Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe
Resource
win10v2004-20230220-en
General
-
Target
c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe
-
Size
688KB
-
MD5
cfc03be97af9c2567daad5543b638500
-
SHA1
5737ebcc47347186e17e13a78ae9000d78846933
-
SHA256
c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04
-
SHA512
53419f96e13766cc833f686adfa08e0fcc4e7ad7b1f5064546d64f254e47fd16c84a8115720b17c2b4b65543a7fe03a8d12d9769fb262a1f9ece59daf569e96b
-
SSDEEP
12288:ZMrMy90E1py0rOYHDkCe7ZQ1yL65hLu4EK3TuSvK0s4NymJwvVF57fign3LWkj0G:Ry99rOYHq7PWfaHKDuqC4ymJwn57agnj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3556.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3556.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/224-191-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-192-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-194-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-196-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-198-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-200-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-202-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-204-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-206-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-208-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-210-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-212-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-214-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-216-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-218-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-220-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-222-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-224-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/224-1110-0x0000000005F90000-0x0000000005FA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2180 un312324.exe 1092 pro3556.exe 224 qu3004.exe 4840 si584313.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3556.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un312324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un312324.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1164 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4432 1092 WerFault.exe 85 2168 224 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1092 pro3556.exe 1092 pro3556.exe 224 qu3004.exe 224 qu3004.exe 4840 si584313.exe 4840 si584313.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1092 pro3556.exe Token: SeDebugPrivilege 224 qu3004.exe Token: SeDebugPrivilege 4840 si584313.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2180 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 84 PID 5048 wrote to memory of 2180 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 84 PID 5048 wrote to memory of 2180 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 84 PID 2180 wrote to memory of 1092 2180 un312324.exe 85 PID 2180 wrote to memory of 1092 2180 un312324.exe 85 PID 2180 wrote to memory of 1092 2180 un312324.exe 85 PID 2180 wrote to memory of 224 2180 un312324.exe 91 PID 2180 wrote to memory of 224 2180 un312324.exe 91 PID 2180 wrote to memory of 224 2180 un312324.exe 91 PID 5048 wrote to memory of 4840 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 95 PID 5048 wrote to memory of 4840 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 95 PID 5048 wrote to memory of 4840 5048 c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe"C:\Users\Admin\AppData\Local\Temp\c9c805426fa702e9b3e985926ac0131c23ef4f2c0db3674b98ab9086ffdcfc04.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un312324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un312324.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3556.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3556.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 10844⤵
- Program crash
PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3004.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3004.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 13284⤵
- Program crash
PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si584313.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si584313.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1092 -ip 10921⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 224 -ip 2241⤵PID:3940
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ff46145e6f7d99c49a50d4879837aaec
SHA193d5d2181041122a396614da565c9e642b68c952
SHA256553ee574f539711bc10a30cdbbb84680b6e7216954b685d75e694e8c23716905
SHA5129be0ff33aa0793e52fa99def0f6b6d4b42d4f9c88cb5b0bc03a8252013fcef5c841711019726569c1989415317cba14f927bf141291c0a8ee6499ea2fc87ed0e
-
Filesize
175KB
MD5ff46145e6f7d99c49a50d4879837aaec
SHA193d5d2181041122a396614da565c9e642b68c952
SHA256553ee574f539711bc10a30cdbbb84680b6e7216954b685d75e694e8c23716905
SHA5129be0ff33aa0793e52fa99def0f6b6d4b42d4f9c88cb5b0bc03a8252013fcef5c841711019726569c1989415317cba14f927bf141291c0a8ee6499ea2fc87ed0e
-
Filesize
547KB
MD5b530c3527f1333738119bcbccb2d83da
SHA1c1fdcbacf9d84a3650a15a1ace205c24f8adac9c
SHA256afb92406ce7d420157199326b7d677c02c7276dd1a4c2f2f341d5e307d57de36
SHA512596271645a5714f936f45f26db27d4bdafebcbbd75959c6217ca8a6ca13a434d819042d181ced2651f7be8cb4c5b51f02e0b49b49be108a162eb5313f42ae30b
-
Filesize
547KB
MD5b530c3527f1333738119bcbccb2d83da
SHA1c1fdcbacf9d84a3650a15a1ace205c24f8adac9c
SHA256afb92406ce7d420157199326b7d677c02c7276dd1a4c2f2f341d5e307d57de36
SHA512596271645a5714f936f45f26db27d4bdafebcbbd75959c6217ca8a6ca13a434d819042d181ced2651f7be8cb4c5b51f02e0b49b49be108a162eb5313f42ae30b
-
Filesize
291KB
MD508996cf89505a4225a23255b8821db92
SHA1db4c433d02cc8b1ab70bb328a83814c5f58c1b63
SHA2564b822e0d675d221fb53d9380f3f1a1afe9c1a2918231ce625c06288adb8b6999
SHA512d24430c9a10f7f49a7239ab6ce9c64b52df2b516571079ad9ada60da14c4b78e2d39ff3da6e5692f2b28ba7e09cb22db36b27d4d7bf9614d925512514c66c97a
-
Filesize
291KB
MD508996cf89505a4225a23255b8821db92
SHA1db4c433d02cc8b1ab70bb328a83814c5f58c1b63
SHA2564b822e0d675d221fb53d9380f3f1a1afe9c1a2918231ce625c06288adb8b6999
SHA512d24430c9a10f7f49a7239ab6ce9c64b52df2b516571079ad9ada60da14c4b78e2d39ff3da6e5692f2b28ba7e09cb22db36b27d4d7bf9614d925512514c66c97a
-
Filesize
345KB
MD588e764a38ccf3ebbeaee534546b6b696
SHA142103b1cc23c0aea280c60db5fa5286c13b158e9
SHA25664a5272458ce15076a1af98059c0bd645d786ae652dae172b70645c9b8c2a9a3
SHA51294c9367675256943dc4aad212fe29d76dc2bc497ac41e2cca7e6092006a8353d923fbf39a3320e9348998f25418366456d35dfebd11123694dc3d75e5decffc9
-
Filesize
345KB
MD588e764a38ccf3ebbeaee534546b6b696
SHA142103b1cc23c0aea280c60db5fa5286c13b158e9
SHA25664a5272458ce15076a1af98059c0bd645d786ae652dae172b70645c9b8c2a9a3
SHA51294c9367675256943dc4aad212fe29d76dc2bc497ac41e2cca7e6092006a8353d923fbf39a3320e9348998f25418366456d35dfebd11123694dc3d75e5decffc9