Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:11
Static task
static1
Behavioral task
behavioral1
Sample
173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe
Resource
win10v2004-20230220-en
General
-
Target
173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe
-
Size
688KB
-
MD5
3d980746adf97db0b13504ec25acacc0
-
SHA1
9184ef6610fff10e1eb1ace8ae8a4852f0462e4f
-
SHA256
173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7
-
SHA512
9fa3b9b31f0cab146e2d4370732cc84a32adfeca06ba15479f7b083e0151132850c2f597f36e8f9b4bcca6bdd41699734c47ad7176afdfd5550ff4319036b988
-
SSDEEP
12288:mMr8y907ABWAyemwKwgecmyY65hLuuCW8+epBgiFeuCpmJEvrFA2figKgexOJcjX:uyDcYgeEXfaJ+epiucmJExA2agKPyk3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4926.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4926.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/944-191-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-192-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-194-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-196-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-198-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-200-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-202-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-204-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-206-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-210-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-208-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-212-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-214-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-216-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-218-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-220-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-222-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-224-0x00000000065D0000-0x000000000660F000-memory.dmp family_redline behavioral1/memory/944-1112-0x0000000003700000-0x0000000003710000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1364 un816796.exe 1580 pro4926.exe 944 qu6578.exe 3528 si638188.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4926.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un816796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un816796.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5024 1580 WerFault.exe 83 1816 944 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1580 pro4926.exe 1580 pro4926.exe 944 qu6578.exe 944 qu6578.exe 3528 si638188.exe 3528 si638188.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1580 pro4926.exe Token: SeDebugPrivilege 944 qu6578.exe Token: SeDebugPrivilege 3528 si638188.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1364 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 82 PID 3388 wrote to memory of 1364 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 82 PID 3388 wrote to memory of 1364 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 82 PID 1364 wrote to memory of 1580 1364 un816796.exe 83 PID 1364 wrote to memory of 1580 1364 un816796.exe 83 PID 1364 wrote to memory of 1580 1364 un816796.exe 83 PID 1364 wrote to memory of 944 1364 un816796.exe 89 PID 1364 wrote to memory of 944 1364 un816796.exe 89 PID 1364 wrote to memory of 944 1364 un816796.exe 89 PID 3388 wrote to memory of 3528 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 93 PID 3388 wrote to memory of 3528 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 93 PID 3388 wrote to memory of 3528 3388 173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe"C:\Users\Admin\AppData\Local\Temp\173ab9cdcc070fa57f023bc40ce6d682637bcba157692d48df6f307cf6d5b4c7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4926.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10804⤵
- Program crash
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6578.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 17604⤵
- Program crash
PID:1816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si638188.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si638188.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1580 -ip 15801⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 944 -ip 9441⤵PID:4768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52a74483e46affbe693215f461127c876
SHA1fd8cefb7043351885a94a9ca075c69bda5ae14c4
SHA256afa8b0a516012fb45b4d1ccb39992a8f66f557e614e660efdb2e10c060caaa40
SHA512b4b91317b46f86d10545cf1745cabc781073a41e93b49bf4e144bd97765f5bce9e36d7105891dc2721531f7f028d69d769ea7f7e264f29d0043b368796f8b5d2
-
Filesize
175KB
MD52a74483e46affbe693215f461127c876
SHA1fd8cefb7043351885a94a9ca075c69bda5ae14c4
SHA256afa8b0a516012fb45b4d1ccb39992a8f66f557e614e660efdb2e10c060caaa40
SHA512b4b91317b46f86d10545cf1745cabc781073a41e93b49bf4e144bd97765f5bce9e36d7105891dc2721531f7f028d69d769ea7f7e264f29d0043b368796f8b5d2
-
Filesize
547KB
MD591d685eda3dc18f059dd35ebd2f4051b
SHA1a0583be4337ae763abe951ad7d09af3080e70068
SHA256eabc7814db2b25a68fe6a4e44b147fa7cd0097e418971dec606dfcbd353ce91c
SHA5129805fa9005db3eacf49384f5ae344cf492c7b3c2504d7e43aaac8c5e0fe6ff913d7cc7d9a8b4d6e79664ffdac35b8d9311cca7b4fc447355791848c7d436d768
-
Filesize
547KB
MD591d685eda3dc18f059dd35ebd2f4051b
SHA1a0583be4337ae763abe951ad7d09af3080e70068
SHA256eabc7814db2b25a68fe6a4e44b147fa7cd0097e418971dec606dfcbd353ce91c
SHA5129805fa9005db3eacf49384f5ae344cf492c7b3c2504d7e43aaac8c5e0fe6ff913d7cc7d9a8b4d6e79664ffdac35b8d9311cca7b4fc447355791848c7d436d768
-
Filesize
291KB
MD5b62fdbc0c1320c54c5288d1befb3732d
SHA1650c6752761490a5a681abdeb0f4c0f002e7584d
SHA2562331dc19cdf01d850b752f0618008320b8944d5a4cff610261778542a44329da
SHA5128b4aa1c52d7a444dd3c8ac8efc58e1cf0177b45d433eb534832556d532a5b6bfec65254a2058666ff64de787609f93f00c7e0b518734409eb3ca9e3707901d6e
-
Filesize
291KB
MD5b62fdbc0c1320c54c5288d1befb3732d
SHA1650c6752761490a5a681abdeb0f4c0f002e7584d
SHA2562331dc19cdf01d850b752f0618008320b8944d5a4cff610261778542a44329da
SHA5128b4aa1c52d7a444dd3c8ac8efc58e1cf0177b45d433eb534832556d532a5b6bfec65254a2058666ff64de787609f93f00c7e0b518734409eb3ca9e3707901d6e
-
Filesize
345KB
MD541b544c78ff10efb9237f8463423a002
SHA14d2fe599671f65eb03510138749f95e039af8d6d
SHA256ac3195faca863d2c904254c62346abde5b69d47846f6d02db9da89a302b7ce41
SHA51253fd165340332a678886bf597c6edc34e64d0b1b49d0fdf4530b920b0710bfc2e3368f72010bfd93c1bcd901fae5656c5a940f74c8ae93c83bdc079df6592f4a
-
Filesize
345KB
MD541b544c78ff10efb9237f8463423a002
SHA14d2fe599671f65eb03510138749f95e039af8d6d
SHA256ac3195faca863d2c904254c62346abde5b69d47846f6d02db9da89a302b7ce41
SHA51253fd165340332a678886bf597c6edc34e64d0b1b49d0fdf4530b920b0710bfc2e3368f72010bfd93c1bcd901fae5656c5a940f74c8ae93c83bdc079df6592f4a