Analysis
-
max time kernel
61s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:40
Static task
static1
Behavioral task
behavioral1
Sample
7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe
Resource
win10v2004-20230220-en
General
-
Target
7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe
-
Size
689KB
-
MD5
53da8b0837d56a07449c2b8d6a4d88c0
-
SHA1
542bcce2d6259b9542290aa987c1c15eea3cf18f
-
SHA256
7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1
-
SHA512
62b485527619b7d11b092459385fa92f26459c8f2e04158fb2094fcb66d1c270a51348f93e6aa728f9f6d2228279647926660356f9b17054ef3db360baf8602a
-
SSDEEP
12288:IMrKy90qVzE1pfWEoKIPyC65hLu6dv0MSKI3VMRFMK6L0JJlvUFE0fighA5/iPky:yyPtEnOE6qRfa6F0LZ3VMRFMDLslcE0t
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0955.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-191-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-193-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-190-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-195-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-197-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-200-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-204-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-207-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-209-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-211-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-213-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-215-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-217-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-219-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-221-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-223-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-225-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline behavioral1/memory/1156-227-0x0000000003B10000-0x0000000003B4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un953510.exepro0955.exequ9680.exesi839580.exepid process 4696 un953510.exe 1416 pro0955.exe 1156 qu9680.exe 4080 si839580.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0955.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0955.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exeun953510.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un953510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un953510.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4644 1416 WerFault.exe pro0955.exe 4668 1156 WerFault.exe qu9680.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0955.exequ9680.exesi839580.exepid process 1416 pro0955.exe 1416 pro0955.exe 1156 qu9680.exe 1156 qu9680.exe 4080 si839580.exe 4080 si839580.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0955.exequ9680.exesi839580.exedescription pid process Token: SeDebugPrivilege 1416 pro0955.exe Token: SeDebugPrivilege 1156 qu9680.exe Token: SeDebugPrivilege 4080 si839580.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exeun953510.exedescription pid process target process PID 4732 wrote to memory of 4696 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe un953510.exe PID 4732 wrote to memory of 4696 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe un953510.exe PID 4732 wrote to memory of 4696 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe un953510.exe PID 4696 wrote to memory of 1416 4696 un953510.exe pro0955.exe PID 4696 wrote to memory of 1416 4696 un953510.exe pro0955.exe PID 4696 wrote to memory of 1416 4696 un953510.exe pro0955.exe PID 4696 wrote to memory of 1156 4696 un953510.exe qu9680.exe PID 4696 wrote to memory of 1156 4696 un953510.exe qu9680.exe PID 4696 wrote to memory of 1156 4696 un953510.exe qu9680.exe PID 4732 wrote to memory of 4080 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe si839580.exe PID 4732 wrote to memory of 4080 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe si839580.exe PID 4732 wrote to memory of 4080 4732 7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe si839580.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe"C:\Users\Admin\AppData\Local\Temp\7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 10844⤵
- Program crash
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 18084⤵
- Program crash
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1416 -ip 14161⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1156 -ip 11561⤵PID:2252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50b8399b8fea057e6c412799fd9b0cf38
SHA136a0ebdbe1a92cb1cb1cd47b68e413440705b6d9
SHA2566c937a4399aba445f6e49240ffdb9fcb129bf7d7c000fcfb1eb190465f2d28d0
SHA51282517f918fc18f6091c20ea43397059759b113cbd99ca1a207d5bb10e19a191fd8ccc0740d0ccb6f3e12f5ea3515691a79fa5abba416cfc16f2414f378151069
-
Filesize
175KB
MD50b8399b8fea057e6c412799fd9b0cf38
SHA136a0ebdbe1a92cb1cb1cd47b68e413440705b6d9
SHA2566c937a4399aba445f6e49240ffdb9fcb129bf7d7c000fcfb1eb190465f2d28d0
SHA51282517f918fc18f6091c20ea43397059759b113cbd99ca1a207d5bb10e19a191fd8ccc0740d0ccb6f3e12f5ea3515691a79fa5abba416cfc16f2414f378151069
-
Filesize
547KB
MD5d826d5ff03b5594f18294ea4d0fbfd5c
SHA1db829b1f859a1af5fd42d82a685555c1d03d3fe1
SHA2563d083123b10cd8aaa37ab80e3e3747a62c356708a6b12f6f5cda448e3d3bd246
SHA5124c846088ffec5452019a4fed3ff98973a9023bbc1d08623394eb3f15262de82d8967a00af57e3a2bd7d470a1d41074e71accb1f5a3d826fd517e6f3d578ae23e
-
Filesize
547KB
MD5d826d5ff03b5594f18294ea4d0fbfd5c
SHA1db829b1f859a1af5fd42d82a685555c1d03d3fe1
SHA2563d083123b10cd8aaa37ab80e3e3747a62c356708a6b12f6f5cda448e3d3bd246
SHA5124c846088ffec5452019a4fed3ff98973a9023bbc1d08623394eb3f15262de82d8967a00af57e3a2bd7d470a1d41074e71accb1f5a3d826fd517e6f3d578ae23e
-
Filesize
291KB
MD5ce9be8e544fe7b5cbc76f9696c801987
SHA1c494bbd62f6194b0349ca90423b6b86a7e58c594
SHA25605db96d8ec5b0681f276bea42ec01289c04077e99f0658cd5b3da4acd5e74ac7
SHA51260a8c943c8e300c1b1634fed05562fca43c7fdeedcfaf88d15e56cc66cc356f0a368b42164f3239a473e46aa219dfe8f2f39ca3275d193f6b03f40fdcb00a583
-
Filesize
291KB
MD5ce9be8e544fe7b5cbc76f9696c801987
SHA1c494bbd62f6194b0349ca90423b6b86a7e58c594
SHA25605db96d8ec5b0681f276bea42ec01289c04077e99f0658cd5b3da4acd5e74ac7
SHA51260a8c943c8e300c1b1634fed05562fca43c7fdeedcfaf88d15e56cc66cc356f0a368b42164f3239a473e46aa219dfe8f2f39ca3275d193f6b03f40fdcb00a583
-
Filesize
345KB
MD5209700b0cfcf2824296b9141a9824489
SHA1db21d28259232a06e2b36d7856628476cea287a8
SHA256bec24756392b3e4afba43a405305910dc107b7f1076e30a6f7f3444a0068a903
SHA5125ea498c39592af81858d5d18c584efee0701361ddf3abaaa4d97f73ad7f31dc59fcec37c90b78e7a359d788452e626d8afc43d48e0ce6c8cdaefec86c1533108
-
Filesize
345KB
MD5209700b0cfcf2824296b9141a9824489
SHA1db21d28259232a06e2b36d7856628476cea287a8
SHA256bec24756392b3e4afba43a405305910dc107b7f1076e30a6f7f3444a0068a903
SHA5125ea498c39592af81858d5d18c584efee0701361ddf3abaaa4d97f73ad7f31dc59fcec37c90b78e7a359d788452e626d8afc43d48e0ce6c8cdaefec86c1533108