Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:33
Static task
static1
Behavioral task
behavioral1
Sample
1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe
Resource
win10v2004-20230220-en
General
-
Target
1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe
-
Size
688KB
-
MD5
f512cb02b5dec6a85650deb4fc67b0d9
-
SHA1
12581df072761537e742f552ad821df245ec1415
-
SHA256
1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778
-
SHA512
a6a60cbaddb7b12003be259eb81b68572a7b503ea601c0aa14a4c31a661fe2fc138e782c61e9df0af03f1b59a9ef7425342deedd508b4a975c76c83af59bd1c2
-
SSDEEP
12288:WMrOy909EHIHwRdTeEPEL0KS3Hfyu65hLuGoLb0CYvlWakutKdmJvvGFNIfigwA0:sy7HIHaAk+Y61fapPDIlWak7dmJvSNIg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5236.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5236.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5236.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1556-191-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-192-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-194-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-196-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-198-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-200-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-202-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-204-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-206-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-209-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-212-0x0000000006110000-0x0000000006120000-memory.dmp family_redline behavioral1/memory/1556-213-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-216-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-218-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-220-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-222-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-224-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-226-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline behavioral1/memory/1556-228-0x0000000003BB0000-0x0000000003BEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un741506.exepro5236.exequ9834.exesi060600.exepid process 1488 un741506.exe 4520 pro5236.exe 1556 qu9834.exe 5052 si060600.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5236.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5236.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5236.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exeun741506.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un741506.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un741506.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5080 4520 WerFault.exe pro5236.exe 4944 1556 WerFault.exe qu9834.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5236.exequ9834.exesi060600.exepid process 4520 pro5236.exe 4520 pro5236.exe 1556 qu9834.exe 1556 qu9834.exe 5052 si060600.exe 5052 si060600.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5236.exequ9834.exesi060600.exedescription pid process Token: SeDebugPrivilege 4520 pro5236.exe Token: SeDebugPrivilege 1556 qu9834.exe Token: SeDebugPrivilege 5052 si060600.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exeun741506.exedescription pid process target process PID 4244 wrote to memory of 1488 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe un741506.exe PID 4244 wrote to memory of 1488 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe un741506.exe PID 4244 wrote to memory of 1488 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe un741506.exe PID 1488 wrote to memory of 4520 1488 un741506.exe pro5236.exe PID 1488 wrote to memory of 4520 1488 un741506.exe pro5236.exe PID 1488 wrote to memory of 4520 1488 un741506.exe pro5236.exe PID 1488 wrote to memory of 1556 1488 un741506.exe qu9834.exe PID 1488 wrote to memory of 1556 1488 un741506.exe qu9834.exe PID 1488 wrote to memory of 1556 1488 un741506.exe qu9834.exe PID 4244 wrote to memory of 5052 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe si060600.exe PID 4244 wrote to memory of 5052 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe si060600.exe PID 4244 wrote to memory of 5052 4244 1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe si060600.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe"C:\Users\Admin\AppData\Local\Temp\1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 10804⤵
- Program crash
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 13284⤵
- Program crash
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4520 -ip 45201⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1556 -ip 15561⤵PID:908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50782fdfd25ec498331ed4be69af2da77
SHA12662259f96f60b99c72ea2aa2f62e65b254aa738
SHA256eefaaca6ef5c6feb21111ce87a9483a126e55566d42d5291f51072f45c994f37
SHA51292adf5d267d25060c8e256c6153671607219a7719aa8c69c480668634749fea649b46cd315f708b8ceb2f1d8044a82f86f83a21b98dd7c5cf73d70aefb23b673
-
Filesize
175KB
MD50782fdfd25ec498331ed4be69af2da77
SHA12662259f96f60b99c72ea2aa2f62e65b254aa738
SHA256eefaaca6ef5c6feb21111ce87a9483a126e55566d42d5291f51072f45c994f37
SHA51292adf5d267d25060c8e256c6153671607219a7719aa8c69c480668634749fea649b46cd315f708b8ceb2f1d8044a82f86f83a21b98dd7c5cf73d70aefb23b673
-
Filesize
547KB
MD538942ed647966139df59d55976fc3bb2
SHA16f794775747cb151bfd5c176f63b95e4190f6a9a
SHA2563d2d216db8b6cc38cbf1976613b655b36cff090a8c37fc14e0d35380963b08e3
SHA512e413494e927dfeecd1630fe52b998ebdf3fc3ee732835acd25a1bdda5a2203444cd1909586b6263ea93775639676d33d97d5b0a2212b6e73fcf5f4fea3a21cca
-
Filesize
547KB
MD538942ed647966139df59d55976fc3bb2
SHA16f794775747cb151bfd5c176f63b95e4190f6a9a
SHA2563d2d216db8b6cc38cbf1976613b655b36cff090a8c37fc14e0d35380963b08e3
SHA512e413494e927dfeecd1630fe52b998ebdf3fc3ee732835acd25a1bdda5a2203444cd1909586b6263ea93775639676d33d97d5b0a2212b6e73fcf5f4fea3a21cca
-
Filesize
291KB
MD52382f9d8ee4d02f6c02384c461045a96
SHA1a0cf995e4315f581d637d85df713b408994d6736
SHA256530d67e57e8bbe63aeb502f0c811a8fd8a707219b0f0f0ae11c1bc1c0732afc8
SHA5126f3823e12a02a9d0971c7a8b121d172128ead58e9eb4ac1344e814c6a5e4aa883b4ec3da3259250f904ff4b218951df71968e50e42425aca413676ab4a377936
-
Filesize
291KB
MD52382f9d8ee4d02f6c02384c461045a96
SHA1a0cf995e4315f581d637d85df713b408994d6736
SHA256530d67e57e8bbe63aeb502f0c811a8fd8a707219b0f0f0ae11c1bc1c0732afc8
SHA5126f3823e12a02a9d0971c7a8b121d172128ead58e9eb4ac1344e814c6a5e4aa883b4ec3da3259250f904ff4b218951df71968e50e42425aca413676ab4a377936
-
Filesize
345KB
MD5ff67e130b6d70b2883c7f60f37d134ff
SHA1f48375438d3724a25b06f88c9fec7cbb56810fab
SHA2564edf96b78713c72114987d50d05eeffca11e604e123e30cb185b8e81879f8428
SHA512c9a030656c6452757c2e7e8b31cbb72a71e9c719ff060f7b1c1df397beacdfdc6b4eea166c09a01e7f67c359b49506954d55184ce8452b81a534b2c30b215abf
-
Filesize
345KB
MD5ff67e130b6d70b2883c7f60f37d134ff
SHA1f48375438d3724a25b06f88c9fec7cbb56810fab
SHA2564edf96b78713c72114987d50d05eeffca11e604e123e30cb185b8e81879f8428
SHA512c9a030656c6452757c2e7e8b31cbb72a71e9c719ff060f7b1c1df397beacdfdc6b4eea166c09a01e7f67c359b49506954d55184ce8452b81a534b2c30b215abf