Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:07
Static task
static1
Behavioral task
behavioral1
Sample
e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe
Resource
win10v2004-20230220-en
General
-
Target
e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe
-
Size
690KB
-
MD5
2b4d1a3c661c90aa86ef7dd32b1d6c29
-
SHA1
b65be01bf554a78ccf45cb3221baf88bd3af8220
-
SHA256
e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7
-
SHA512
1518cf4082700d88187ceab5431918871e339c1a807e340f228c8e62b46385c8dbfa46dd82287e6c6965710faae0d886a42a541b91e9303f502ee9d188f0e5fe
-
SSDEEP
12288:nMrcy90HzsJn4ZsjOys65hLuLK39uSl6cySIajvhFUZfigW/1f50L/Kd:ny8zsJ4ZsjLzfaLKNuEDySIajzUZagI9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6820.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6820.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1124-195-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-193-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-198-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-200-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-202-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-204-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-206-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-208-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-210-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-212-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-214-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-216-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-218-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-220-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-222-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-224-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-226-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1124-228-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4944 un192690.exe 4660 pro6820.exe 1124 qu8927.exe 3064 si183039.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6820.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un192690.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un192690.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3752 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3744 4660 WerFault.exe 86 2604 1124 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4660 pro6820.exe 4660 pro6820.exe 1124 qu8927.exe 1124 qu8927.exe 3064 si183039.exe 3064 si183039.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4660 pro6820.exe Token: SeDebugPrivilege 1124 qu8927.exe Token: SeDebugPrivilege 3064 si183039.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4944 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 85 PID 2700 wrote to memory of 4944 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 85 PID 2700 wrote to memory of 4944 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 85 PID 4944 wrote to memory of 4660 4944 un192690.exe 86 PID 4944 wrote to memory of 4660 4944 un192690.exe 86 PID 4944 wrote to memory of 4660 4944 un192690.exe 86 PID 4944 wrote to memory of 1124 4944 un192690.exe 92 PID 4944 wrote to memory of 1124 4944 un192690.exe 92 PID 4944 wrote to memory of 1124 4944 un192690.exe 92 PID 2700 wrote to memory of 3064 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 96 PID 2700 wrote to memory of 3064 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 96 PID 2700 wrote to memory of 3064 2700 e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe"C:\Users\Admin\AppData\Local\Temp\e24a5e504e4a2b15793f3cddf4f9c1dbc7c7efa3eabd6b160720ffb5932a0ba7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un192690.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un192690.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6820.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6820.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10884⤵
- Program crash
PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8927.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8927.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 16564⤵
- Program crash
PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183039.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4660 -ip 46601⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1124 -ip 11241⤵PID:1112
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50a6ce40a3b3647d3b34988e41d9d1e60
SHA11fb5a8d008900b5a5527f4b8c0f73339604b51c8
SHA25631fe5db38f93953f5eff70e78068b3cfe76024cd26d45d583a9f2970e8a2ba51
SHA5122115d183fec260ec41c10a137f15307c2376f5e2b2776d62ee897698db0a4edf8812a65fc413df3ca9d622791fb0d18ed9e0484ac821c863556d7be1c6ae93cd
-
Filesize
175KB
MD50a6ce40a3b3647d3b34988e41d9d1e60
SHA11fb5a8d008900b5a5527f4b8c0f73339604b51c8
SHA25631fe5db38f93953f5eff70e78068b3cfe76024cd26d45d583a9f2970e8a2ba51
SHA5122115d183fec260ec41c10a137f15307c2376f5e2b2776d62ee897698db0a4edf8812a65fc413df3ca9d622791fb0d18ed9e0484ac821c863556d7be1c6ae93cd
-
Filesize
548KB
MD510a25f180e844ec6ff5de0c5288a8dc9
SHA1119cffb34a03afea9d5fca0e4924e932e338c433
SHA2567de87674b5fce020c9be3c2cf21c849d0def93207c432549e32bbab373ba4055
SHA512a2461bc5235bbfec2db29c5044720c3023c5b97b3b4722f286207a493364ac103a05658251375d999a3c3bdb4ee3241871b917bbd91979fd6ff46cf96b2daba5
-
Filesize
548KB
MD510a25f180e844ec6ff5de0c5288a8dc9
SHA1119cffb34a03afea9d5fca0e4924e932e338c433
SHA2567de87674b5fce020c9be3c2cf21c849d0def93207c432549e32bbab373ba4055
SHA512a2461bc5235bbfec2db29c5044720c3023c5b97b3b4722f286207a493364ac103a05658251375d999a3c3bdb4ee3241871b917bbd91979fd6ff46cf96b2daba5
-
Filesize
291KB
MD5d345affaf7e2da1cf771f29464b1fc1a
SHA12237ea8ee9533ad7b89626be66297487ae7be114
SHA2564eec79b5a7dfa58131c4aded5c923550bb87619e1f34dba6f43bb96fcd0829d1
SHA512b705e65dd52afd8ae03be88b95ce9b9059f3d44abc38aa12f496e4c17f0e4e9f9e604f83b9d75a84df1b8bfe45f7505cded805b5554ed818a40df0131b3ea07e
-
Filesize
291KB
MD5d345affaf7e2da1cf771f29464b1fc1a
SHA12237ea8ee9533ad7b89626be66297487ae7be114
SHA2564eec79b5a7dfa58131c4aded5c923550bb87619e1f34dba6f43bb96fcd0829d1
SHA512b705e65dd52afd8ae03be88b95ce9b9059f3d44abc38aa12f496e4c17f0e4e9f9e604f83b9d75a84df1b8bfe45f7505cded805b5554ed818a40df0131b3ea07e
-
Filesize
345KB
MD5ee8e83c91f87341eaaa1b5a1c2ddb730
SHA1dbc1ebedb3c02ccf90198bb6a6ddc53db2316c24
SHA2566a51682ba817898f477dbc8e0a9c0805c4bd887c26f86331c610a05a9c782b0e
SHA5128ad664451cbd9066b08a66ce6c5c19d3a721ee24b44b603d47d1711fc6b8e35113a1f0d8f35e4808f307b7fa195e00297b56ec99e7ce0095d74888a0ca10c8b1
-
Filesize
345KB
MD5ee8e83c91f87341eaaa1b5a1c2ddb730
SHA1dbc1ebedb3c02ccf90198bb6a6ddc53db2316c24
SHA2566a51682ba817898f477dbc8e0a9c0805c4bd887c26f86331c610a05a9c782b0e
SHA5128ad664451cbd9066b08a66ce6c5c19d3a721ee24b44b603d47d1711fc6b8e35113a1f0d8f35e4808f307b7fa195e00297b56ec99e7ce0095d74888a0ca10c8b1