Analysis
-
max time kernel
87s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe
Resource
win10v2004-20230220-en
General
-
Target
3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe
-
Size
690KB
-
MD5
b0a1b4f540d26f159d691372b5edfd64
-
SHA1
dd360038c06eb7ef7b430bc7d137c84fb9b1ec5e
-
SHA256
3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014
-
SHA512
9bd7806ac859a69719e0321d7426518448d738ce94ad1d8b5ee3a42477ffb0ef112f5227d44a67b62f688860a8ed0caec9543ef6573222034d62f071a64316a5
-
SSDEEP
12288:WMrwy905JYppfbDBrcDI9kPtOyo65hLuUCABpMSKx3eAeyFoiOqg2ivVFShfigdF:ayQJYn3BrcDRpHfaUtpLw3eSFoiOWinw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5841.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4840-191-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-192-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-194-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-196-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-198-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-200-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-202-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-204-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-206-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-208-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-210-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-214-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-212-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-216-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-218-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-220-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-222-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline behavioral1/memory/4840-224-0x00000000065E0000-0x000000000661F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 640 un433098.exe 3764 pro5841.exe 4840 qu7487.exe 4412 si706888.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5841.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un433098.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un433098.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3432 3764 WerFault.exe 84 1056 4840 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3764 pro5841.exe 3764 pro5841.exe 4840 qu7487.exe 4840 qu7487.exe 4412 si706888.exe 4412 si706888.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3764 pro5841.exe Token: SeDebugPrivilege 4840 qu7487.exe Token: SeDebugPrivilege 4412 si706888.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2676 wrote to memory of 640 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 83 PID 2676 wrote to memory of 640 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 83 PID 2676 wrote to memory of 640 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 83 PID 640 wrote to memory of 3764 640 un433098.exe 84 PID 640 wrote to memory of 3764 640 un433098.exe 84 PID 640 wrote to memory of 3764 640 un433098.exe 84 PID 640 wrote to memory of 4840 640 un433098.exe 87 PID 640 wrote to memory of 4840 640 un433098.exe 87 PID 640 wrote to memory of 4840 640 un433098.exe 87 PID 2676 wrote to memory of 4412 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 91 PID 2676 wrote to memory of 4412 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 91 PID 2676 wrote to memory of 4412 2676 3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe"C:\Users\Admin\AppData\Local\Temp\3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10804⤵
- Program crash
PID:3432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 13484⤵
- Program crash
PID:1056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3764 -ip 37641⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4840 -ip 48401⤵PID:2944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57d6d081f8b1eb8ddb5ea477e12674df5
SHA19a52282ee18cd511b709a9c5efab4c08015108bf
SHA256b3f2c802056b2e90e763664b870117627e6e6f99184adca991f95498ba2afbbc
SHA512e18ae630e0023f85766fdea5c220ec41c91ca13d1442cde5eb30fc904053aca7a085c11d6e57ba039a11124c88a2a3017633da78818b3e5cd7bf7209ea4dc2e1
-
Filesize
175KB
MD57d6d081f8b1eb8ddb5ea477e12674df5
SHA19a52282ee18cd511b709a9c5efab4c08015108bf
SHA256b3f2c802056b2e90e763664b870117627e6e6f99184adca991f95498ba2afbbc
SHA512e18ae630e0023f85766fdea5c220ec41c91ca13d1442cde5eb30fc904053aca7a085c11d6e57ba039a11124c88a2a3017633da78818b3e5cd7bf7209ea4dc2e1
-
Filesize
548KB
MD5f1ec0759899666760d6b9b7c3713f87e
SHA1daea9c860d85e53ff56f8a3d1e5dcbf510a5412f
SHA256e87f2b237d63eee6a02a76f2358130b064eb1282742bc9497cc74233088f7ab4
SHA512998ba32a6dea01d6836720eba8db754d51313cacddfb2564d248ce31d9334e856c6c9701c13c0bde1e6e7c29111f060fef4a4d0f171f7235994f7b84f23665f1
-
Filesize
548KB
MD5f1ec0759899666760d6b9b7c3713f87e
SHA1daea9c860d85e53ff56f8a3d1e5dcbf510a5412f
SHA256e87f2b237d63eee6a02a76f2358130b064eb1282742bc9497cc74233088f7ab4
SHA512998ba32a6dea01d6836720eba8db754d51313cacddfb2564d248ce31d9334e856c6c9701c13c0bde1e6e7c29111f060fef4a4d0f171f7235994f7b84f23665f1
-
Filesize
291KB
MD58614d2746cc925941b4e621ee2a0e5df
SHA17fde51fdfa9620f91a54caddab9f845a6675b4fe
SHA25677dd8ddada90b752cc03a2eed520284c97b1f1575fd2eac41422f8c841695cd2
SHA512f8d5b656fec5044515d301bf9818dd8e6db04535a83b1c34f0f4e4de9e038433840909508d438a652f5315ae78532964f86d03d8b61b1f7abf231d84325ab090
-
Filesize
291KB
MD58614d2746cc925941b4e621ee2a0e5df
SHA17fde51fdfa9620f91a54caddab9f845a6675b4fe
SHA25677dd8ddada90b752cc03a2eed520284c97b1f1575fd2eac41422f8c841695cd2
SHA512f8d5b656fec5044515d301bf9818dd8e6db04535a83b1c34f0f4e4de9e038433840909508d438a652f5315ae78532964f86d03d8b61b1f7abf231d84325ab090
-
Filesize
345KB
MD5b46f6234fbdcd64a1f36dda8ed17177b
SHA19dd38d7bec08430b0a260b502bd7c8fb5f4bfac4
SHA256f0476f2c5b9b4102a11d68ff0f5d18c1a2d0b816efeaf2dc19db6bd73baf738c
SHA5123e7127d5d09a08f94a1ca7627d0ed4f8342ca3752c70b173aaef77017f6e9b6e96406fc75279c9aa68ce2cf5e36814c8f945a9558e22697f4f6a5d715a7d04b4
-
Filesize
345KB
MD5b46f6234fbdcd64a1f36dda8ed17177b
SHA19dd38d7bec08430b0a260b502bd7c8fb5f4bfac4
SHA256f0476f2c5b9b4102a11d68ff0f5d18c1a2d0b816efeaf2dc19db6bd73baf738c
SHA5123e7127d5d09a08f94a1ca7627d0ed4f8342ca3752c70b173aaef77017f6e9b6e96406fc75279c9aa68ce2cf5e36814c8f945a9558e22697f4f6a5d715a7d04b4