Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:59
Static task
static1
Behavioral task
behavioral1
Sample
7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe
Resource
win10v2004-20230220-en
General
-
Target
7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe
-
Size
690KB
-
MD5
976144baa15f6d134f36e7ab7999addc
-
SHA1
39869e76872b39a20045c7eb865a0ea3f6e82ae2
-
SHA256
7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b
-
SHA512
bf8dbc9abc3997e0c147d49106f5cf655dc00fefd4dc9831cc9b3cc03e4766a0af890ba918d368136348a14743bbb34df270b8a5f6a04d1073b58bfc13d550d3
-
SSDEEP
12288:dMrKy90i5GMTxet55mB5jvefyV65hLuNDGDuLfuKm2DwvTF59figTY5zD2IoFE:ryTgqei5jvNIfaNDGqGKtDwp59agmDjL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2848.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2848.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3112-192-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-191-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-194-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-196-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-198-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-202-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-200-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-204-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-206-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-208-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-210-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-212-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-214-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-216-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-218-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-220-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-222-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-224-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/3112-458-0x0000000006180000-0x0000000006190000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un985868.exepro2848.exequ1648.exesi538739.exepid process 2800 un985868.exe 4976 pro2848.exe 3112 qu1648.exe 748 si538739.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2848.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2848.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exeun985868.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un985868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un985868.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2572 4976 WerFault.exe pro2848.exe 4996 3112 WerFault.exe qu1648.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2848.exequ1648.exesi538739.exepid process 4976 pro2848.exe 4976 pro2848.exe 3112 qu1648.exe 3112 qu1648.exe 748 si538739.exe 748 si538739.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2848.exequ1648.exesi538739.exedescription pid process Token: SeDebugPrivilege 4976 pro2848.exe Token: SeDebugPrivilege 3112 qu1648.exe Token: SeDebugPrivilege 748 si538739.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exeun985868.exedescription pid process target process PID 5072 wrote to memory of 2800 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe un985868.exe PID 5072 wrote to memory of 2800 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe un985868.exe PID 5072 wrote to memory of 2800 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe un985868.exe PID 2800 wrote to memory of 4976 2800 un985868.exe pro2848.exe PID 2800 wrote to memory of 4976 2800 un985868.exe pro2848.exe PID 2800 wrote to memory of 4976 2800 un985868.exe pro2848.exe PID 2800 wrote to memory of 3112 2800 un985868.exe qu1648.exe PID 2800 wrote to memory of 3112 2800 un985868.exe qu1648.exe PID 2800 wrote to memory of 3112 2800 un985868.exe qu1648.exe PID 5072 wrote to memory of 748 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe si538739.exe PID 5072 wrote to memory of 748 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe si538739.exe PID 5072 wrote to memory of 748 5072 7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe si538739.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe"C:\Users\Admin\AppData\Local\Temp\7d8d56031b69768cbc7a5555ba81e484690d768df94b3e2d1a3088c5e25b507b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2848.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2848.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 10844⤵
- Program crash
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1648.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1648.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 13604⤵
- Program crash
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538739.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538739.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4976 -ip 49761⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3112 -ip 31121⤵PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56e6a058867d7eff8eadbd440ff2d25a2
SHA1252be127c729a5740c2032e51f2264b4e539b1b2
SHA2562cb3f8d36614337670a9109370eb7213895360e0556ed33d7b3c22baafbd1fb9
SHA51213f6afddc71fe45f6558e620dfa289623bc35de1fbe9f5098e9f1070a90c829b9d32376f9b8034e6413949b78f407a2867498628bccf6f46987affede8ddcf5c
-
Filesize
175KB
MD56e6a058867d7eff8eadbd440ff2d25a2
SHA1252be127c729a5740c2032e51f2264b4e539b1b2
SHA2562cb3f8d36614337670a9109370eb7213895360e0556ed33d7b3c22baafbd1fb9
SHA51213f6afddc71fe45f6558e620dfa289623bc35de1fbe9f5098e9f1070a90c829b9d32376f9b8034e6413949b78f407a2867498628bccf6f46987affede8ddcf5c
-
Filesize
548KB
MD58880243e937d30cc13622238cfde649b
SHA1c06d648a3437966561bc37921552ab5f1c243428
SHA256e8ba2fb4876384ab5c3da28f2dd24d2953e6c1061718e0aa2fba27ccf6e8d49c
SHA512d90bae5d9f615f4c6cae7aa7cd7b58d70f28466f27b9e6d25117e333523755e97c1a515543ac8737d5148c8297fce04dff739acf8b19447b23324c5b9b03ef77
-
Filesize
548KB
MD58880243e937d30cc13622238cfde649b
SHA1c06d648a3437966561bc37921552ab5f1c243428
SHA256e8ba2fb4876384ab5c3da28f2dd24d2953e6c1061718e0aa2fba27ccf6e8d49c
SHA512d90bae5d9f615f4c6cae7aa7cd7b58d70f28466f27b9e6d25117e333523755e97c1a515543ac8737d5148c8297fce04dff739acf8b19447b23324c5b9b03ef77
-
Filesize
291KB
MD5a4cda44f1bd29061597393aa813e836a
SHA178b95db178cdbd6030fcbd2e867a2bc6e0c7e0b4
SHA2560d88317cb8d15cbaf05d412108bf99bdb9d7b4c6aed2c8f1bd6716c4205c734c
SHA512da6e7f9c9147e412f913d506dcb297e9612786b50f13da039d5cecdc4106c149890bcb2cde4910c9bf62884f5692d1349c7b0e0b3cee2f36910e5cbd346255ac
-
Filesize
291KB
MD5a4cda44f1bd29061597393aa813e836a
SHA178b95db178cdbd6030fcbd2e867a2bc6e0c7e0b4
SHA2560d88317cb8d15cbaf05d412108bf99bdb9d7b4c6aed2c8f1bd6716c4205c734c
SHA512da6e7f9c9147e412f913d506dcb297e9612786b50f13da039d5cecdc4106c149890bcb2cde4910c9bf62884f5692d1349c7b0e0b3cee2f36910e5cbd346255ac
-
Filesize
345KB
MD513188a042c9776589b16fae43a5a2cce
SHA1d6e1dc13629d63e3196df8bf2b15ffd4ceacfd85
SHA256fc491ebf0a8ddebd72640aac417c5e866e3fb0028dda98dea524a364fbf0bf2d
SHA5122cd317d11386b91b560f7bf8e8aa44c97c5f971f26865a3d2e86778f947968305d27cecfb0ea9db901e945a49bcc7e719eb604b756ebb32a336011728ec76d25
-
Filesize
345KB
MD513188a042c9776589b16fae43a5a2cce
SHA1d6e1dc13629d63e3196df8bf2b15ffd4ceacfd85
SHA256fc491ebf0a8ddebd72640aac417c5e866e3fb0028dda98dea524a364fbf0bf2d
SHA5122cd317d11386b91b560f7bf8e8aa44c97c5f971f26865a3d2e86778f947968305d27cecfb0ea9db901e945a49bcc7e719eb604b756ebb32a336011728ec76d25