Analysis
-
max time kernel
88s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:53
Static task
static1
Behavioral task
behavioral1
Sample
b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe
Resource
win10v2004-20230220-en
General
-
Target
b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe
-
Size
688KB
-
MD5
7dd5c94fbc09d1d2d30d0e5c7ec95287
-
SHA1
b4fbe3cd26a9a8cb45e5fb17323380d0e546b174
-
SHA256
b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de
-
SHA512
fcc3c1a5a0470ba360da96da852bd373d14752aedf865ec5fcd5aaa2cdc83d349033c7be953d5dbdee219e1425f8c74fe394d8fa82bf98a16240580a675823e6
-
SSDEEP
12288:LMrhy901ZKBNG7y565hLuv9K3juSBYvs/myJc1mJ6vzFfIfigUi/Jce:WySKBwmEfalKzuoYvsVJYmJ6ZfIagPce
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2210.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/884-192-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-195-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-193-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-197-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-199-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-201-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-203-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-205-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-207-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-209-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-211-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-213-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-215-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-217-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-219-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-221-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-223-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline behavioral1/memory/884-225-0x0000000003A60000-0x0000000003A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un652299.exepro2210.exequ9986.exesi483344.exepid process 1960 un652299.exe 3860 pro2210.exe 884 qu9986.exe 3992 si483344.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2210.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2210.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exeun652299.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un652299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un652299.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5016 3860 WerFault.exe pro2210.exe 4080 884 WerFault.exe qu9986.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2210.exequ9986.exesi483344.exepid process 3860 pro2210.exe 3860 pro2210.exe 884 qu9986.exe 884 qu9986.exe 3992 si483344.exe 3992 si483344.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2210.exequ9986.exesi483344.exedescription pid process Token: SeDebugPrivilege 3860 pro2210.exe Token: SeDebugPrivilege 884 qu9986.exe Token: SeDebugPrivilege 3992 si483344.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exeun652299.exedescription pid process target process PID 3372 wrote to memory of 1960 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe un652299.exe PID 3372 wrote to memory of 1960 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe un652299.exe PID 3372 wrote to memory of 1960 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe un652299.exe PID 1960 wrote to memory of 3860 1960 un652299.exe pro2210.exe PID 1960 wrote to memory of 3860 1960 un652299.exe pro2210.exe PID 1960 wrote to memory of 3860 1960 un652299.exe pro2210.exe PID 1960 wrote to memory of 884 1960 un652299.exe qu9986.exe PID 1960 wrote to memory of 884 1960 un652299.exe qu9986.exe PID 1960 wrote to memory of 884 1960 un652299.exe qu9986.exe PID 3372 wrote to memory of 3992 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe si483344.exe PID 3372 wrote to memory of 3992 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe si483344.exe PID 3372 wrote to memory of 3992 3372 b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe si483344.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe"C:\Users\Admin\AppData\Local\Temp\b1e009b22fe6845ecc89a9ab44c5b9e705a4f7d4cfd7888922fc3aaeefd9a0de.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652299.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652299.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 10844⤵
- Program crash
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 13484⤵
- Program crash
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si483344.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si483344.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3860 -ip 38601⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 884 -ip 8841⤵PID:1068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD563766d2f0533f2b9b9138b3a7bddeb35
SHA1d2a313f076f9c94ab43fac9a387ebd6c3195526c
SHA25618189a4832da1ddfe1ef8f8ad8ec68298152d99617f86fe1eb47dece2ac7212a
SHA512a7ef5d6ba0393e5df2972f57e2150c73ff20987d6c25fff6b5321c2ce8f206597a57af531508d2544eddd91e868953c91d947e4cb9e48d1cbdfb99ec3f8a0144
-
Filesize
175KB
MD563766d2f0533f2b9b9138b3a7bddeb35
SHA1d2a313f076f9c94ab43fac9a387ebd6c3195526c
SHA25618189a4832da1ddfe1ef8f8ad8ec68298152d99617f86fe1eb47dece2ac7212a
SHA512a7ef5d6ba0393e5df2972f57e2150c73ff20987d6c25fff6b5321c2ce8f206597a57af531508d2544eddd91e868953c91d947e4cb9e48d1cbdfb99ec3f8a0144
-
Filesize
547KB
MD538c6003a9e9c0bd0590939ce733d83a0
SHA1fb55ba3675899080fe0252b7b809ba7d1333a7e1
SHA256bf528f6ca856bce4b3ab6967ae4beff69d225044b84c5fc430f417a05aea0974
SHA5120190cfcdce41455042e194510d994058c1d33175df764858c2a6aad819d26ffd927918c43af14125a1b67733581308fa2a344d1099bc5734c8f4aebb6b9e9e2c
-
Filesize
547KB
MD538c6003a9e9c0bd0590939ce733d83a0
SHA1fb55ba3675899080fe0252b7b809ba7d1333a7e1
SHA256bf528f6ca856bce4b3ab6967ae4beff69d225044b84c5fc430f417a05aea0974
SHA5120190cfcdce41455042e194510d994058c1d33175df764858c2a6aad819d26ffd927918c43af14125a1b67733581308fa2a344d1099bc5734c8f4aebb6b9e9e2c
-
Filesize
291KB
MD5822a380b176baa5695b678dd99586a0b
SHA1299a280ea387e9c298f702bc01ba40b1ed4375c2
SHA256ec52a8576b71b642016d9c6337324d4ce298062d56c9fd503e8ba7272cc7bb2c
SHA512b3b21ed630f4536bb0abec55209b21a7c8acc29f41ffb20573090942eca56643759fc2b98244d336c48c9de15e90f71882b45eae8ce4bd75bf16180a20d790e0
-
Filesize
291KB
MD5822a380b176baa5695b678dd99586a0b
SHA1299a280ea387e9c298f702bc01ba40b1ed4375c2
SHA256ec52a8576b71b642016d9c6337324d4ce298062d56c9fd503e8ba7272cc7bb2c
SHA512b3b21ed630f4536bb0abec55209b21a7c8acc29f41ffb20573090942eca56643759fc2b98244d336c48c9de15e90f71882b45eae8ce4bd75bf16180a20d790e0
-
Filesize
345KB
MD5980e2f05132a4d883bf4d67c3227891c
SHA1ba6ebc771a4f938d1444d1168b81f7cbc7dd998b
SHA256c31f9a7e81fc6f80097a79d3bf3342c81c60286396f899c3c2a8486b937b7550
SHA512e1d6d304da18d8f537cc22ff6cb7860c6541c25c114e1909d7071da59c49bd410ffffaaf9ad0039427abbcbf7d4e75a6d0331d471fe89e4b6046c70671e2433b
-
Filesize
345KB
MD5980e2f05132a4d883bf4d67c3227891c
SHA1ba6ebc771a4f938d1444d1168b81f7cbc7dd998b
SHA256c31f9a7e81fc6f80097a79d3bf3342c81c60286396f899c3c2a8486b937b7550
SHA512e1d6d304da18d8f537cc22ff6cb7860c6541c25c114e1909d7071da59c49bd410ffffaaf9ad0039427abbcbf7d4e75a6d0331d471fe89e4b6046c70671e2433b