Analysis
-
max time kernel
72s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:15
Static task
static1
Behavioral task
behavioral1
Sample
7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe
Resource
win10v2004-20230220-en
General
-
Target
7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe
-
Size
689KB
-
MD5
7ffb020b57382740f8561e1073463dbc
-
SHA1
9280b56bc42fb024f3e660111eb2526e98c8acd3
-
SHA256
7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94
-
SHA512
a7306d41e64e8bd7bf68a662422e184d550088ee959aa28c202d2249f61dfa7c0a786441ade55ff9632bee40ef85d0066a6309a0df6beb87c25f831aab364097
-
SSDEEP
12288:hMrHy90jtTPz8AXYw6d6XTyX65hLuheAMSKI3VATEEepEIFmJKvNFamfigEvrTln:iycQqYw6+OKfacALZ3VATErpE+mJKvaj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0390.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0390.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0390.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-190-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-191-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-193-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-195-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-197-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-199-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-201-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-203-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-205-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-207-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-211-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-209-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-213-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-215-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-217-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-219-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-221-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-223-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2668-409-0x00000000060C0000-0x00000000060D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un840896.exepro0390.exequ2531.exesi947819.exepid process 4156 un840896.exe 2296 pro0390.exe 2668 qu2531.exe 620 si947819.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0390.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0390.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exeun840896.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un840896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un840896.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3664 2296 WerFault.exe pro0390.exe 4664 2668 WerFault.exe qu2531.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0390.exequ2531.exesi947819.exepid process 2296 pro0390.exe 2296 pro0390.exe 2668 qu2531.exe 2668 qu2531.exe 620 si947819.exe 620 si947819.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0390.exequ2531.exesi947819.exedescription pid process Token: SeDebugPrivilege 2296 pro0390.exe Token: SeDebugPrivilege 2668 qu2531.exe Token: SeDebugPrivilege 620 si947819.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exeun840896.exedescription pid process target process PID 2120 wrote to memory of 4156 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe un840896.exe PID 2120 wrote to memory of 4156 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe un840896.exe PID 2120 wrote to memory of 4156 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe un840896.exe PID 4156 wrote to memory of 2296 4156 un840896.exe pro0390.exe PID 4156 wrote to memory of 2296 4156 un840896.exe pro0390.exe PID 4156 wrote to memory of 2296 4156 un840896.exe pro0390.exe PID 4156 wrote to memory of 2668 4156 un840896.exe qu2531.exe PID 4156 wrote to memory of 2668 4156 un840896.exe qu2531.exe PID 4156 wrote to memory of 2668 4156 un840896.exe qu2531.exe PID 2120 wrote to memory of 620 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe si947819.exe PID 2120 wrote to memory of 620 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe si947819.exe PID 2120 wrote to memory of 620 2120 7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe si947819.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe"C:\Users\Admin\AppData\Local\Temp\7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 10844⤵
- Program crash
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 13324⤵
- Program crash
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2296 -ip 22961⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2668 -ip 26681⤵PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f5c57e89bbd4c503d585de90e744be5b
SHA1d30cc70287c9b0ccd727a1e2a3382739e1250929
SHA2569aa243e7536f5b2cd09db57e0ad790a64ac362a55de3a5ab5576b2f3cfbe5e3d
SHA51207712a2f458f26973d2fae021851575468050d5dea59c6d0829ecb1db7642442b6becbfe1c64cce0c0905d722d42f28b16a62e0bd1b83fcce8954d26033a8937
-
Filesize
175KB
MD5f5c57e89bbd4c503d585de90e744be5b
SHA1d30cc70287c9b0ccd727a1e2a3382739e1250929
SHA2569aa243e7536f5b2cd09db57e0ad790a64ac362a55de3a5ab5576b2f3cfbe5e3d
SHA51207712a2f458f26973d2fae021851575468050d5dea59c6d0829ecb1db7642442b6becbfe1c64cce0c0905d722d42f28b16a62e0bd1b83fcce8954d26033a8937
-
Filesize
547KB
MD53ac152e092d70ec4bb90c2435831360c
SHA11a03c9551e2256aeb098ee2ec7a1c70e9db29f5a
SHA2562d9cd9db08cdf17e344524a76dd3350ad16763a7a8a1c211d31562905dff9f53
SHA512245113bce23cb4331e0b0c1e86acb508e03b71044bd894b4d27ae339ea909d543ff30d8c95f51242933eb1846838baf450cf857d8cb624938da6ca4cac39b927
-
Filesize
547KB
MD53ac152e092d70ec4bb90c2435831360c
SHA11a03c9551e2256aeb098ee2ec7a1c70e9db29f5a
SHA2562d9cd9db08cdf17e344524a76dd3350ad16763a7a8a1c211d31562905dff9f53
SHA512245113bce23cb4331e0b0c1e86acb508e03b71044bd894b4d27ae339ea909d543ff30d8c95f51242933eb1846838baf450cf857d8cb624938da6ca4cac39b927
-
Filesize
291KB
MD5ebd5bc3bcdd3cb84c01c1b1b56de6d47
SHA1ae522fc69743390a6663f14e67af00433e3ac188
SHA2569f43868afac8fc07e46ca33c6e04807439b2453be6c6c42c80fec195e31efd4c
SHA512ed5ddd9908d5423d965098acc84b5cea5c91350bbc849af444fa03bb7fe2e2f12f6a532fcb5908ac5cf925087907e8c563f98e8d2623774f3a4843b8319c66a8
-
Filesize
291KB
MD5ebd5bc3bcdd3cb84c01c1b1b56de6d47
SHA1ae522fc69743390a6663f14e67af00433e3ac188
SHA2569f43868afac8fc07e46ca33c6e04807439b2453be6c6c42c80fec195e31efd4c
SHA512ed5ddd9908d5423d965098acc84b5cea5c91350bbc849af444fa03bb7fe2e2f12f6a532fcb5908ac5cf925087907e8c563f98e8d2623774f3a4843b8319c66a8
-
Filesize
345KB
MD5ace17c5c7535bf12edae0639c6e4ed26
SHA1125d036fc624f9808a4556e4489c810ccff05527
SHA256075dbce4f1855af9b9a0b19b38a70bb6333eee429a31e7dce5852bea04e234c7
SHA5124640503c059dc9e9534a1a9bea7f18a2f3269a8fc37b0726cb31943ee78110e7a75b927b25cb6b187444a2923c64f10359da5940ac1952b0c4adb2a330d9beed
-
Filesize
345KB
MD5ace17c5c7535bf12edae0639c6e4ed26
SHA1125d036fc624f9808a4556e4489c810ccff05527
SHA256075dbce4f1855af9b9a0b19b38a70bb6333eee429a31e7dce5852bea04e234c7
SHA5124640503c059dc9e9534a1a9bea7f18a2f3269a8fc37b0726cb31943ee78110e7a75b927b25cb6b187444a2923c64f10359da5940ac1952b0c4adb2a330d9beed