6f8494a2e4d69ed7dc497a6ee0900fa08e3e8d
SHA256f0608cdd737728a074eacaf98afb8e5626968c4f0321abd6a4c51cc4db374c43
SHA51247e7196f0aae376276a9dbb97f4cf9202241218d1d1f2907fb6f5cb5a72b85cf631a81d663ffb15300ada769fa090eae593d060cf4060f8ce453890214a8f920
-
Filesize
547KB
MD5915df67d4a72b0dd614dadf3a5d46507
SHA16d7bb85fbf8d3b41409bb84ae4901b2cd393735a
SHA2563fda9d6d396ac78c21f3434e22309c27e1dcb587bf59f2d5330f54a753d01a5c
SHA512371065f665aa6f1f327157e0dbd05ec89748ea43ad9a15c9ac6051a6377edeef3a86c5580fa02b28810da9620e5f672b1a3634b8289211970093246d9040b7c0
-
Filesize
547KB
MD5915df67d4a72b0dd614dadf3a5d46507
SHA16d7bb85fbf8d3b41409bb84ae4901b2cd393735a
SHA2563fda9d6d396ac78c21f3434e22309c27e1dcb587bf59f2d5330f54a753d01a5c
SHA512371065f665aa6f1f327157e0dbd05ec89748ea43ad9a15c9ac6051a6377edeef3a86c5580fa02b28810da9620e5f672b1a3634b8289211970093246d9040b7c0
-
Filesize
291KB
MD5f571028467614fa9e2ebe5646b6b06e9
SHA100110f71ce17d96e1cd7b48347798aa91f496545
SHA2562c2efbe725dd7ceaf634cda4d0fee97b0de8ab43ffb4494b72571947409a64c0
SHA512d7419fe9f0db97b5c5ae1242159119c760a8a6dfcbf5719589a81fb11d201827cacd8873d0c6671675f2e8c949776135c90206ebcc17bd87b0035cb8f673af68
-
Filesize
291KB
MD5f571028467614fa9e2ebe5646b6b06e9
SHA100110f71ce17d96e1cd7b48347798aa91f496545
SHA2562c2efbe725dd7ceaf634cda4d0fee97b0de8ab43ffb4494b72571947409a64c0
SHA512d7419fe9f0db97b5c5ae1242159119c760a8a6dfcbf5719589a81fb11d201827cacd8873d0c6671675f2e8c949776135c90206ebcc17bd87b0035cb8f673af68
-
Filesize
345KB
MD578f4306add6aeb63a8aca3d2ee76440a
SHA1fc11d656f5fd9cedfca4e61055bb707fca94f0ea
SHA256c69075cd66fa5f58ea0d91bd021a88c4b84472450c153c3e0018c543cf4fd874
SHA5125b4107ad73c72c6333b5977b683a6ae8abaf22e7c6c65e418f3e8fd81a64b46b8506263ffc67904fd399390630a373d6f1c92ce47366f9bd91312c225c3011d1
-
Filesize
345KB
MD578f4306add6aeb63a8aca3d2ee76440a
SHA1fc11d656f5fd9cedfca4e61055bb707fca94f0ea
SHA256c69075cd66fa5f58ea0d91bd021a88c4b84472450c153c3e0018c543cf4fd874
SHA5125b4107ad73c72c6333b5977b683a6ae8abaf22e7c6c65e418f3e8fd81a64b46b8506263ffc67904fd399390630a373d6f1c92ce47366f9bd91312c225c3011d1