Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:10
Static task
static1
Behavioral task
behavioral1
Sample
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe
Resource
win10v2004-20230220-en
General
-
Target
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe
-
Size
688KB
-
MD5
7491278e5cb82d94a818950c4b18294b
-
SHA1
4e024d75ac9824a0f9174653012433c0a905dfb0
-
SHA256
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159
-
SHA512
677489c9a70d58d36ade3ca2933753011d42866f781407f2f6fca83f678859374daa145d7886bd882e5edb04e4f23b7158055f4be4db899a9788e4c04a40bfc4
-
SSDEEP
12288:iMrOy90vTp+AttQEZ5w8Yhym65hLuL8Fx6EjKhJNGrwb4lBmJkvSFmofig+r/6u+:oyGxttQEZsItfaYFjKhJmg4XmJkumoaW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2144.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2144.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2144.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3888-191-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-192-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-194-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-196-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-198-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-200-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-202-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-204-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-206-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-208-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-210-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-212-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-214-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-216-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-218-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-220-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-222-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-224-0x0000000003C80000-0x0000000003CBF000-memory.dmp family_redline behavioral1/memory/3888-368-0x00000000061D0000-0x00000000061E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un646162.exepro2144.exequ1715.exesi407297.exepid process 1008 un646162.exe 4192 pro2144.exe 3888 qu1715.exe 1176 si407297.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2144.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2144.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exeun646162.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un646162.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un646162.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1064 4192 WerFault.exe pro2144.exe 2212 3888 WerFault.exe qu1715.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2144.exequ1715.exesi407297.exepid process 4192 pro2144.exe 4192 pro2144.exe 3888 qu1715.exe 3888 qu1715.exe 1176 si407297.exe 1176 si407297.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2144.exequ1715.exesi407297.exedescription pid process Token: SeDebugPrivilege 4192 pro2144.exe Token: SeDebugPrivilege 3888 qu1715.exe Token: SeDebugPrivilege 1176 si407297.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exeun646162.exedescription pid process target process PID 4400 wrote to memory of 1008 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 4400 wrote to memory of 1008 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 4400 wrote to memory of 1008 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 1008 wrote to memory of 4192 1008 un646162.exe pro2144.exe PID 1008 wrote to memory of 4192 1008 un646162.exe pro2144.exe PID 1008 wrote to memory of 4192 1008 un646162.exe pro2144.exe PID 1008 wrote to memory of 3888 1008 un646162.exe qu1715.exe PID 1008 wrote to memory of 3888 1008 un646162.exe qu1715.exe PID 1008 wrote to memory of 3888 1008 un646162.exe qu1715.exe PID 4400 wrote to memory of 1176 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe si407297.exe PID 4400 wrote to memory of 1176 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe si407297.exe PID 4400 wrote to memory of 1176 4400 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe si407297.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe"C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 10884⤵
- Program crash
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 17284⤵
- Program crash
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4192 -ip 41921⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3888 -ip 38881⤵PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59fc1a2333f6ef1d34d1810ce1dfd738b
SHA12ba42514d8e63c1907817ccefb11da31e9b2610a
SHA256d674d49c4218476ec2c5e57981daff60eb5734d88f47e44e7cfdeb82685c47c1
SHA512f6be2e66a403303509d1d3c5652c86f61fc12d65e225f46e7e5f79fed6e8df233b6b7b0e8d9f2ebb8828679597e74d92db76afaa5db5d7ab5aca01bd3695593c
-
Filesize
175KB
MD59fc1a2333f6ef1d34d1810ce1dfd738b
SHA12ba42514d8e63c1907817ccefb11da31e9b2610a
SHA256d674d49c4218476ec2c5e57981daff60eb5734d88f47e44e7cfdeb82685c47c1
SHA512f6be2e66a403303509d1d3c5652c86f61fc12d65e225f46e7e5f79fed6e8df233b6b7b0e8d9f2ebb8828679597e74d92db76afaa5db5d7ab5aca01bd3695593c
-
Filesize
547KB
MD5747cf1ef037a228f2185faa2ce0f46d3
SHA1eb1c0a7d268dd6163675b00a56ccaa501edbc46b
SHA2569c9fb2e48d6b25a15ef8c00bbdb41e3991c004c32e1982f0e8a9630bf2099dbb
SHA512e541fa36e1cea8c70dcb0d93467c02a972d10cee97be34cfd9c83f65368b3f1dc1006db757b92590f71d29e1f3fdfe6fa29fd62b37fcee0a0cb1ccbe59b144ad
-
Filesize
547KB
MD5747cf1ef037a228f2185faa2ce0f46d3
SHA1eb1c0a7d268dd6163675b00a56ccaa501edbc46b
SHA2569c9fb2e48d6b25a15ef8c00bbdb41e3991c004c32e1982f0e8a9630bf2099dbb
SHA512e541fa36e1cea8c70dcb0d93467c02a972d10cee97be34cfd9c83f65368b3f1dc1006db757b92590f71d29e1f3fdfe6fa29fd62b37fcee0a0cb1ccbe59b144ad
-
Filesize
291KB
MD5f241c6d27958f6efd421b3915353f3ff
SHA1cc150d82eff71a69a96c0cc8d481c12903d71368
SHA2567d9446bea7316260f525527cf0f2ab0cbfc65886343cc8de2f74230302b618e4
SHA512f8af71217d3a80e9ddee19ff7e8e37b15157200f43776261d3b1be9f43e25056f93c731d1ecccd9e01d1e407f6c2c733387f8f2e155bd6855506f0e357dae1fb
-
Filesize
291KB
MD5f241c6d27958f6efd421b3915353f3ff
SHA1cc150d82eff71a69a96c0cc8d481c12903d71368
SHA2567d9446bea7316260f525527cf0f2ab0cbfc65886343cc8de2f74230302b618e4
SHA512f8af71217d3a80e9ddee19ff7e8e37b15157200f43776261d3b1be9f43e25056f93c731d1ecccd9e01d1e407f6c2c733387f8f2e155bd6855506f0e357dae1fb
-
Filesize
345KB
MD5292af942982b0fb15085f347a6ad31e3
SHA1fa27fecd2ef81ab106f994769354de6269caab85
SHA25672b8af586ff8e63d3dc1d755bd344a68209dee0e9db451755eeafa0690d661e2
SHA51227994f7b764f41aaf321db0e1e21d58ca25981d46fa167768b94206eb4edf7c349c3e348fb1c63ccc369fef25add3f233c5f5d70bb7b96425ee4c0ba7c8b430c
-
Filesize
345KB
MD5292af942982b0fb15085f347a6ad31e3
SHA1fa27fecd2ef81ab106f994769354de6269caab85
SHA25672b8af586ff8e63d3dc1d755bd344a68209dee0e9db451755eeafa0690d661e2
SHA51227994f7b764f41aaf321db0e1e21d58ca25981d46fa167768b94206eb4edf7c349c3e348fb1c63ccc369fef25add3f233c5f5d70bb7b96425ee4c0ba7c8b430c