Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:25
Static task
static1
Behavioral task
behavioral1
Sample
1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe
Resource
win10v2004-20230220-en
General
-
Target
1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe
-
Size
689KB
-
MD5
eb56b11b90ea8b0e66fcec2794a9d0cf
-
SHA1
bf5a1922f76ac2c4b9003e5e6be9ae1b75717b1c
-
SHA256
1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a
-
SHA512
9bee32f99b35be4827b527890e6a4b3430dff1c04392c2d7459acb11b313f80a1cf3138757cb5e567dc93c0668ce58bdc9da10d3611482ffeaf522bbafc6a503
-
SSDEEP
12288:0MrOy90a2IfAVaohfnGDoIy465hLuglD5aMSKx3Hr+9Ph4EtgWvSFi4figTo6HTQ:yyr2qIlJ3fa+aLw3HKbtFui4agToyjE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4738.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2632-191-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-192-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-194-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-196-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-198-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-200-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-202-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-204-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-206-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-208-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-210-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-212-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-214-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-216-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-218-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-220-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-222-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline behavioral1/memory/2632-224-0x0000000003AA0000-0x0000000003ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 372 un775790.exe 1952 pro4738.exe 2632 qu6644.exe 3532 si290295.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4738.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un775790.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un775790.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1516 1952 WerFault.exe 85 4560 2632 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 pro4738.exe 1952 pro4738.exe 2632 qu6644.exe 2632 qu6644.exe 3532 si290295.exe 3532 si290295.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1952 pro4738.exe Token: SeDebugPrivilege 2632 qu6644.exe Token: SeDebugPrivilege 3532 si290295.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 372 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 84 PID 2680 wrote to memory of 372 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 84 PID 2680 wrote to memory of 372 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 84 PID 372 wrote to memory of 1952 372 un775790.exe 85 PID 372 wrote to memory of 1952 372 un775790.exe 85 PID 372 wrote to memory of 1952 372 un775790.exe 85 PID 372 wrote to memory of 2632 372 un775790.exe 91 PID 372 wrote to memory of 2632 372 un775790.exe 91 PID 372 wrote to memory of 2632 372 un775790.exe 91 PID 2680 wrote to memory of 3532 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 95 PID 2680 wrote to memory of 3532 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 95 PID 2680 wrote to memory of 3532 2680 1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe"C:\Users\Admin\AppData\Local\Temp\1ff818afbee71bdb5230531f4d928b8f9be672a1f0d479ab7b4ecd306f02cf7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775790.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775790.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4738.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 10804⤵
- Program crash
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6644.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 16644⤵
- Program crash
PID:4560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si290295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si290295.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1952 -ip 19521⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2632 -ip 26321⤵PID:3184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fe9723ef751b39fac1e9fbda23d2010a
SHA17fc3a417d4b1ae7fa6a3164ae0f74cec48df1842
SHA256cb3cabc32e4e6cd072a67bd3b78eb72f1b0d2e6c8f42caf60c907a4316782ac6
SHA5126dd76de9b12f55ec156e4fd5f46d41a765d3d04ef0a673ae454b41d5419002aba9169807a81e1b93f32f7d2367c0683c5774a1548612130459604325acf7f1a8
-
Filesize
175KB
MD5fe9723ef751b39fac1e9fbda23d2010a
SHA17fc3a417d4b1ae7fa6a3164ae0f74cec48df1842
SHA256cb3cabc32e4e6cd072a67bd3b78eb72f1b0d2e6c8f42caf60c907a4316782ac6
SHA5126dd76de9b12f55ec156e4fd5f46d41a765d3d04ef0a673ae454b41d5419002aba9169807a81e1b93f32f7d2367c0683c5774a1548612130459604325acf7f1a8
-
Filesize
548KB
MD5bdf037a7d8ea332fb5c8812684130961
SHA1d42bfcaff5213ed3626ce1d12a958616bb2984b6
SHA2566b0895091af0d4e374563a2952d456c7ae9ad3ff8b028609932eff2b506f5042
SHA512bc3bde842fc6cfc0d1ed640b4ab1dce95dbf5bb0d0d20d08e7be5d2ddf3c2a1e6b187d94543f6a33940df950217d790f6cf93fa3c8ce5e8b53bce70eaaf4185b
-
Filesize
548KB
MD5bdf037a7d8ea332fb5c8812684130961
SHA1d42bfcaff5213ed3626ce1d12a958616bb2984b6
SHA2566b0895091af0d4e374563a2952d456c7ae9ad3ff8b028609932eff2b506f5042
SHA512bc3bde842fc6cfc0d1ed640b4ab1dce95dbf5bb0d0d20d08e7be5d2ddf3c2a1e6b187d94543f6a33940df950217d790f6cf93fa3c8ce5e8b53bce70eaaf4185b
-
Filesize
291KB
MD5360255f1a7b80d488c689fea5d8762c0
SHA1d6cc94e529d11c7069741d0b86108e6227a7c4fa
SHA2563aec35fbfdfc27a8b97c47d88f0ab3b6fbecc5a6aa6fa3a57309384553ec712e
SHA5122bfc41c564dbb32f3d2324f17d66ec1f709a63262dbe4bb515f77c315ecf06d00361974685be185ce5047e7497f57cbbf84ce3239360f26b753071fd65b5f72b
-
Filesize
291KB
MD5360255f1a7b80d488c689fea5d8762c0
SHA1d6cc94e529d11c7069741d0b86108e6227a7c4fa
SHA2563aec35fbfdfc27a8b97c47d88f0ab3b6fbecc5a6aa6fa3a57309384553ec712e
SHA5122bfc41c564dbb32f3d2324f17d66ec1f709a63262dbe4bb515f77c315ecf06d00361974685be185ce5047e7497f57cbbf84ce3239360f26b753071fd65b5f72b
-
Filesize
345KB
MD57dc1b26e36b333c0f0e7340b44604f3c
SHA10da561149f468420e43cae79e11eebc32877e1fb
SHA256e067fcf79a1c0c0ebfb4cd5851b8a8971591e02408fac5f10fa3ae5300269a97
SHA5129ad8b7f1b4445b2c1283abfc4b83f38bc3e8200dc1ffdacca35f5857b45c050ac97cf06767b97920856f424caf3ebe9bf23b3d579c147d8673baac139ee8ae4d
-
Filesize
345KB
MD57dc1b26e36b333c0f0e7340b44604f3c
SHA10da561149f468420e43cae79e11eebc32877e1fb
SHA256e067fcf79a1c0c0ebfb4cd5851b8a8971591e02408fac5f10fa3ae5300269a97
SHA5129ad8b7f1b4445b2c1283abfc4b83f38bc3e8200dc1ffdacca35f5857b45c050ac97cf06767b97920856f424caf3ebe9bf23b3d579c147d8673baac139ee8ae4d