Analysis
-
max time kernel
109s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:09
Static task
static1
Behavioral task
behavioral1
Sample
f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe
Resource
win10v2004-20230220-en
General
-
Target
f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe
-
Size
689KB
-
MD5
c778e2ae907e9f35a4ae0e99ef6145ce
-
SHA1
d1c350f7527b912874f24e93029d0ce67cb36de5
-
SHA256
f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657
-
SHA512
4d2f86b850a2fef4050d165887e46a49381fd8a2abb167da676876cdd329c3a12cce74c1d05c14143a055adb269b6be7c764265de1388ea9719eb48c78e68eb0
-
SSDEEP
12288:WMr4y90Vic0W9YotBNtE5mDyX1Y5Ms+D22cJhRdJjzqvdFHOfig4YUeHl6lO7:qyZA3RtVH+D2tffqvHOag4YSlO7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro3120.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3120.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3120.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4904-192-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-193-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-195-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-197-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-199-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-201-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-203-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-205-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-207-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-209-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-211-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-213-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-215-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-217-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-219-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-221-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-223-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-225-0x00000000065F0000-0x000000000662F000-memory.dmp family_redline behavioral1/memory/4904-466-0x0000000001CE0000-0x0000000001CF0000-memory.dmp family_redline behavioral1/memory/4904-1111-0x0000000001CE0000-0x0000000001CF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un371180.exepro3120.exequ4542.exesi542734.exepid process 1296 un371180.exe 4332 pro3120.exe 4904 qu4542.exe 1124 si542734.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3120.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3120.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exeun371180.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un371180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un371180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4412 4332 WerFault.exe pro3120.exe 2612 4904 WerFault.exe qu4542.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3120.exequ4542.exesi542734.exepid process 4332 pro3120.exe 4332 pro3120.exe 4904 qu4542.exe 4904 qu4542.exe 1124 si542734.exe 1124 si542734.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3120.exequ4542.exesi542734.exedescription pid process Token: SeDebugPrivilege 4332 pro3120.exe Token: SeDebugPrivilege 4904 qu4542.exe Token: SeDebugPrivilege 1124 si542734.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exeun371180.exedescription pid process target process PID 3516 wrote to memory of 1296 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe un371180.exe PID 3516 wrote to memory of 1296 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe un371180.exe PID 3516 wrote to memory of 1296 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe un371180.exe PID 1296 wrote to memory of 4332 1296 un371180.exe pro3120.exe PID 1296 wrote to memory of 4332 1296 un371180.exe pro3120.exe PID 1296 wrote to memory of 4332 1296 un371180.exe pro3120.exe PID 1296 wrote to memory of 4904 1296 un371180.exe qu4542.exe PID 1296 wrote to memory of 4904 1296 un371180.exe qu4542.exe PID 1296 wrote to memory of 4904 1296 un371180.exe qu4542.exe PID 3516 wrote to memory of 1124 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe si542734.exe PID 3516 wrote to memory of 1124 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe si542734.exe PID 3516 wrote to memory of 1124 3516 f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe si542734.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe"C:\Users\Admin\AppData\Local\Temp\f95e41ba8d9fd4e1dac5a2647bd8454199bd34051a16f9e477e8b5b9af96e657.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un371180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un371180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3120.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3120.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 10844⤵
- Program crash
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4542.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 13284⤵
- Program crash
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542734.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542734.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4332 -ip 43321⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4904 -ip 49041⤵PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD523fd2006565a8fc6692882b10a489d8b
SHA12fa0730481f8e367bb50b3b151fcfe7deb271c2f
SHA25662cbd88c342713dec16981bf24acda7a6c51dd19107cc75a4ba8d539d7d7d440
SHA512880a7e643f398deda7f4a844487f2203c2558039cc1326ba643f963d66234ecc94616c66afc9d0510df072fcb0abfc498ad08963e7f04ceaa84bfa2e77c964f8
-
Filesize
175KB
MD523fd2006565a8fc6692882b10a489d8b
SHA12fa0730481f8e367bb50b3b151fcfe7deb271c2f
SHA25662cbd88c342713dec16981bf24acda7a6c51dd19107cc75a4ba8d539d7d7d440
SHA512880a7e643f398deda7f4a844487f2203c2558039cc1326ba643f963d66234ecc94616c66afc9d0510df072fcb0abfc498ad08963e7f04ceaa84bfa2e77c964f8
-
Filesize
547KB
MD544af654e3a3d781946246a64a9296eb5
SHA1dddaf188958b6bebe0ea495a9ddbaa688347400c
SHA2561c889b454aec6a8fbad5fb50bbf79a169d8a6d5c34cb56eff56f191bf0b53d55
SHA5128184a2de3efb960b8bb8329df514fb18147fd02528de9576fa71bcefd46100b690aec29be2146c0742fc2cd25a618f46b278f2c1f58a650221e4333d07a81c05
-
Filesize
547KB
MD544af654e3a3d781946246a64a9296eb5
SHA1dddaf188958b6bebe0ea495a9ddbaa688347400c
SHA2561c889b454aec6a8fbad5fb50bbf79a169d8a6d5c34cb56eff56f191bf0b53d55
SHA5128184a2de3efb960b8bb8329df514fb18147fd02528de9576fa71bcefd46100b690aec29be2146c0742fc2cd25a618f46b278f2c1f58a650221e4333d07a81c05
-
Filesize
291KB
MD513c72bc528a202c3d8b004cdd8f69d50
SHA117a9ce5499fe180729efc98c26f715dc19824d3d
SHA2565c1eb8b16a7167ab4efded034060a32a271725dc5f8ef849c39dde66cc0b31b9
SHA512b4c25cd4a6d05a2e515ad54077cabcc0fb7060514747dcf6bc467bcddd43790f5641b5dd0e0e23ca692b7150c9eb8b34559eb4607bb3fb542037c642d56e0b6a
-
Filesize
291KB
MD513c72bc528a202c3d8b004cdd8f69d50
SHA117a9ce5499fe180729efc98c26f715dc19824d3d
SHA2565c1eb8b16a7167ab4efded034060a32a271725dc5f8ef849c39dde66cc0b31b9
SHA512b4c25cd4a6d05a2e515ad54077cabcc0fb7060514747dcf6bc467bcddd43790f5641b5dd0e0e23ca692b7150c9eb8b34559eb4607bb3fb542037c642d56e0b6a
-
Filesize
345KB
MD51bce2af20b6b1ba645ebed74842df1c7
SHA1d34013e0901d3ec58b958722db8d21e9b2811bd0
SHA256af33c74c27884018d1ffc9a21b279ae5136c70bd50bf96dc2c94ff123e0896b4
SHA5121fe0d384f859bbe411c3356a4828996ec97893fc5ad3cc3f1b3fa5b04189ef03fac43332a4ebaeb6c8918adb9951e29faa63a9db2069b0ef2b159e0e73771a48
-
Filesize
345KB
MD51bce2af20b6b1ba645ebed74842df1c7
SHA1d34013e0901d3ec58b958722db8d21e9b2811bd0
SHA256af33c74c27884018d1ffc9a21b279ae5136c70bd50bf96dc2c94ff123e0896b4
SHA5121fe0d384f859bbe411c3356a4828996ec97893fc5ad3cc3f1b3fa5b04189ef03fac43332a4ebaeb6c8918adb9951e29faa63a9db2069b0ef2b159e0e73771a48