Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:24
Static task
static1
Behavioral task
behavioral1
Sample
f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe
Resource
win10v2004-20230220-en
General
-
Target
f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe
-
Size
690KB
-
MD5
99863671d32b6ff3ac043dc03730b0d9
-
SHA1
836de08bda54b36840828a44a05452d37fe5f23d
-
SHA256
f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4
-
SHA512
09a16481334dfbb20a81b363c67cfc2b1b6fb505e8495026ed3b657372663f3fb3f4b00b3cfd3c7724e34a43070524f9271dfd5c09f1df38c8ada4a8df2a37bb
-
SSDEEP
12288:MMray90YugCRuPt1Gxg/fHrdrCya65hLulo1GMSKI3Vh6rVvIFNsfigdwMzh2jo6:Oyt0u1wKrxPpfalcGLZ3Vh6RQNsagxhC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0366.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3820-192-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-194-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-191-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-196-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-201-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-200-0x0000000005F70000-0x0000000005F80000-memory.dmp family_redline behavioral1/memory/3820-204-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-206-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-208-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-210-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-212-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-214-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-216-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-218-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-220-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-222-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-224-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-226-0x0000000006630000-0x000000000666F000-memory.dmp family_redline behavioral1/memory/3820-228-0x0000000006630000-0x000000000666F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un519818.exepro0366.exequ0635.exesi980113.exepid process 4244 un519818.exe 1404 pro0366.exe 3820 qu0635.exe 1248 si980113.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0366.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un519818.exef95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un519818.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un519818.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2824 1404 WerFault.exe pro0366.exe 4684 3820 WerFault.exe qu0635.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0366.exequ0635.exesi980113.exepid process 1404 pro0366.exe 1404 pro0366.exe 3820 qu0635.exe 3820 qu0635.exe 1248 si980113.exe 1248 si980113.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0366.exequ0635.exesi980113.exedescription pid process Token: SeDebugPrivilege 1404 pro0366.exe Token: SeDebugPrivilege 3820 qu0635.exe Token: SeDebugPrivilege 1248 si980113.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exeun519818.exedescription pid process target process PID 3164 wrote to memory of 4244 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe un519818.exe PID 3164 wrote to memory of 4244 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe un519818.exe PID 3164 wrote to memory of 4244 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe un519818.exe PID 4244 wrote to memory of 1404 4244 un519818.exe pro0366.exe PID 4244 wrote to memory of 1404 4244 un519818.exe pro0366.exe PID 4244 wrote to memory of 1404 4244 un519818.exe pro0366.exe PID 4244 wrote to memory of 3820 4244 un519818.exe qu0635.exe PID 4244 wrote to memory of 3820 4244 un519818.exe qu0635.exe PID 4244 wrote to memory of 3820 4244 un519818.exe qu0635.exe PID 3164 wrote to memory of 1248 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe si980113.exe PID 3164 wrote to memory of 1248 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe si980113.exe PID 3164 wrote to memory of 1248 3164 f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe si980113.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe"C:\Users\Admin\AppData\Local\Temp\f95d7d66c0e724ad6454441d41039d7c97abf21e18275cc6e4f06338b43a50d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519818.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 10844⤵
- Program crash
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0635.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 13564⤵
- Program crash
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980113.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980113.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1404 -ip 14041⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3820 -ip 38201⤵PID:4632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb7ee965a33bfc04bb804f881a154773
SHA17527ada16ba9231b6a90bb83a9e545b615d4f9fd
SHA2564f05c8db418e25694d680570b836b4e5e0653df22e9839aeea9dd8aaba8c5e06
SHA5122efee36b04df67bb4a1bf0137657f8819c8f7c3f03aa3f037186a137088953b2f336de057a93b24e473e71576e704c840abd64c702d1cb7b9e91642a3cc67008
-
Filesize
175KB
MD5fb7ee965a33bfc04bb804f881a154773
SHA17527ada16ba9231b6a90bb83a9e545b615d4f9fd
SHA2564f05c8db418e25694d680570b836b4e5e0653df22e9839aeea9dd8aaba8c5e06
SHA5122efee36b04df67bb4a1bf0137657f8819c8f7c3f03aa3f037186a137088953b2f336de057a93b24e473e71576e704c840abd64c702d1cb7b9e91642a3cc67008
-
Filesize
548KB
MD5445900a31fb11e242f4f008b1e6fb9de
SHA1e42c96756fe339460023600968437636bbc8c8fa
SHA256a3a69df00d31b69fc4d74a2ccae818a7d1e661a9e1f60cbfc2f2b2fa67bd2b41
SHA5120fe5d0b8ab04f5f4a12101b7b52caa0ba0d54a4f465fa679cbc2ca0db35f52a6e9b389c65c2433303ce5c845e526c963f2fca81d23a0297b52ff08ccb96ad506
-
Filesize
548KB
MD5445900a31fb11e242f4f008b1e6fb9de
SHA1e42c96756fe339460023600968437636bbc8c8fa
SHA256a3a69df00d31b69fc4d74a2ccae818a7d1e661a9e1f60cbfc2f2b2fa67bd2b41
SHA5120fe5d0b8ab04f5f4a12101b7b52caa0ba0d54a4f465fa679cbc2ca0db35f52a6e9b389c65c2433303ce5c845e526c963f2fca81d23a0297b52ff08ccb96ad506
-
Filesize
291KB
MD52b23c3bee95895704d69879aa362a57c
SHA1a7a684aef08504002ed62436ae0f3bee16b43977
SHA2563f08f66bf6e4d3d9028365249ae33794b6a5d8fa13d5d42a7ad101d84855f12f
SHA5124e75db2352efb27b78ff76f0ee75a3bed149d5d1d62a85f47dc7d5a6a452ceb91f0f00cbc2a21d269512126566d0fb6e83d7f582837b089586ba679c60a952dc
-
Filesize
291KB
MD52b23c3bee95895704d69879aa362a57c
SHA1a7a684aef08504002ed62436ae0f3bee16b43977
SHA2563f08f66bf6e4d3d9028365249ae33794b6a5d8fa13d5d42a7ad101d84855f12f
SHA5124e75db2352efb27b78ff76f0ee75a3bed149d5d1d62a85f47dc7d5a6a452ceb91f0f00cbc2a21d269512126566d0fb6e83d7f582837b089586ba679c60a952dc
-
Filesize
345KB
MD5dea1dcc50902dfb1e06ada54e2a1174b
SHA15aed3cfd8066630266c2a7e434b7464c34c51dba
SHA25658cdb723ce7f04c312c33f33f305c2fb1aaa66ab2d040d39ea722e74c5be9e91
SHA512958f639c80506e9abfbba8ab6227682b3e3b7aef903f042b644df9702250cdf4e5771118dac547ff80bde299f14980a68fceff9879c967d1d4e5f5916b943891
-
Filesize
345KB
MD5dea1dcc50902dfb1e06ada54e2a1174b
SHA15aed3cfd8066630266c2a7e434b7464c34c51dba
SHA25658cdb723ce7f04c312c33f33f305c2fb1aaa66ab2d040d39ea722e74c5be9e91
SHA512958f639c80506e9abfbba8ab6227682b3e3b7aef903f042b644df9702250cdf4e5771118dac547ff80bde299f14980a68fceff9879c967d1d4e5f5916b943891