Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:05
Static task
static1
Behavioral task
behavioral1
Sample
17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe
Resource
win10v2004-20230221-en
General
-
Target
17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe
-
Size
689KB
-
MD5
ed9043ed7e177d42f4cf6c383118e67d
-
SHA1
ef28592eb32d735164b75c4911e3ce98e5650d0f
-
SHA256
17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4
-
SHA512
ce9567425bcd18e34ce3776530d5cd23e4a1e8d38e0be98a1054a7898e7aed6a927b381685f3dfa3ec82c1a1e8b73fb0f0690fa9aad1a3f320345e30996164e8
-
SSDEEP
12288:5Mrxy90Zll/I2GYo2yug496ieyH65hLuvwyobeyc4C0xmJ/vRFKCfige/E0gA:YySllw2loj4Q+afaOepv0xmJ/jKCagNg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6316.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6316.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4212-189-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-191-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-188-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-193-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-195-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-197-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-202-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-205-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-207-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-209-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-211-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-213-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-215-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-217-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-219-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-221-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-223-0x0000000003960000-0x000000000399F000-memory.dmp family_redline behavioral1/memory/4212-225-0x0000000003960000-0x000000000399F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1440 un099989.exe 2748 pro6316.exe 4212 qu9495.exe 1844 si348455.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6316.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un099989.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un099989.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1408 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 832 2748 WerFault.exe 87 348 4212 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2748 pro6316.exe 2748 pro6316.exe 4212 qu9495.exe 4212 qu9495.exe 1844 si348455.exe 1844 si348455.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2748 pro6316.exe Token: SeDebugPrivilege 4212 qu9495.exe Token: SeDebugPrivilege 1844 si348455.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1440 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 86 PID 1756 wrote to memory of 1440 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 86 PID 1756 wrote to memory of 1440 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 86 PID 1440 wrote to memory of 2748 1440 un099989.exe 87 PID 1440 wrote to memory of 2748 1440 un099989.exe 87 PID 1440 wrote to memory of 2748 1440 un099989.exe 87 PID 1440 wrote to memory of 4212 1440 un099989.exe 93 PID 1440 wrote to memory of 4212 1440 un099989.exe 93 PID 1440 wrote to memory of 4212 1440 un099989.exe 93 PID 1756 wrote to memory of 1844 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 97 PID 1756 wrote to memory of 1844 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 97 PID 1756 wrote to memory of 1844 1756 17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe"C:\Users\Admin\AppData\Local\Temp\17492b7ea8a57c13fd562e17c33560452ce93345418863ffd2ca7bf1468347a4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un099989.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un099989.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6316.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6316.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 10804⤵
- Program crash
PID:832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9495.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 13164⤵
- Program crash
PID:348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si348455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si348455.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2748 -ip 27481⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4212 -ip 42121⤵PID:320
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5792afe5d951588ea58397dd6abb67be8
SHA1505fa378c737b3d371c79ca48a9ecfcb1d90a44e
SHA25669c69658291292d9b9d4c51d4d14335799d6d1feacb6c6027e48986f81163194
SHA512c868af7df811be7e8650b4e44a8db0dabd7774723c5fa8feb092beef04815093dfa45fb888666df9d041e7ed03e59a0a6e6afc75f5669a3d72c370804f115cc2
-
Filesize
175KB
MD5792afe5d951588ea58397dd6abb67be8
SHA1505fa378c737b3d371c79ca48a9ecfcb1d90a44e
SHA25669c69658291292d9b9d4c51d4d14335799d6d1feacb6c6027e48986f81163194
SHA512c868af7df811be7e8650b4e44a8db0dabd7774723c5fa8feb092beef04815093dfa45fb888666df9d041e7ed03e59a0a6e6afc75f5669a3d72c370804f115cc2
-
Filesize
547KB
MD51119a67817c6767ba4923ab54806659e
SHA1c51a77bb4ac4c8e8b9f87378057fadaa4c221096
SHA2566af1ad743f1b34190146fd6af39b329caa6e39d86569eb9872c44b38f730c84f
SHA5127eabce4dfa5f75828f775f7fe68b96044ed5da1d62a71d7bf3d3756d9d37fa1a3f7bd7d83e9e409399b4f798420e03bf97834fc07fe287762366c1847a4545e5
-
Filesize
547KB
MD51119a67817c6767ba4923ab54806659e
SHA1c51a77bb4ac4c8e8b9f87378057fadaa4c221096
SHA2566af1ad743f1b34190146fd6af39b329caa6e39d86569eb9872c44b38f730c84f
SHA5127eabce4dfa5f75828f775f7fe68b96044ed5da1d62a71d7bf3d3756d9d37fa1a3f7bd7d83e9e409399b4f798420e03bf97834fc07fe287762366c1847a4545e5
-
Filesize
291KB
MD575e75ca594562bca1c6559839b974ea2
SHA19d70229cadfc03b777580d17d08a35dd777dd30b
SHA2567d18603442ae9179c16b61e177319740810076f155fe1647847fcd6debf2cda4
SHA512eab11dc5f05ac0e8cd1fd96505e4a6dd2dfcd58353006f0257d13f7c32fd7549afc9d88d77f410b0241c9883e93f0db0cfb51b46a8ec6c9802fa7ec7e93ad874
-
Filesize
291KB
MD575e75ca594562bca1c6559839b974ea2
SHA19d70229cadfc03b777580d17d08a35dd777dd30b
SHA2567d18603442ae9179c16b61e177319740810076f155fe1647847fcd6debf2cda4
SHA512eab11dc5f05ac0e8cd1fd96505e4a6dd2dfcd58353006f0257d13f7c32fd7549afc9d88d77f410b0241c9883e93f0db0cfb51b46a8ec6c9802fa7ec7e93ad874
-
Filesize
345KB
MD536cc23a786f3abe4c5b761553f303a7d
SHA1b7916b105b24971e60e37c04d62710dbd0841d7b
SHA256ac477f4440a09a9556023571396edadcdad331607dbaec1f2d699ad3350d0bfd
SHA512f1802442a9545325f495044c30b90e9cf9d0c720355ec471f92bf0a7e743cde593341ad869d0aea7a79cd55892f24ee521179fb24c23d59beb95ecca69292960
-
Filesize
345KB
MD536cc23a786f3abe4c5b761553f303a7d
SHA1b7916b105b24971e60e37c04d62710dbd0841d7b
SHA256ac477f4440a09a9556023571396edadcdad331607dbaec1f2d699ad3350d0bfd
SHA512f1802442a9545325f495044c30b90e9cf9d0c720355ec471f92bf0a7e743cde593341ad869d0aea7a79cd55892f24ee521179fb24c23d59beb95ecca69292960