Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:07
Static task
static1
Behavioral task
behavioral1
Sample
32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe
Resource
win10v2004-20230220-en
General
-
Target
32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe
-
Size
689KB
-
MD5
62108c95a4456bdbed240481a7d8556f
-
SHA1
b9cd7bfb17b6986b314acb054cc72049105e6952
-
SHA256
32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af
-
SHA512
fd25d60b8f2520f02d8dc9299cea8cc0cab2828bc1510f11d5bb0f467ac45cf09ace0c9bb4efde5ca7d1e809178af86df9dc6ad2eb2e5d805ed88b0a64f48cb2
-
SSDEEP
12288:QMrdy90h501D2VG8Ulzyb65hLutw8oaSzIiSGmJLvqFxwfig7KPEVa9mcqLD:dyBUVKuGfavsTmJLWxwagMEs9mcCD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7788.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7788.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7788.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/628-194-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-195-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-197-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-199-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-201-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-203-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-205-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-207-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-209-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-211-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-213-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-215-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-217-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-219-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-221-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-223-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-225-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/628-227-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un211862.exepro7788.exequ8057.exesi815193.exepid process 404 un211862.exe 2696 pro7788.exe 628 qu8057.exe 4468 si815193.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7788.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7788.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exeun211862.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un211862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un211862.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4140 2696 WerFault.exe pro7788.exe 2336 628 WerFault.exe qu8057.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7788.exequ8057.exesi815193.exepid process 2696 pro7788.exe 2696 pro7788.exe 628 qu8057.exe 628 qu8057.exe 4468 si815193.exe 4468 si815193.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7788.exequ8057.exesi815193.exedescription pid process Token: SeDebugPrivilege 2696 pro7788.exe Token: SeDebugPrivilege 628 qu8057.exe Token: SeDebugPrivilege 4468 si815193.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exeun211862.exedescription pid process target process PID 3196 wrote to memory of 404 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe un211862.exe PID 3196 wrote to memory of 404 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe un211862.exe PID 3196 wrote to memory of 404 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe un211862.exe PID 404 wrote to memory of 2696 404 un211862.exe pro7788.exe PID 404 wrote to memory of 2696 404 un211862.exe pro7788.exe PID 404 wrote to memory of 2696 404 un211862.exe pro7788.exe PID 404 wrote to memory of 628 404 un211862.exe qu8057.exe PID 404 wrote to memory of 628 404 un211862.exe qu8057.exe PID 404 wrote to memory of 628 404 un211862.exe qu8057.exe PID 3196 wrote to memory of 4468 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe si815193.exe PID 3196 wrote to memory of 4468 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe si815193.exe PID 3196 wrote to memory of 4468 3196 32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe si815193.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe"C:\Users\Admin\AppData\Local\Temp\32c8a3c760c8b5de3d5ac64df392d49180afeffbca14661c0f0c24e4149c13af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7788.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 10124⤵
- Program crash
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8057.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8057.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 13164⤵
- Program crash
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815193.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2696 -ip 26961⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 628 -ip 6281⤵PID:1044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52c96415a5af2a3a19058b67cf6cac233
SHA162bc599ca744860067a49e881b814712d5fd70cf
SHA256ff389e281df25a4ea3c735e7bdbac18b3d15d07cc51ffe605879412c5fc9ff24
SHA5121fb0048635bd05f496027bade3b072dc8f6f24c9aa13f443e7482a8ca94b8033baae5349ec8c1c8c8239587abc569eabbc1dddbac07425c9f5efe0e705174a65
-
Filesize
175KB
MD52c96415a5af2a3a19058b67cf6cac233
SHA162bc599ca744860067a49e881b814712d5fd70cf
SHA256ff389e281df25a4ea3c735e7bdbac18b3d15d07cc51ffe605879412c5fc9ff24
SHA5121fb0048635bd05f496027bade3b072dc8f6f24c9aa13f443e7482a8ca94b8033baae5349ec8c1c8c8239587abc569eabbc1dddbac07425c9f5efe0e705174a65
-
Filesize
547KB
MD5aa4baeb4ddf6783043d693c34fe33a2c
SHA1f3aa625bacabdb8d0ecbee1279c068cb6236829c
SHA256dd4cd0a4069281e1d5f1b297a2f05083d7ff9923338e3e62ef9ba3023c5c3a74
SHA5121c9c41f6605858c4440fe48374e5cde9ed0c82a6f03cbc686b723f2b1b840b2d2983bbfebbdf88bc9269b4d8589ac5636d645a80bcae58af5f4acee8235f5189
-
Filesize
547KB
MD5aa4baeb4ddf6783043d693c34fe33a2c
SHA1f3aa625bacabdb8d0ecbee1279c068cb6236829c
SHA256dd4cd0a4069281e1d5f1b297a2f05083d7ff9923338e3e62ef9ba3023c5c3a74
SHA5121c9c41f6605858c4440fe48374e5cde9ed0c82a6f03cbc686b723f2b1b840b2d2983bbfebbdf88bc9269b4d8589ac5636d645a80bcae58af5f4acee8235f5189
-
Filesize
291KB
MD5ebc30fe2494dfb3bbe96507a8a0c018a
SHA1460e000327c9ee41f5357ffde36ed2f827cfb70a
SHA2564d6a25090af1a9a143f3eb3736a6525c1fc1a166d094453f277e3132c6e6f004
SHA512bb1509a2207b714e74a23830cd34b55c305fb98aeb448160e66306edd3419b6361ca058186581f0a548fac653a83a5fb8654d1586fe6d9b13ac139e81c5bb447
-
Filesize
291KB
MD5ebc30fe2494dfb3bbe96507a8a0c018a
SHA1460e000327c9ee41f5357ffde36ed2f827cfb70a
SHA2564d6a25090af1a9a143f3eb3736a6525c1fc1a166d094453f277e3132c6e6f004
SHA512bb1509a2207b714e74a23830cd34b55c305fb98aeb448160e66306edd3419b6361ca058186581f0a548fac653a83a5fb8654d1586fe6d9b13ac139e81c5bb447
-
Filesize
345KB
MD51632ee3fda3384ea85a04f70ae4a5e7a
SHA188049f5d27bea18955a940b2ef33849f4b38158c
SHA2562c0e9d82673db9a1b809ba5afbea09fdd2bd3ba7392e58817bb2f5a2368aac42
SHA512b036a215732c7a79bbfa1fd88cab32544b8125c42fb65c3f1f594c7571cd8db65f35b54bae48041fbb89ab8d9eed5137d873822caaff0f4e80dcb53e3f3c71b2
-
Filesize
345KB
MD51632ee3fda3384ea85a04f70ae4a5e7a
SHA188049f5d27bea18955a940b2ef33849f4b38158c
SHA2562c0e9d82673db9a1b809ba5afbea09fdd2bd3ba7392e58817bb2f5a2368aac42
SHA512b036a215732c7a79bbfa1fd88cab32544b8125c42fb65c3f1f594c7571cd8db65f35b54bae48041fbb89ab8d9eed5137d873822caaff0f4e80dcb53e3f3c71b2