Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:02
Static task
static1
Behavioral task
behavioral1
Sample
87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe
Resource
win10v2004-20230220-en
General
-
Target
87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe
-
Size
689KB
-
MD5
ad82a82c333c7abea8001f6d6460fc28
-
SHA1
d5779bea78594b3908da0e100760cee62790650d
-
SHA256
87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78
-
SHA512
8ba450793de6660ba7217ca01a03115b0ba548155ff3a9ef3d559b165b84d2d104be1467ea680bb921d0cac7cdceaed258aad7e6a7794762565e526deda0be7c
-
SSDEEP
12288:TMrpy90P9WljYNT+YvVqC691xbG9W+DT4Tcd2W5jZtBxYmJGvHFa6fignag7u4u7:my3GNSkM5tbl+DTyW+mJG9a6agnV64Eh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5378.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5378.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5378.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3136-191-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-192-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-194-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-196-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-198-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-200-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-202-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-204-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-206-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-208-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-210-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-212-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-214-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-216-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-218-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-220-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-222-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline behavioral1/memory/3136-224-0x0000000005FF0000-0x000000000602F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un489364.exepro5378.exequ6139.exesi621753.exepid process 4972 un489364.exe 4440 pro5378.exe 3136 qu6139.exe 2108 si621753.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5378.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5378.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5378.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un489364.exe87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un489364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un489364.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3200 4440 WerFault.exe pro5378.exe 1944 3136 WerFault.exe qu6139.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5378.exequ6139.exesi621753.exepid process 4440 pro5378.exe 4440 pro5378.exe 3136 qu6139.exe 3136 qu6139.exe 2108 si621753.exe 2108 si621753.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5378.exequ6139.exesi621753.exedescription pid process Token: SeDebugPrivilege 4440 pro5378.exe Token: SeDebugPrivilege 3136 qu6139.exe Token: SeDebugPrivilege 2108 si621753.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exeun489364.exedescription pid process target process PID 1664 wrote to memory of 4972 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe un489364.exe PID 1664 wrote to memory of 4972 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe un489364.exe PID 1664 wrote to memory of 4972 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe un489364.exe PID 4972 wrote to memory of 4440 4972 un489364.exe pro5378.exe PID 4972 wrote to memory of 4440 4972 un489364.exe pro5378.exe PID 4972 wrote to memory of 4440 4972 un489364.exe pro5378.exe PID 4972 wrote to memory of 3136 4972 un489364.exe qu6139.exe PID 4972 wrote to memory of 3136 4972 un489364.exe qu6139.exe PID 4972 wrote to memory of 3136 4972 un489364.exe qu6139.exe PID 1664 wrote to memory of 2108 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe si621753.exe PID 1664 wrote to memory of 2108 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe si621753.exe PID 1664 wrote to memory of 2108 1664 87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe si621753.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe"C:\Users\Admin\AppData\Local\Temp\87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 10844⤵
- Program crash
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 15404⤵
- Program crash
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4440 -ip 44401⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3136 -ip 31361⤵PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50f97f04b6f6a1c079151e0b1bcf60265
SHA183c0ff63bcf2f186d4b792c8812c13ec417eb8f7
SHA256a511b46eef5fc3a1172d4c6af6cb1e548868701f23273383047a978331826886
SHA512dc3ad74aeee254c13fd09f42c9e34332391eb0c3c5b8a2766bb3e971f2d52b726eb91c48fe29ef362b80281a8647c0ba8a24e2effaf9ce62448b1cbe2eeb6d96
-
Filesize
175KB
MD50f97f04b6f6a1c079151e0b1bcf60265
SHA183c0ff63bcf2f186d4b792c8812c13ec417eb8f7
SHA256a511b46eef5fc3a1172d4c6af6cb1e548868701f23273383047a978331826886
SHA512dc3ad74aeee254c13fd09f42c9e34332391eb0c3c5b8a2766bb3e971f2d52b726eb91c48fe29ef362b80281a8647c0ba8a24e2effaf9ce62448b1cbe2eeb6d96
-
Filesize
547KB
MD52a6f14acbea72896d8c6651038989f09
SHA1549bf9bd01b7b2e1728b9ec649aaa3b67b77cbcf
SHA256af0ecd8a77170699d1479a1f9c1bbf20612371cb83659b44b921d54eef93734e
SHA512f91a3ea279ed70adf28c4146eab802a1c793cacde5e61820b852357e038570c074a52003690e38e9bba27ff90cc47160935f28b61fdd58dfdb3b9b9f1733d623
-
Filesize
547KB
MD52a6f14acbea72896d8c6651038989f09
SHA1549bf9bd01b7b2e1728b9ec649aaa3b67b77cbcf
SHA256af0ecd8a77170699d1479a1f9c1bbf20612371cb83659b44b921d54eef93734e
SHA512f91a3ea279ed70adf28c4146eab802a1c793cacde5e61820b852357e038570c074a52003690e38e9bba27ff90cc47160935f28b61fdd58dfdb3b9b9f1733d623
-
Filesize
291KB
MD5d3fbd7008bd7aa8f49b24b18cd7facc8
SHA1c3b8abfb126bfee2fd6f0061b9e920ac8b5bd8fa
SHA2561ddf5df869824995200322b76d4586883f50d29130ba6a0b8402ff18906f7d11
SHA51276b9aa09d3c770b1813606cde207907c52ca3691195c441ffe89ad88122b0b7f700cb385addf7c4a1678d5eef8378566cbd809dcda1ad6369a752ee5fde079d8
-
Filesize
291KB
MD5d3fbd7008bd7aa8f49b24b18cd7facc8
SHA1c3b8abfb126bfee2fd6f0061b9e920ac8b5bd8fa
SHA2561ddf5df869824995200322b76d4586883f50d29130ba6a0b8402ff18906f7d11
SHA51276b9aa09d3c770b1813606cde207907c52ca3691195c441ffe89ad88122b0b7f700cb385addf7c4a1678d5eef8378566cbd809dcda1ad6369a752ee5fde079d8
-
Filesize
345KB
MD5ffe3d4d27a6ca34c03f9bbb1b23a37db
SHA1885c88fda9e594fb5ff1943585e97fe9131f364b
SHA25625d92bfaab8b5cfd4968c19e434718207cdbeb9856ced6a9b3f879389354d667
SHA512ebc7b39d1424d2d22e8bfa1d0186ba258f012224a3825f53aef10eb5b952e6678654c7b719c1bb84bc8e256a33da6069060865ce0efa1d1fabf98ecbddde566a
-
Filesize
345KB
MD5ffe3d4d27a6ca34c03f9bbb1b23a37db
SHA1885c88fda9e594fb5ff1943585e97fe9131f364b
SHA25625d92bfaab8b5cfd4968c19e434718207cdbeb9856ced6a9b3f879389354d667
SHA512ebc7b39d1424d2d22e8bfa1d0186ba258f012224a3825f53aef10eb5b952e6678654c7b719c1bb84bc8e256a33da6069060865ce0efa1d1fabf98ecbddde566a