Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:24
Static task
static1
Behavioral task
behavioral1
Sample
241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe
Resource
win10v2004-20230220-en
General
-
Target
241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe
-
Size
689KB
-
MD5
19432416a2299fc0101f668d147e85c5
-
SHA1
721baf06cb5a863332f405ef3e9d9ca7e1bfb985
-
SHA256
241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109
-
SHA512
babc177b27f3575e354494a8722967360bdd4175f8eeff287538db751b0881502cf64e799174fdd05cecb152ef9a6fc8b198b45546d517d990589b1a168881b3
-
SSDEEP
12288:hMrdy90yKe4ydxr8yi7kC45Hyp65hLunsMSKI3V0ZCawv1FpafigpV0g21GAm7x:sy/bBtUkC8SUfansLZ3V0Bw3paagQEx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6614.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4660-192-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-193-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-195-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-197-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-199-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-201-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-203-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-205-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-207-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-209-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-211-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-213-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-215-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-217-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-219-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-221-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-223-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/4660-225-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un747096.exepro6614.exequ5530.exesi249048.exepid process 4332 un747096.exe 5008 pro6614.exe 4660 qu5530.exe 4240 si249048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6614.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6614.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exeun747096.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un747096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un747096.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2404 5008 WerFault.exe pro6614.exe 2636 4660 WerFault.exe qu5530.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6614.exequ5530.exesi249048.exepid process 5008 pro6614.exe 5008 pro6614.exe 4660 qu5530.exe 4660 qu5530.exe 4240 si249048.exe 4240 si249048.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6614.exequ5530.exesi249048.exedescription pid process Token: SeDebugPrivilege 5008 pro6614.exe Token: SeDebugPrivilege 4660 qu5530.exe Token: SeDebugPrivilege 4240 si249048.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exeun747096.exedescription pid process target process PID 3516 wrote to memory of 4332 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe un747096.exe PID 3516 wrote to memory of 4332 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe un747096.exe PID 3516 wrote to memory of 4332 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe un747096.exe PID 4332 wrote to memory of 5008 4332 un747096.exe pro6614.exe PID 4332 wrote to memory of 5008 4332 un747096.exe pro6614.exe PID 4332 wrote to memory of 5008 4332 un747096.exe pro6614.exe PID 4332 wrote to memory of 4660 4332 un747096.exe qu5530.exe PID 4332 wrote to memory of 4660 4332 un747096.exe qu5530.exe PID 4332 wrote to memory of 4660 4332 un747096.exe qu5530.exe PID 3516 wrote to memory of 4240 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe si249048.exe PID 3516 wrote to memory of 4240 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe si249048.exe PID 3516 wrote to memory of 4240 3516 241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe si249048.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe"C:\Users\Admin\AppData\Local\Temp\241920c707e1181e82cf8526a8e8c3b02ec2cf141b31ff446b69c99bb5d3e109.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un747096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un747096.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6614.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 10804⤵
- Program crash
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5530.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13484⤵
- Program crash
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si249048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si249048.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5008 -ip 50081⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4660 -ip 46601⤵PID:1432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52033146d35ef108e04d7a73699efe73c
SHA1bed10c6fce1298e94fa70046b5f18a0698f28c54
SHA2560ca8ef07c39ccd314a631ecce86e103fc6b49cf965e1dc8c34a78454bd5de8b6
SHA5126d69d838089ae1d3ce482fd3c17cdffa5663ef67a06cb922aabfd82e20849a1a8bc364554bd6d63795977f462acd3098eea061e24bb9d55e24796db9aff8eeb8
-
Filesize
175KB
MD52033146d35ef108e04d7a73699efe73c
SHA1bed10c6fce1298e94fa70046b5f18a0698f28c54
SHA2560ca8ef07c39ccd314a631ecce86e103fc6b49cf965e1dc8c34a78454bd5de8b6
SHA5126d69d838089ae1d3ce482fd3c17cdffa5663ef67a06cb922aabfd82e20849a1a8bc364554bd6d63795977f462acd3098eea061e24bb9d55e24796db9aff8eeb8
-
Filesize
547KB
MD516424c0685b1ba460f4da7a9ec0fb71d
SHA1245874f96eeb8a97ccebb6700832fc9442f082e1
SHA256c6f42158f7d1ea430a0c019c9e88ef2af7b4f1e529a1b581a0f6b4449d8bd9b1
SHA51264e2d9736f589ffbf8a6a63ba88ffb771b73eb98fd331a6d3e75e63824e6a7311d5bbcd532b69bf8b53b5780964c1a93ce8004d3fe595df969402b8bda3bbd1b
-
Filesize
547KB
MD516424c0685b1ba460f4da7a9ec0fb71d
SHA1245874f96eeb8a97ccebb6700832fc9442f082e1
SHA256c6f42158f7d1ea430a0c019c9e88ef2af7b4f1e529a1b581a0f6b4449d8bd9b1
SHA51264e2d9736f589ffbf8a6a63ba88ffb771b73eb98fd331a6d3e75e63824e6a7311d5bbcd532b69bf8b53b5780964c1a93ce8004d3fe595df969402b8bda3bbd1b
-
Filesize
291KB
MD56507b3bf020a7ddd46543fc419c1c3ef
SHA16cd4fa6b82e9b7bf81bf83943dfade0bf86283b7
SHA256c7c3b4a6d5ac087814eed1ab82b277f15b0b3c9578edeeab7942a52a3acbe4c3
SHA512d4709ed349a03cc4f52d192c3af7523ac29f6d79696ba2a5b1850de1c764eebcde4f12157c16512f2e5e26101e138f52613ea7d4266f55b6e34f11e648be157d
-
Filesize
291KB
MD56507b3bf020a7ddd46543fc419c1c3ef
SHA16cd4fa6b82e9b7bf81bf83943dfade0bf86283b7
SHA256c7c3b4a6d5ac087814eed1ab82b277f15b0b3c9578edeeab7942a52a3acbe4c3
SHA512d4709ed349a03cc4f52d192c3af7523ac29f6d79696ba2a5b1850de1c764eebcde4f12157c16512f2e5e26101e138f52613ea7d4266f55b6e34f11e648be157d
-
Filesize
345KB
MD573656a59fe76be9a926b77c6ace5a9d5
SHA1212abcf468caeaadcaa648dad7847948395b9f3d
SHA2561f7952146d1f11220ebf90454b669113cbaab3b53ca12215331c59c3f0e9ffa1
SHA5121ede2e206082e0534ffb15e7d559565b9bf3834656ac561bf53d1fe61bd20c6a9d5b250d505231ae5e81406a84c72e5ebfa8615717dca056fe52e19d26440ba0
-
Filesize
345KB
MD573656a59fe76be9a926b77c6ace5a9d5
SHA1212abcf468caeaadcaa648dad7847948395b9f3d
SHA2561f7952146d1f11220ebf90454b669113cbaab3b53ca12215331c59c3f0e9ffa1
SHA5121ede2e206082e0534ffb15e7d559565b9bf3834656ac561bf53d1fe61bd20c6a9d5b250d505231ae5e81406a84c72e5ebfa8615717dca056fe52e19d26440ba0