Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:55
Static task
static1
Behavioral task
behavioral1
Sample
e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe
Resource
win10v2004-20230220-en
General
-
Target
e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe
-
Size
689KB
-
MD5
400ea411325269f0407b510eb0501862
-
SHA1
49c2cf1ff2c2f981d99d1f4d2b92a140d4a94df5
-
SHA256
e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f
-
SHA512
0616aebc924f3d1a201416e35a2109acaa3b8df3d2fe14b61e97897441c0365d7511a0883a9f4d50d97163906daa877d0c858072a15a500a6c94ea148fda26a0
-
SSDEEP
12288:WMr/y901Pl3zyvLh3qx8Z1y865hLudcRx11F7nMzX3jDdY3mJxv1Fr7figGwWnx9:dyuDyjtqx8ZcjfaeRx17Mznj6mJxnr7U
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9701.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9701.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9701.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1096-192-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-194-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-191-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-196-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-198-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-200-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-202-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-204-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-208-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-212-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-214-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-216-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-218-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-220-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-222-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-224-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-226-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-228-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/1096-1110-0x00000000039F0000-0x0000000003A00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un907578.exepro9701.exequ8202.exesi695676.exepid process 3812 un907578.exe 1056 pro9701.exe 1096 qu8202.exe 4116 si695676.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9701.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9701.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un907578.exee08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un907578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un907578.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4436 1056 WerFault.exe pro9701.exe 2112 1096 WerFault.exe qu8202.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9701.exequ8202.exesi695676.exepid process 1056 pro9701.exe 1056 pro9701.exe 1096 qu8202.exe 1096 qu8202.exe 4116 si695676.exe 4116 si695676.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9701.exequ8202.exesi695676.exedescription pid process Token: SeDebugPrivilege 1056 pro9701.exe Token: SeDebugPrivilege 1096 qu8202.exe Token: SeDebugPrivilege 4116 si695676.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exeun907578.exedescription pid process target process PID 920 wrote to memory of 3812 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe un907578.exe PID 920 wrote to memory of 3812 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe un907578.exe PID 920 wrote to memory of 3812 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe un907578.exe PID 3812 wrote to memory of 1056 3812 un907578.exe pro9701.exe PID 3812 wrote to memory of 1056 3812 un907578.exe pro9701.exe PID 3812 wrote to memory of 1056 3812 un907578.exe pro9701.exe PID 3812 wrote to memory of 1096 3812 un907578.exe qu8202.exe PID 3812 wrote to memory of 1096 3812 un907578.exe qu8202.exe PID 3812 wrote to memory of 1096 3812 un907578.exe qu8202.exe PID 920 wrote to memory of 4116 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe si695676.exe PID 920 wrote to memory of 4116 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe si695676.exe PID 920 wrote to memory of 4116 920 e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe si695676.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe"C:\Users\Admin\AppData\Local\Temp\e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10844⤵
- Program crash
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 13484⤵
- Program crash
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1056 -ip 10561⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1096 -ip 10961⤵PID:1320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57ab0820cd6e165784091662dc4ea9775
SHA18b078b8895cf572964061eea039b09bebec59440
SHA256628aac29a512eb3aa8a417988538a3a23558c88407fb6fec9df37b0927c94c0b
SHA512f1e3343d4c8d1598310b7c62d599f2f0de63c57ae8650209a918ee9c36af4908c949451b3e6f8d8d481642dce27def72b90633915d628fcefb48627c592adcfd
-
Filesize
175KB
MD57ab0820cd6e165784091662dc4ea9775
SHA18b078b8895cf572964061eea039b09bebec59440
SHA256628aac29a512eb3aa8a417988538a3a23558c88407fb6fec9df37b0927c94c0b
SHA512f1e3343d4c8d1598310b7c62d599f2f0de63c57ae8650209a918ee9c36af4908c949451b3e6f8d8d481642dce27def72b90633915d628fcefb48627c592adcfd
-
Filesize
547KB
MD54578aed117e89e6c5f5c06fd719429d8
SHA1633a04879a376f8dabec268f14020b37aeb9db80
SHA256b3d3057e881301f71a5275e3674062bf9df4ce6d0dfe3e0ce58945ed7b399583
SHA5128071b795a649f3436c2e03664dc05bb2762e5ec5f50200abea2ae7ccf0af9f76199ae80c5b75d5941115b6d5e23e664525785fded45b6caf4e301ca72fd9c864
-
Filesize
547KB
MD54578aed117e89e6c5f5c06fd719429d8
SHA1633a04879a376f8dabec268f14020b37aeb9db80
SHA256b3d3057e881301f71a5275e3674062bf9df4ce6d0dfe3e0ce58945ed7b399583
SHA5128071b795a649f3436c2e03664dc05bb2762e5ec5f50200abea2ae7ccf0af9f76199ae80c5b75d5941115b6d5e23e664525785fded45b6caf4e301ca72fd9c864
-
Filesize
291KB
MD598683ab4bc2c17058f8578c248d277bf
SHA18a77f751b412cc04f4e0368de4f6882704319363
SHA2560d97bbd42f86c8fd6abe37bc13d75630bc90498278c1e984c671fb0bffdb902b
SHA512282538b85373cba3794f818978baec8fa47adef1ab3c51772c0b08c3a024728734a1d4ab4415bab7154c6248ff98b2344562768e76ac9bc7fe3a273b7baeafbc
-
Filesize
291KB
MD598683ab4bc2c17058f8578c248d277bf
SHA18a77f751b412cc04f4e0368de4f6882704319363
SHA2560d97bbd42f86c8fd6abe37bc13d75630bc90498278c1e984c671fb0bffdb902b
SHA512282538b85373cba3794f818978baec8fa47adef1ab3c51772c0b08c3a024728734a1d4ab4415bab7154c6248ff98b2344562768e76ac9bc7fe3a273b7baeafbc
-
Filesize
345KB
MD53b10cbba19e358c3b2372ec9722fb503
SHA1cc6335f3fd7a931894c3d66668e84295ba22c5dc
SHA256447bf73d360315ea2fbfe15bbafb16ebcb0982a00767f1e735e1e5410c5efdb6
SHA512a681e33fb0887530c90a68bb9b90712cf7b3b84c9a63e42996ec1f326463a8b31fbcfa12a431926a1993b90fcf20701a6bd70f7d58b2c44b063be0de56e81cc8
-
Filesize
345KB
MD53b10cbba19e358c3b2372ec9722fb503
SHA1cc6335f3fd7a931894c3d66668e84295ba22c5dc
SHA256447bf73d360315ea2fbfe15bbafb16ebcb0982a00767f1e735e1e5410c5efdb6
SHA512a681e33fb0887530c90a68bb9b90712cf7b3b84c9a63e42996ec1f326463a8b31fbcfa12a431926a1993b90fcf20701a6bd70f7d58b2c44b063be0de56e81cc8