Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:36
Static task
static1
Behavioral task
behavioral1
Sample
7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe
Resource
win10v2004-20230221-en
General
-
Target
7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe
-
Size
689KB
-
MD5
679832fee75ba157dc54a23641ec741e
-
SHA1
cb8594cb8d3e2b5a20e065bb04b6859e2534f076
-
SHA256
7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20
-
SHA512
8bf2213b226878f91702181de07b710731a2fc0192b5f7a26307274aef85549226f37bb37c71c9709a449b5bb2b75583435af02e610358554d8295fb328a8e97
-
SSDEEP
12288:1Mrsy90XWPivKiqYLm1ys65hLujDK34uSll4+KvmFa1fig4/PgOVSmjaA6:Ry6wYSczfajDKIuElGya1agbOVxad
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4725.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4725.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-190-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-193-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-191-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-195-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-197-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-202-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-205-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-207-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-211-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-209-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-213-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-215-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-217-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-219-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-221-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-223-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-225-0x0000000006050000-0x000000000608F000-memory.dmp family_redline behavioral1/memory/1392-227-0x0000000006050000-0x000000000608F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un266883.exepro4725.exequ4922.exesi636661.exepid process 2128 un266883.exe 3744 pro4725.exe 1392 qu4922.exe 1844 si636661.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4725.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4725.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exeun266883.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un266883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un266883.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1624 3744 WerFault.exe pro4725.exe 3100 1392 WerFault.exe qu4922.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4725.exequ4922.exesi636661.exepid process 3744 pro4725.exe 3744 pro4725.exe 1392 qu4922.exe 1392 qu4922.exe 1844 si636661.exe 1844 si636661.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4725.exequ4922.exesi636661.exedescription pid process Token: SeDebugPrivilege 3744 pro4725.exe Token: SeDebugPrivilege 1392 qu4922.exe Token: SeDebugPrivilege 1844 si636661.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exeun266883.exedescription pid process target process PID 4264 wrote to memory of 2128 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe un266883.exe PID 4264 wrote to memory of 2128 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe un266883.exe PID 4264 wrote to memory of 2128 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe un266883.exe PID 2128 wrote to memory of 3744 2128 un266883.exe pro4725.exe PID 2128 wrote to memory of 3744 2128 un266883.exe pro4725.exe PID 2128 wrote to memory of 3744 2128 un266883.exe pro4725.exe PID 2128 wrote to memory of 1392 2128 un266883.exe qu4922.exe PID 2128 wrote to memory of 1392 2128 un266883.exe qu4922.exe PID 2128 wrote to memory of 1392 2128 un266883.exe qu4922.exe PID 4264 wrote to memory of 1844 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe si636661.exe PID 4264 wrote to memory of 1844 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe si636661.exe PID 4264 wrote to memory of 1844 4264 7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe si636661.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe"C:\Users\Admin\AppData\Local\Temp\7f03eb3b45faca426854d7bd2bd747edc59373f9fe6e609a53b79fb8a81dcc20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un266883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4725.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 10804⤵
- Program crash
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4922.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 13484⤵
- Program crash
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636661.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3744 -ip 37441⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1392 -ip 13921⤵PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a05b4e3e79a7193e0c2b1ac4f608a6b3
SHA1f7baaf9eee23a8526c23531ea99385577ef6d32b
SHA2565ee947657f1559bda79c26e0d5764bcae90c985ad8e369892a2c9b1076ca5f9c
SHA5127e53bfd3190aa295b232d594aef8fc1736bf6fee1dbf9b3d2b8bf5fc8964b10ba17080c539bccbb81ce8bf08f94ea2a7c0fc2dc513fadc0cdfc198e64cbdfb0b
-
Filesize
175KB
MD5a05b4e3e79a7193e0c2b1ac4f608a6b3
SHA1f7baaf9eee23a8526c23531ea99385577ef6d32b
SHA2565ee947657f1559bda79c26e0d5764bcae90c985ad8e369892a2c9b1076ca5f9c
SHA5127e53bfd3190aa295b232d594aef8fc1736bf6fee1dbf9b3d2b8bf5fc8964b10ba17080c539bccbb81ce8bf08f94ea2a7c0fc2dc513fadc0cdfc198e64cbdfb0b
-
Filesize
548KB
MD5301ed3f4e685bef1b54138fe9174ff2e
SHA1340722137cbdc2ed40e972a64826e92ee5966e50
SHA256c776dd944f5ab947b903d01d1f6e14e614dd5815deb936855193a61880b3898b
SHA512a05d2f517f509fcd7ce9aa0ec220b171b7322486f99f5535fb385d8d28a277a7a60408ca4745b3360a51deeddadff2c3009ff3e7ba857a8bacdc0fb6b32719af
-
Filesize
548KB
MD5301ed3f4e685bef1b54138fe9174ff2e
SHA1340722137cbdc2ed40e972a64826e92ee5966e50
SHA256c776dd944f5ab947b903d01d1f6e14e614dd5815deb936855193a61880b3898b
SHA512a05d2f517f509fcd7ce9aa0ec220b171b7322486f99f5535fb385d8d28a277a7a60408ca4745b3360a51deeddadff2c3009ff3e7ba857a8bacdc0fb6b32719af
-
Filesize
291KB
MD5ade708e165ae4f308e4237304fe31444
SHA1e2b4650c6c2e0135f9c4b0bac5581c2ad688867f
SHA2565fc89caa3f779df331887419a85b49dc0894bded6e8e71723937b9c697bade34
SHA512480191bd86fb8df54a7a672604d2d334636b76ce6a6d27523224de9a02eb03476f77c3056d638ea1b15832b778a3b44eaac7710180316d179cda063a5453e669
-
Filesize
291KB
MD5ade708e165ae4f308e4237304fe31444
SHA1e2b4650c6c2e0135f9c4b0bac5581c2ad688867f
SHA2565fc89caa3f779df331887419a85b49dc0894bded6e8e71723937b9c697bade34
SHA512480191bd86fb8df54a7a672604d2d334636b76ce6a6d27523224de9a02eb03476f77c3056d638ea1b15832b778a3b44eaac7710180316d179cda063a5453e669
-
Filesize
345KB
MD5a39ab8276ec46891cb2d9249f2e75fea
SHA17e1073f28488b5bc59c2c734c61a811df0db0e69
SHA256d00ca09f0807e88e215deb83c5e89502e8fd4ba76e54452355225775485d6665
SHA5120d4a10ecad056542a04476b910126966c5fe8579a2c96102911e9623a4dfcaac4e479e84fcb681c4a45625a2cfbee8a9f363461e334a9d99bef073dc98d79658
-
Filesize
345KB
MD5a39ab8276ec46891cb2d9249f2e75fea
SHA17e1073f28488b5bc59c2c734c61a811df0db0e69
SHA256d00ca09f0807e88e215deb83c5e89502e8fd4ba76e54452355225775485d6665
SHA5120d4a10ecad056542a04476b910126966c5fe8579a2c96102911e9623a4dfcaac4e479e84fcb681c4a45625a2cfbee8a9f363461e334a9d99bef073dc98d79658