Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:25
Static task
static1
Behavioral task
behavioral1
Sample
87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe
Resource
win10v2004-20230220-en
General
-
Target
87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe
-
Size
689KB
-
MD5
eaa66d4498f22a0fb820867ed448b7fa
-
SHA1
0277c7ec6593f44309e33d8e3319d96ae023c44e
-
SHA256
87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2
-
SHA512
9c8687c53164eb89138564ae7e29fa8220468c0b36c29915385490d1e724bf67edf4900a1790c28568f3c0bdb7156ee770fb2f7357b76ee2b43f6cd8151946f9
-
SSDEEP
12288:oMruy90vr8TqrCKWezDyh65hLukmySH6xSz+2vIoFYNfig5Wi731m:GyJTaCsfarH6xSznbYNagAi7Fm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5154.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5154.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3932-193-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-194-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-196-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-198-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-200-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-202-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-204-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-206-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-208-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-210-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-212-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-214-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-216-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-218-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-220-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-222-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-224-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline behavioral1/memory/3932-226-0x00000000065C0000-0x00000000065FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un377744.exepro5154.exequ6488.exesi352309.exepid process 316 un377744.exe 1120 pro5154.exe 3932 qu6488.exe 4628 si352309.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5154.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5154.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exeun377744.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un377744.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un377744.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2816 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2984 1120 WerFault.exe pro5154.exe 3528 3932 WerFault.exe qu6488.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5154.exequ6488.exesi352309.exepid process 1120 pro5154.exe 1120 pro5154.exe 3932 qu6488.exe 3932 qu6488.exe 4628 si352309.exe 4628 si352309.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5154.exequ6488.exesi352309.exedescription pid process Token: SeDebugPrivilege 1120 pro5154.exe Token: SeDebugPrivilege 3932 qu6488.exe Token: SeDebugPrivilege 4628 si352309.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exeun377744.exedescription pid process target process PID 1908 wrote to memory of 316 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe un377744.exe PID 1908 wrote to memory of 316 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe un377744.exe PID 1908 wrote to memory of 316 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe un377744.exe PID 316 wrote to memory of 1120 316 un377744.exe pro5154.exe PID 316 wrote to memory of 1120 316 un377744.exe pro5154.exe PID 316 wrote to memory of 1120 316 un377744.exe pro5154.exe PID 316 wrote to memory of 3932 316 un377744.exe qu6488.exe PID 316 wrote to memory of 3932 316 un377744.exe qu6488.exe PID 316 wrote to memory of 3932 316 un377744.exe qu6488.exe PID 1908 wrote to memory of 4628 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe si352309.exe PID 1908 wrote to memory of 4628 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe si352309.exe PID 1908 wrote to memory of 4628 1908 87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe si352309.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe"C:\Users\Admin\AppData\Local\Temp\87f4f43f82e874ff2afe5431136903f1d8d33bfafd54a9a18e8f628a7707dcf2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377744.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5154.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5154.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 10804⤵
- Program crash
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6488.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 16284⤵
- Program crash
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352309.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 11201⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3932 -ip 39321⤵PID:2348
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5730a1559c80f7f290d8b9321b2d65056
SHA1827a1a357c583697d4970cd73e6b501fc3c11f55
SHA256de9bd7402e33621fda87f4634df29dea2a2f93296d49761158732d17a2e6e91a
SHA512ea02a34e4f1aade9757954edf72fc3f1de9f4dcd12dc3ab038357f84d7846b7bc145bffd61d03d3c322ab70c8499890d1312bf16db8f2db90c40852125a19753
-
Filesize
175KB
MD5730a1559c80f7f290d8b9321b2d65056
SHA1827a1a357c583697d4970cd73e6b501fc3c11f55
SHA256de9bd7402e33621fda87f4634df29dea2a2f93296d49761158732d17a2e6e91a
SHA512ea02a34e4f1aade9757954edf72fc3f1de9f4dcd12dc3ab038357f84d7846b7bc145bffd61d03d3c322ab70c8499890d1312bf16db8f2db90c40852125a19753
-
Filesize
547KB
MD55bd31969d46f5796f5b5f9ab2288d030
SHA183184937031c484b00e556509f6ad527957eb5b4
SHA256b49e58c771ff60508cff34a1954effc2f348aa281a1616af22fa19163acd31fe
SHA512276335aa96317eef3a2cf5f4e123a3d1b933d4ce334f2d3b0021164b9be30e29b9bbe927bc4f9f720c0c9b2f5b95ff650a07c5bed024163864eca0bdbae7f90e
-
Filesize
547KB
MD55bd31969d46f5796f5b5f9ab2288d030
SHA183184937031c484b00e556509f6ad527957eb5b4
SHA256b49e58c771ff60508cff34a1954effc2f348aa281a1616af22fa19163acd31fe
SHA512276335aa96317eef3a2cf5f4e123a3d1b933d4ce334f2d3b0021164b9be30e29b9bbe927bc4f9f720c0c9b2f5b95ff650a07c5bed024163864eca0bdbae7f90e
-
Filesize
291KB
MD5371e31795dac4d1ba8fef381261bd234
SHA1978a0f79d0698aecd084ea4ce5681837007c77d8
SHA256e4c5c8cddd6ab0354bd7e602dd070aacd6664d1791e80fd057e7912a5cdad0e9
SHA5127cc2d84177a19d9b36a60a47f2f2da1321331836b07eab5c4af6462e1c980c8aa8c331eacc03e9d4f13069d03aa5caae8ac8ad41d19b0230c3010327c291830d
-
Filesize
291KB
MD5371e31795dac4d1ba8fef381261bd234
SHA1978a0f79d0698aecd084ea4ce5681837007c77d8
SHA256e4c5c8cddd6ab0354bd7e602dd070aacd6664d1791e80fd057e7912a5cdad0e9
SHA5127cc2d84177a19d9b36a60a47f2f2da1321331836b07eab5c4af6462e1c980c8aa8c331eacc03e9d4f13069d03aa5caae8ac8ad41d19b0230c3010327c291830d
-
Filesize
345KB
MD5046b5568f31df283eac529de60af9ee7
SHA170026aa2245f37c02075f0818fd1c1cbc15788e9
SHA256ffbd6b2280ab24a6cfe265d5f73e38bc1137b1e09ada704acbcb0d78d939636e
SHA512f6a34d46905aa6ba401c18c4b64e684fc4a92d4f753469cb34fca51b412341b0e6aa10dfd5060fe7333d2984416187db8d55f1d0db6b9577c74b59e89480f3ec
-
Filesize
345KB
MD5046b5568f31df283eac529de60af9ee7
SHA170026aa2245f37c02075f0818fd1c1cbc15788e9
SHA256ffbd6b2280ab24a6cfe265d5f73e38bc1137b1e09ada704acbcb0d78d939636e
SHA512f6a34d46905aa6ba401c18c4b64e684fc4a92d4f753469cb34fca51b412341b0e6aa10dfd5060fe7333d2984416187db8d55f1d0db6b9577c74b59e89480f3ec