Analysis
-
max time kernel
93s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:21
Static task
static1
Behavioral task
behavioral1
Sample
1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe
Resource
win10v2004-20230220-en
General
-
Target
1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe
-
Size
689KB
-
MD5
246ee83e46d70e6f2d3a2b3c843d6a3d
-
SHA1
0f9d05bc18102189b473d12f91b1d9be7a87c5ee
-
SHA256
1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a
-
SHA512
7c0cad502c4ed420b7e92ca89f9585e9f5482bc0039a56cf17c74f185f966c5b369d051ab77b602ab9a3d0ae18004659c685143bf9dd7546a077f6f6f996205d
-
SSDEEP
12288:QMryy90inx18ElNJ8TL0nX95B0uh11QMon93+DT4Tid2cs8nGHCkmJ6vrFtYfig6:yyDnx18ElNIQNz0fMw+DTyJ8imJ6htYQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8150.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8150.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8150.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5000-189-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-190-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-192-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-194-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-196-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-198-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-200-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-202-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-204-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-206-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-208-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-210-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-212-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-214-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-216-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-218-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-220-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline behavioral1/memory/5000-225-0x0000000003A90000-0x0000000003ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un247212.exepro8150.exequ4107.exesi775886.exepid process 2808 un247212.exe 3312 pro8150.exe 5000 qu4107.exe 2044 si775886.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8150.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8150.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exeun247212.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un247212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un247212.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1268 3312 WerFault.exe pro8150.exe 2536 5000 WerFault.exe qu4107.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8150.exequ4107.exesi775886.exepid process 3312 pro8150.exe 3312 pro8150.exe 5000 qu4107.exe 5000 qu4107.exe 2044 si775886.exe 2044 si775886.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8150.exequ4107.exesi775886.exedescription pid process Token: SeDebugPrivilege 3312 pro8150.exe Token: SeDebugPrivilege 5000 qu4107.exe Token: SeDebugPrivilege 2044 si775886.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exeun247212.exedescription pid process target process PID 820 wrote to memory of 2808 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe un247212.exe PID 820 wrote to memory of 2808 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe un247212.exe PID 820 wrote to memory of 2808 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe un247212.exe PID 2808 wrote to memory of 3312 2808 un247212.exe pro8150.exe PID 2808 wrote to memory of 3312 2808 un247212.exe pro8150.exe PID 2808 wrote to memory of 3312 2808 un247212.exe pro8150.exe PID 2808 wrote to memory of 5000 2808 un247212.exe qu4107.exe PID 2808 wrote to memory of 5000 2808 un247212.exe qu4107.exe PID 2808 wrote to memory of 5000 2808 un247212.exe qu4107.exe PID 820 wrote to memory of 2044 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe si775886.exe PID 820 wrote to memory of 2044 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe si775886.exe PID 820 wrote to memory of 2044 820 1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe si775886.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe"C:\Users\Admin\AppData\Local\Temp\1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 10844⤵
- Program crash
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 13284⤵
- Program crash
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3312 -ip 33121⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5000 -ip 50001⤵PID:1404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c9b895ac9e3972bf699a12837c72cc1
SHA1e997334510d2883f7bcf92646cec627fb85287d3
SHA2564853a7cface9590b38775043d6abe9f66b457f20c319f7154fbdb016be1cdaf7
SHA512e0c229d6028529dee5d6abbe21b0016216d996239842f3df7e1e0f5ddc4213a42ecfbeea0846f5b38ad9ac34984429fc581f04bdf89823baee337dbd7a3904ad
-
Filesize
175KB
MD56c9b895ac9e3972bf699a12837c72cc1
SHA1e997334510d2883f7bcf92646cec627fb85287d3
SHA2564853a7cface9590b38775043d6abe9f66b457f20c319f7154fbdb016be1cdaf7
SHA512e0c229d6028529dee5d6abbe21b0016216d996239842f3df7e1e0f5ddc4213a42ecfbeea0846f5b38ad9ac34984429fc581f04bdf89823baee337dbd7a3904ad
-
Filesize
547KB
MD5e2aaa78f9f1a8d064fa2595d14a6d554
SHA14a05b00c41454ffef1de39cf0a76bdbf4bffc516
SHA2567b366f38e3a3fcceb6de2b7e99bac19a025be36627538149aa781f388e6e6531
SHA5129e8a144f86f792a77a7eddb36d1b962264d2f5e9ef4ae5453ab1693d642a9deb1313b5ecd7f3101e2c22e20d8859e18721dc8df75a035aec1e97802afdade922
-
Filesize
547KB
MD5e2aaa78f9f1a8d064fa2595d14a6d554
SHA14a05b00c41454ffef1de39cf0a76bdbf4bffc516
SHA2567b366f38e3a3fcceb6de2b7e99bac19a025be36627538149aa781f388e6e6531
SHA5129e8a144f86f792a77a7eddb36d1b962264d2f5e9ef4ae5453ab1693d642a9deb1313b5ecd7f3101e2c22e20d8859e18721dc8df75a035aec1e97802afdade922
-
Filesize
291KB
MD5dc9c5698de530b51d104f959844a9998
SHA1a04d4f4993a70de01e19c96887974eab52e2a077
SHA2562054398cce30a56bd319f124634e496c66cb250febd544c48b98f36066b39e09
SHA51246cc69dc357405f26f96a61a427f10080644a4d87cddfaa7da9623dc584f5c3e4d3b6e59eddf4f376c95372361a91cd1548d74f7d3ba17a278582f659df9402b
-
Filesize
291KB
MD5dc9c5698de530b51d104f959844a9998
SHA1a04d4f4993a70de01e19c96887974eab52e2a077
SHA2562054398cce30a56bd319f124634e496c66cb250febd544c48b98f36066b39e09
SHA51246cc69dc357405f26f96a61a427f10080644a4d87cddfaa7da9623dc584f5c3e4d3b6e59eddf4f376c95372361a91cd1548d74f7d3ba17a278582f659df9402b
-
Filesize
345KB
MD5c051256d706eaac4b1a9c3d7f47b7d71
SHA14087624ff15511706dafb21cf2eb5d587f3d7372
SHA25698231fbca50594f2b7d148e0cff4280ed5317f74d2833f8743e7652702a1e3c1
SHA512b8bfbf5f503ab5a19e9ab5ef2010240209876102b71169514f8cdc7a86cbfb5aa30b6653b3a1ef6503f89818f16f8e3595780de4d307d0acd2fffe97c6eaa304
-
Filesize
345KB
MD5c051256d706eaac4b1a9c3d7f47b7d71
SHA14087624ff15511706dafb21cf2eb5d587f3d7372
SHA25698231fbca50594f2b7d148e0cff4280ed5317f74d2833f8743e7652702a1e3c1
SHA512b8bfbf5f503ab5a19e9ab5ef2010240209876102b71169514f8cdc7a86cbfb5aa30b6653b3a1ef6503f89818f16f8e3595780de4d307d0acd2fffe97c6eaa304