Analysis
-
max time kernel
140s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:31
Static task
static1
Behavioral task
behavioral1
Sample
77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe
Resource
win10v2004-20230220-en
General
-
Target
77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe
-
Size
690KB
-
MD5
953b3d97882709dfa41d87782349d007
-
SHA1
c2aa9d4e7b7f66461171fac51d5b1023e64a7414
-
SHA256
77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a
-
SHA512
fc37fb08b05771a84e1ad4d7b60748aafa61518a01e70168837c56409087d389bc3b59e615dc955f9d035533f759f2d75756a60db2dc704d459200ee36ea58e1
-
SSDEEP
12288:bMrRy90cekjOT0nkz8kVy/65hLuu3K33uSHSgQ5r865Epv1FkPfigaw3/scxYRN:Cyfe/JzQSfau3KnuuSf5rVEpnkPagaF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8487.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8487.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8487.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1096-192-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-194-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-191-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-196-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-198-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-200-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-202-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-204-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-206-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-208-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-210-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-212-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-214-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-216-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-218-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-220-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-222-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-224-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/1096-488-0x0000000003960000-0x0000000003970000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un782688.exepro8487.exequ4813.exesi246223.exepid process 3404 un782688.exe 1316 pro8487.exe 1096 qu4813.exe 3980 si246223.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8487.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8487.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exeun782688.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un782688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un782688.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 992 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2116 1316 WerFault.exe pro8487.exe 2112 1096 WerFault.exe qu4813.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8487.exequ4813.exesi246223.exepid process 1316 pro8487.exe 1316 pro8487.exe 1096 qu4813.exe 1096 qu4813.exe 3980 si246223.exe 3980 si246223.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8487.exequ4813.exesi246223.exedescription pid process Token: SeDebugPrivilege 1316 pro8487.exe Token: SeDebugPrivilege 1096 qu4813.exe Token: SeDebugPrivilege 3980 si246223.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exeun782688.exedescription pid process target process PID 4400 wrote to memory of 3404 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe un782688.exe PID 4400 wrote to memory of 3404 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe un782688.exe PID 4400 wrote to memory of 3404 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe un782688.exe PID 3404 wrote to memory of 1316 3404 un782688.exe pro8487.exe PID 3404 wrote to memory of 1316 3404 un782688.exe pro8487.exe PID 3404 wrote to memory of 1316 3404 un782688.exe pro8487.exe PID 3404 wrote to memory of 1096 3404 un782688.exe qu4813.exe PID 3404 wrote to memory of 1096 3404 un782688.exe qu4813.exe PID 3404 wrote to memory of 1096 3404 un782688.exe qu4813.exe PID 4400 wrote to memory of 3980 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe si246223.exe PID 4400 wrote to memory of 3980 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe si246223.exe PID 4400 wrote to memory of 3980 4400 77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe si246223.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe"C:\Users\Admin\AppData\Local\Temp\77683908e5cc0269a5f6b493a6a88a7da273d39312e26be4609fbd08f2eca63a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8487.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 10844⤵
- Program crash
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4813.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 13524⤵
- Program crash
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246223.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246223.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1316 -ip 13161⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1096 -ip 10961⤵PID:404
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51bbc3074d7691ecd106ccd88ed2020d8
SHA179d9f84fed0648c838addc514814bbb5bfa165d0
SHA2567bbaef0d5b4cc727f46f88951d8aaa41d3fc0008a0c3b3abe1e7b2fc43e5a940
SHA512398364e99ef9a492df921ff13f25a92c5e31d5a5c713c20e3739f3ee4269b675149f602b061295b9617418447b8e8da2e3343d008d6873eb9fc6b6781d915d5f
-
Filesize
175KB
MD51bbc3074d7691ecd106ccd88ed2020d8
SHA179d9f84fed0648c838addc514814bbb5bfa165d0
SHA2567bbaef0d5b4cc727f46f88951d8aaa41d3fc0008a0c3b3abe1e7b2fc43e5a940
SHA512398364e99ef9a492df921ff13f25a92c5e31d5a5c713c20e3739f3ee4269b675149f602b061295b9617418447b8e8da2e3343d008d6873eb9fc6b6781d915d5f
-
Filesize
548KB
MD5847b820c45934cc35eebbf59f736f5b4
SHA1dd910b395532961084ad04d30ca7fba671a54cfd
SHA256be93f8a0b99f2f9bbc7cf1c1a186eee5b6aab43d59e6b822b2f36542f17c1a71
SHA51269d1bde8c2af7cead7b2d3bc608a2e1d48214af1c703c58915a527ddcae769fc27e97ddca42228a96d284f7dd62210e68ac18464f1026c351f107e4f59e8ae18
-
Filesize
548KB
MD5847b820c45934cc35eebbf59f736f5b4
SHA1dd910b395532961084ad04d30ca7fba671a54cfd
SHA256be93f8a0b99f2f9bbc7cf1c1a186eee5b6aab43d59e6b822b2f36542f17c1a71
SHA51269d1bde8c2af7cead7b2d3bc608a2e1d48214af1c703c58915a527ddcae769fc27e97ddca42228a96d284f7dd62210e68ac18464f1026c351f107e4f59e8ae18
-
Filesize
291KB
MD516fb700ec189e3c96ef968152ac6f791
SHA15365cf5ddc0eedb83fa3c8d7148a4149e5d370ff
SHA2566fa43b4ad88cd3d78eab31a1ed57daee6814cd5341e98398e5d5730cf59add7f
SHA51285d02e8d50d90ee749b0a468e5cb947b5aa3bb750fe8b25d4e6b8656b7ab98f4d846287729cab8b2c3cc7c338dc98196a88e424099b132f1ddb2f3c94f8cd767
-
Filesize
291KB
MD516fb700ec189e3c96ef968152ac6f791
SHA15365cf5ddc0eedb83fa3c8d7148a4149e5d370ff
SHA2566fa43b4ad88cd3d78eab31a1ed57daee6814cd5341e98398e5d5730cf59add7f
SHA51285d02e8d50d90ee749b0a468e5cb947b5aa3bb750fe8b25d4e6b8656b7ab98f4d846287729cab8b2c3cc7c338dc98196a88e424099b132f1ddb2f3c94f8cd767
-
Filesize
345KB
MD5b8ddaf54f610e1cb50e47d722c2b314e
SHA15b7476513b3317909ce043e3811f016510efec72
SHA256646ecef479f7de60c1082d158f2598f161ef03296062e3b447dd94bad9934c01
SHA512d2a9d0a2e71a275b8dce0994594347ba462e61aabb358cb8027b1e442fb06fc38f53666301b6eff02ef9582f1f37c7f44898ad62a80ff5ff9cc480b1b896cfb4
-
Filesize
345KB
MD5b8ddaf54f610e1cb50e47d722c2b314e
SHA15b7476513b3317909ce043e3811f016510efec72
SHA256646ecef479f7de60c1082d158f2598f161ef03296062e3b447dd94bad9934c01
SHA512d2a9d0a2e71a275b8dce0994594347ba462e61aabb358cb8027b1e442fb06fc38f53666301b6eff02ef9582f1f37c7f44898ad62a80ff5ff9cc480b1b896cfb4