Analysis
-
max time kernel
82s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:19
Static task
static1
Behavioral task
behavioral1
Sample
2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe
Resource
win10v2004-20230220-en
General
-
Target
2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe
-
Size
690KB
-
MD5
05f309cc7504cf51dec55582df4209af
-
SHA1
0b5371317efb0579d713fc1983805ebe942bce7a
-
SHA256
2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a
-
SHA512
a7f83b2799d700d8cacc068671af7d29f4f1e9a4244476fdc51a6f25c98ff02020862b5ec3ec83b839161bfcd7fef3c589948339485b8dada82071c6421355f9
-
SSDEEP
12288:oMrcy902bUKS7E0sI7yT65hLu0r2AQ1n9vhFHIfigfTKuFYS/uuD+g04/:UyNQKSAZB+fa0F89THIagf3/uuDjr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2751.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2751.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2751.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3356-190-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-191-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-193-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-195-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-197-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-199-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-201-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-203-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-205-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-211-0x0000000006180000-0x0000000006190000-memory.dmp family_redline behavioral1/memory/3356-210-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-215-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-213-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-219-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-223-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-221-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-225-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-217-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-227-0x0000000003AD0000-0x0000000003B0F000-memory.dmp family_redline behavioral1/memory/3356-1111-0x0000000006180000-0x0000000006190000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un461777.exepro2751.exequ5098.exesi437304.exepid process 1160 un461777.exe 680 pro2751.exe 3356 qu5098.exe 4656 si437304.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2751.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2751.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exeun461777.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un461777.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un461777.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 720 680 WerFault.exe pro2751.exe 2648 3356 WerFault.exe qu5098.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2751.exequ5098.exesi437304.exepid process 680 pro2751.exe 680 pro2751.exe 3356 qu5098.exe 3356 qu5098.exe 4656 si437304.exe 4656 si437304.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2751.exequ5098.exesi437304.exedescription pid process Token: SeDebugPrivilege 680 pro2751.exe Token: SeDebugPrivilege 3356 qu5098.exe Token: SeDebugPrivilege 4656 si437304.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exeun461777.exedescription pid process target process PID 1764 wrote to memory of 1160 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe un461777.exe PID 1764 wrote to memory of 1160 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe un461777.exe PID 1764 wrote to memory of 1160 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe un461777.exe PID 1160 wrote to memory of 680 1160 un461777.exe pro2751.exe PID 1160 wrote to memory of 680 1160 un461777.exe pro2751.exe PID 1160 wrote to memory of 680 1160 un461777.exe pro2751.exe PID 1160 wrote to memory of 3356 1160 un461777.exe qu5098.exe PID 1160 wrote to memory of 3356 1160 un461777.exe qu5098.exe PID 1160 wrote to memory of 3356 1160 un461777.exe qu5098.exe PID 1764 wrote to memory of 4656 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe si437304.exe PID 1764 wrote to memory of 4656 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe si437304.exe PID 1764 wrote to memory of 4656 1764 2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe si437304.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe"C:\Users\Admin\AppData\Local\Temp\2a2dbff7f06b42495db5e10516cf30a9fd13ad9ec781f3d18446c510ef21326a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461777.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461777.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2751.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 10884⤵
- Program crash
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5098.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5098.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 13564⤵
- Program crash
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si437304.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 680 -ip 6801⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3356 -ip 33561⤵PID:1404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f3fac6a85748e59ab1eae169fb10f7a8
SHA1a6426ac2f58db354d760bc8d14ec21c608b2af4d
SHA2561a5024a221e5a7558a3b0d4da7fd828d4934604fac91580f63c01b85b3ddea0d
SHA512b92e2867f61d6300f0dfbbb642e202591a8289d9f1fc6c709cc7cbc944c199d4fd1c65a261a408c97cd8efcfa29dd77581bfac05264ce0c2ae5d5e384ddafd72
-
Filesize
175KB
MD5f3fac6a85748e59ab1eae169fb10f7a8
SHA1a6426ac2f58db354d760bc8d14ec21c608b2af4d
SHA2561a5024a221e5a7558a3b0d4da7fd828d4934604fac91580f63c01b85b3ddea0d
SHA512b92e2867f61d6300f0dfbbb642e202591a8289d9f1fc6c709cc7cbc944c199d4fd1c65a261a408c97cd8efcfa29dd77581bfac05264ce0c2ae5d5e384ddafd72
-
Filesize
548KB
MD58ee046b960f412dc63ab2909af595c0d
SHA1fe3dbc83b73cf7329acb40a36391a86ef161e8df
SHA256c77df063c056ea4c9024ab039a2efbda1586ec402df0f5a82fd388e48a3e17f7
SHA51262deb5d90c9255a8a5c7e3c81fc75acdb2f5898dc5576428a9c3c32baff90c983ebe81f76fe9a0905db951ebdbcaf547edaf667ade011dff134443aa35f2cbf6
-
Filesize
548KB
MD58ee046b960f412dc63ab2909af595c0d
SHA1fe3dbc83b73cf7329acb40a36391a86ef161e8df
SHA256c77df063c056ea4c9024ab039a2efbda1586ec402df0f5a82fd388e48a3e17f7
SHA51262deb5d90c9255a8a5c7e3c81fc75acdb2f5898dc5576428a9c3c32baff90c983ebe81f76fe9a0905db951ebdbcaf547edaf667ade011dff134443aa35f2cbf6
-
Filesize
291KB
MD5f979536a7188b8f11d29068cf5803cd6
SHA1737f8cd048ecad42237369f688b9f842ee843f37
SHA256757129d2275c13058790aa31b5a78de69b61259a79e5b525125d232aebe4d13e
SHA5122f324d0a4a94bc06288fdbfe7ddcc27e8c5871b7ab223e3038e98191e60c029f59829e30ce9aab93bb97737fc0cd6455ec319ad96326538c210a763cfaceefbf
-
Filesize
291KB
MD5f979536a7188b8f11d29068cf5803cd6
SHA1737f8cd048ecad42237369f688b9f842ee843f37
SHA256757129d2275c13058790aa31b5a78de69b61259a79e5b525125d232aebe4d13e
SHA5122f324d0a4a94bc06288fdbfe7ddcc27e8c5871b7ab223e3038e98191e60c029f59829e30ce9aab93bb97737fc0cd6455ec319ad96326538c210a763cfaceefbf
-
Filesize
345KB
MD5550cc98078d6a51aec4f4bf527d162db
SHA1aad40a112756036e8db5dbfbdfe1b632f7a6988a
SHA2567021df2e502b073072d81c27be4f35989b2746486dee7a4f71a1b13e48c95612
SHA512cd1dc57e79fec29d0e32f9873fa4842a209dc2bedbc3e422b7db7af136ed4cb2f45b13c80e76ccbd082ed4742e8d795b235949a0dd5b5509f48daf73b49de8e7
-
Filesize
345KB
MD5550cc98078d6a51aec4f4bf527d162db
SHA1aad40a112756036e8db5dbfbdfe1b632f7a6988a
SHA2567021df2e502b073072d81c27be4f35989b2746486dee7a4f71a1b13e48c95612
SHA512cd1dc57e79fec29d0e32f9873fa4842a209dc2bedbc3e422b7db7af136ed4cb2f45b13c80e76ccbd082ed4742e8d795b235949a0dd5b5509f48daf73b49de8e7