Analysis
-
max time kernel
61s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:04
Static task
static1
Behavioral task
behavioral1
Sample
1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe
Resource
win10v2004-20230220-en
General
-
Target
1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe
-
Size
689KB
-
MD5
05bd7227c6aa4e5b88969a0f59b98299
-
SHA1
ae30d8292556992f53fbadd0f7825c67f18ec2b7
-
SHA256
1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5
-
SHA512
ac3db793d2493bdc07c0c3fd018dd919b4d206ce83589e126190f925eb270f9006614bf15278dcbf4768673ace5328a195ef2be80436c31179f76cbd2d5287e9
-
SSDEEP
12288:yMrcy90P28ctlL3Quy365hLudFZ9v+DT4Tcd2bX5jwmJZvWFYQfigFtjbwlhszfi:SyfxlzQrqfadFb+DTybXpwmJZSYQagTk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2259.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2259.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2259.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2536-191-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-192-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-194-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-196-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-198-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-200-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-202-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-204-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-206-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-208-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-210-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-212-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-214-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-216-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-218-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-220-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-222-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2536-225-0x0000000006010000-0x000000000604F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un790458.exepro2259.exequ2735.exesi476550.exepid process 1304 un790458.exe 2320 pro2259.exe 2536 qu2735.exe 1760 si476550.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2259.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2259.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exeun790458.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un790458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un790458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4780 2320 WerFault.exe pro2259.exe 3104 2536 WerFault.exe qu2735.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2259.exequ2735.exesi476550.exepid process 2320 pro2259.exe 2320 pro2259.exe 2536 qu2735.exe 2536 qu2735.exe 1760 si476550.exe 1760 si476550.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2259.exequ2735.exesi476550.exedescription pid process Token: SeDebugPrivilege 2320 pro2259.exe Token: SeDebugPrivilege 2536 qu2735.exe Token: SeDebugPrivilege 1760 si476550.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exeun790458.exedescription pid process target process PID 368 wrote to memory of 1304 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe un790458.exe PID 368 wrote to memory of 1304 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe un790458.exe PID 368 wrote to memory of 1304 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe un790458.exe PID 1304 wrote to memory of 2320 1304 un790458.exe pro2259.exe PID 1304 wrote to memory of 2320 1304 un790458.exe pro2259.exe PID 1304 wrote to memory of 2320 1304 un790458.exe pro2259.exe PID 1304 wrote to memory of 2536 1304 un790458.exe qu2735.exe PID 1304 wrote to memory of 2536 1304 un790458.exe qu2735.exe PID 1304 wrote to memory of 2536 1304 un790458.exe qu2735.exe PID 368 wrote to memory of 1760 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe si476550.exe PID 368 wrote to memory of 1760 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe si476550.exe PID 368 wrote to memory of 1760 368 1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe si476550.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe"C:\Users\Admin\AppData\Local\Temp\1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 10804⤵
- Program crash
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 13444⤵
- Program crash
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2320 -ip 23201⤵PID:488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2536 -ip 25361⤵PID:3204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57bd0b64ef415a2a7203730032e0b087b
SHA1c1c75e97ae50993cd7445480d6a8a6c1df8e90a5
SHA256ef0354b4096878fb00a737e477b8b59d7270be0645707283fc2fa9c646daff27
SHA5128f59502fd91632e3a82209efc7990d19a1f1888ef8fdfee6a8ef815fa2466dd986b5cd040399cb27c593fe0017ce227464fdc449a2ecbceeec87614acb878eb4
-
Filesize
175KB
MD57bd0b64ef415a2a7203730032e0b087b
SHA1c1c75e97ae50993cd7445480d6a8a6c1df8e90a5
SHA256ef0354b4096878fb00a737e477b8b59d7270be0645707283fc2fa9c646daff27
SHA5128f59502fd91632e3a82209efc7990d19a1f1888ef8fdfee6a8ef815fa2466dd986b5cd040399cb27c593fe0017ce227464fdc449a2ecbceeec87614acb878eb4
-
Filesize
547KB
MD5a0efebefd5fa261ae0a913e23e45db39
SHA1076553bf1812eaaa101be1445d04d12193400925
SHA25660e468f858230a724bc845475586b08b9b5683333f4c20f558d08cfb21eabdb2
SHA5126380ef8ca5da1a03129b5b0c3a22d0b1396d571675efd0a7e786944efa3eb46996dc7f3c8a75e11d21ddb03c23a9b85b9254d1f0c8e8236901eebd94b7ecc877
-
Filesize
547KB
MD5a0efebefd5fa261ae0a913e23e45db39
SHA1076553bf1812eaaa101be1445d04d12193400925
SHA25660e468f858230a724bc845475586b08b9b5683333f4c20f558d08cfb21eabdb2
SHA5126380ef8ca5da1a03129b5b0c3a22d0b1396d571675efd0a7e786944efa3eb46996dc7f3c8a75e11d21ddb03c23a9b85b9254d1f0c8e8236901eebd94b7ecc877
-
Filesize
291KB
MD5d87fa69459c1fc331d440ed8ade8a984
SHA10498a805151233b89315d698a559b98870a328d7
SHA256966baf754eddaaf30f27ff48566c405d6c7fd0998ed37728281a8a281c190d91
SHA5126709af97a47c61800df3d843c67ff5e60e183b6aea11e1888903a50ecca3db17d395bd53b00342e651a205a2beb946236879934ddd8d030c68e73b3ef1a90274
-
Filesize
291KB
MD5d87fa69459c1fc331d440ed8ade8a984
SHA10498a805151233b89315d698a559b98870a328d7
SHA256966baf754eddaaf30f27ff48566c405d6c7fd0998ed37728281a8a281c190d91
SHA5126709af97a47c61800df3d843c67ff5e60e183b6aea11e1888903a50ecca3db17d395bd53b00342e651a205a2beb946236879934ddd8d030c68e73b3ef1a90274
-
Filesize
345KB
MD565bb4da3ec5d80e7844382a237fbed3d
SHA17b8591518e9728a9372bc50fbe6e09b1e863da13
SHA25608bcd0f5a7f4a53cb9b7d69be827b51279bc1e028dec54394ca5f2211b4d3d56
SHA51296d70cb46f6ff49570efc74e26d886e615d9753b9f2278145e3fdcd6aeb5de044d84ef63274da4cf27c9cf043c7c754e54f500967c7cb5fb09bf228e2249fdba
-
Filesize
345KB
MD565bb4da3ec5d80e7844382a237fbed3d
SHA17b8591518e9728a9372bc50fbe6e09b1e863da13
SHA25608bcd0f5a7f4a53cb9b7d69be827b51279bc1e028dec54394ca5f2211b4d3d56
SHA51296d70cb46f6ff49570efc74e26d886e615d9753b9f2278145e3fdcd6aeb5de044d84ef63274da4cf27c9cf043c7c754e54f500967c7cb5fb09bf228e2249fdba