Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:01
Static task
static1
Behavioral task
behavioral1
Sample
f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe
Resource
win10v2004-20230220-en
General
-
Target
f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe
-
Size
690KB
-
MD5
17d6b404e2f5dccb488b088fd8fc106a
-
SHA1
7d1974f54a7182e7edf6b89276e9cbe875d40c73
-
SHA256
f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d
-
SHA512
31758c1c9664b25bda4ad9730df95e237360feef11ed8e4014bf7ea1557f1beff9b7fd5f4b67ac06ac626f64f44ef4f17928a5998abde0ae58f6af15acae18ac
-
SSDEEP
12288:nMrmy904jqExL59ZnaeCyz65hLuigpJEK3nuSlI4HwMv1FhIfigP/igOtigl10:9ydxznawefarfEKXuEDnhIagROf10
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7152.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7152.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7152.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3184-191-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-192-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-194-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-196-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-198-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-200-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-202-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-204-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-206-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-208-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-210-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-212-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-216-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-220-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-222-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-224-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-226-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline behavioral1/memory/3184-228-0x0000000003AC0000-0x0000000003AFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un511036.exepro7152.exequ9241.exesi361147.exepid process 3016 un511036.exe 4928 pro7152.exe 3184 qu9241.exe 1968 si361147.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7152.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7152.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exeun511036.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un511036.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un511036.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3616 4928 WerFault.exe pro7152.exe 3236 3184 WerFault.exe qu9241.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7152.exequ9241.exesi361147.exepid process 4928 pro7152.exe 4928 pro7152.exe 3184 qu9241.exe 3184 qu9241.exe 1968 si361147.exe 1968 si361147.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7152.exequ9241.exesi361147.exedescription pid process Token: SeDebugPrivilege 4928 pro7152.exe Token: SeDebugPrivilege 3184 qu9241.exe Token: SeDebugPrivilege 1968 si361147.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exeun511036.exedescription pid process target process PID 5028 wrote to memory of 3016 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe un511036.exe PID 5028 wrote to memory of 3016 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe un511036.exe PID 5028 wrote to memory of 3016 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe un511036.exe PID 3016 wrote to memory of 4928 3016 un511036.exe pro7152.exe PID 3016 wrote to memory of 4928 3016 un511036.exe pro7152.exe PID 3016 wrote to memory of 4928 3016 un511036.exe pro7152.exe PID 3016 wrote to memory of 3184 3016 un511036.exe qu9241.exe PID 3016 wrote to memory of 3184 3016 un511036.exe qu9241.exe PID 3016 wrote to memory of 3184 3016 un511036.exe qu9241.exe PID 5028 wrote to memory of 1968 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe si361147.exe PID 5028 wrote to memory of 1968 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe si361147.exe PID 5028 wrote to memory of 1968 5028 f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe si361147.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe"C:\Users\Admin\AppData\Local\Temp\f0281207d8c948d364f27c6bab5f80e32715ab0e230cc60d24854fd862f4197d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511036.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511036.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7152.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10364⤵
- Program crash
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9241.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9241.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 13284⤵
- Program crash
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361147.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4928 -ip 49281⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3184 -ip 31841⤵PID:2744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59cd4a22264c7cbab7e4771c31766b275
SHA17ab1a51d165a65af07eb9d76af4469a9ff1851bf
SHA2569eb5a34d2189b9841cf56afab760e0f8ce853eaf957025c97c1ec1db804d9966
SHA5120937e199b688133fa2949b2673989ad8369de5dfd9089284ebe20ed25000d3e378bf8d3e78ca896cbbfc13bc55200a4580ac93b6cd375a128546dbdb02bc0e84
-
Filesize
175KB
MD59cd4a22264c7cbab7e4771c31766b275
SHA17ab1a51d165a65af07eb9d76af4469a9ff1851bf
SHA2569eb5a34d2189b9841cf56afab760e0f8ce853eaf957025c97c1ec1db804d9966
SHA5120937e199b688133fa2949b2673989ad8369de5dfd9089284ebe20ed25000d3e378bf8d3e78ca896cbbfc13bc55200a4580ac93b6cd375a128546dbdb02bc0e84
-
Filesize
548KB
MD5d0e903f21f9a24fbb14bcfa2511d0447
SHA10bd258c5e1ce892c84a2d209db38d025f156a74e
SHA25696226757125a108f6a1de23abf6b9fb907f4e10bb7d53674da6a6e067839f50b
SHA5122a808789e99ba77f0941a07546df62091be73506b58397648733e956496876677763ff2aa2bcfec6ebd1e17b5bae82a6c92f6067f45e2a4ef9814e9d3e248d3b
-
Filesize
548KB
MD5d0e903f21f9a24fbb14bcfa2511d0447
SHA10bd258c5e1ce892c84a2d209db38d025f156a74e
SHA25696226757125a108f6a1de23abf6b9fb907f4e10bb7d53674da6a6e067839f50b
SHA5122a808789e99ba77f0941a07546df62091be73506b58397648733e956496876677763ff2aa2bcfec6ebd1e17b5bae82a6c92f6067f45e2a4ef9814e9d3e248d3b
-
Filesize
291KB
MD58435f962aedf3fb3fd9a047217ac847e
SHA10f22f35ee17b15f6ff91c00620016d1a86aec8c1
SHA2565a4aade82140e574354b7f40684094abbc9443cadfe0b61f2756c5b168171082
SHA512d8ce15d201b4f8fc11ed0af4b0cbb4c44ff9dfbaab89b5c8f3c9be333c7ad6d64fec3d3b670c60cf2d7857f2389b3024298b0ea2e72d00797b93a858a1be5258
-
Filesize
291KB
MD58435f962aedf3fb3fd9a047217ac847e
SHA10f22f35ee17b15f6ff91c00620016d1a86aec8c1
SHA2565a4aade82140e574354b7f40684094abbc9443cadfe0b61f2756c5b168171082
SHA512d8ce15d201b4f8fc11ed0af4b0cbb4c44ff9dfbaab89b5c8f3c9be333c7ad6d64fec3d3b670c60cf2d7857f2389b3024298b0ea2e72d00797b93a858a1be5258
-
Filesize
345KB
MD579e4edc2aab9a6035f308bd4b5e9a8ba
SHA13ca08ed457d596d2e75187db933ad1eabeafcc19
SHA25631be18365256224d0ede0e8147615a713929a059a12f1a2fbabc46097cfaee58
SHA5124329c8d7a176bb9207cac5d1274a19c22b669938c030abeed33a450576851dd6542adb6c4562dfc8af6e87bdcb89bd8ba96abb77a2ca33886689e61baf896700
-
Filesize
345KB
MD579e4edc2aab9a6035f308bd4b5e9a8ba
SHA13ca08ed457d596d2e75187db933ad1eabeafcc19
SHA25631be18365256224d0ede0e8147615a713929a059a12f1a2fbabc46097cfaee58
SHA5124329c8d7a176bb9207cac5d1274a19c22b669938c030abeed33a450576851dd6542adb6c4562dfc8af6e87bdcb89bd8ba96abb77a2ca33886689e61baf896700