Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:09
Static task
static1
Behavioral task
behavioral1
Sample
9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe
Resource
win10v2004-20230221-en
General
-
Target
9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe
-
Size
689KB
-
MD5
2419dd0f186338a198ee143ab8dd8363
-
SHA1
5fbbdc3e0218c31c073d293433938ea84f90edc0
-
SHA256
9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d
-
SHA512
9c926c4d103ae5172d73089781b80f5224d5da33dda5016aa71812ecfa13379d866294debcafc7bf26395ca8fcf537da63685378f913bcc6d86a550f0c55993c
-
SSDEEP
12288:rMr2y908rp0BhO1rjsVyc65hLu4fmeLf5zm2DwvTFKUfigTY5zl2bXx/yi:FyqhotDfa4ffxztDwpKUagmlYXxqi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7964.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7964.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7964.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3848-192-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-194-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-191-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-196-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-198-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-200-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-202-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-204-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-208-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-210-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-206-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-214-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-216-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-212-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-218-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-220-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-222-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline behavioral1/memory/3848-224-0x0000000006590000-0x00000000065CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un096943.exepro7964.exequ6297.exesi959499.exepid process 2788 un096943.exe 1904 pro7964.exe 3848 qu6297.exe 808 si959499.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7964.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7964.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exeun096943.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un096943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un096943.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3756 1904 WerFault.exe pro7964.exe 1044 3848 WerFault.exe qu6297.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7964.exequ6297.exesi959499.exepid process 1904 pro7964.exe 1904 pro7964.exe 3848 qu6297.exe 3848 qu6297.exe 808 si959499.exe 808 si959499.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7964.exequ6297.exesi959499.exedescription pid process Token: SeDebugPrivilege 1904 pro7964.exe Token: SeDebugPrivilege 3848 qu6297.exe Token: SeDebugPrivilege 808 si959499.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exeun096943.exedescription pid process target process PID 1608 wrote to memory of 2788 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe un096943.exe PID 1608 wrote to memory of 2788 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe un096943.exe PID 1608 wrote to memory of 2788 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe un096943.exe PID 2788 wrote to memory of 1904 2788 un096943.exe pro7964.exe PID 2788 wrote to memory of 1904 2788 un096943.exe pro7964.exe PID 2788 wrote to memory of 1904 2788 un096943.exe pro7964.exe PID 2788 wrote to memory of 3848 2788 un096943.exe qu6297.exe PID 2788 wrote to memory of 3848 2788 un096943.exe qu6297.exe PID 2788 wrote to memory of 3848 2788 un096943.exe qu6297.exe PID 1608 wrote to memory of 808 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe si959499.exe PID 1608 wrote to memory of 808 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe si959499.exe PID 1608 wrote to memory of 808 1608 9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe si959499.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe"C:\Users\Admin\AppData\Local\Temp\9b7875b312780d517a24802b99acdadd21e3eada0f79475d34ef84407755c56d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096943.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096943.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7964.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10804⤵
- Program crash
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6297.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 13364⤵
- Program crash
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959499.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959499.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1904 -ip 19041⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3848 -ip 38481⤵PID:3248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a32d965cbf474bafe21ca2c3bd32cca3
SHA1874cbcf1c6d3dc0875304ccb3693d58807710348
SHA256cf093c2db190e1b7fdceba4bb4b63c00e82d2cca682e8643e69719b5b629d7e3
SHA512298ec3260b7b59e05c733cb7966ae7eb1413464cf721c238b64e3539761e77051ca8832b32bb3ba1aaaccb4e7ef64be0a1d2b21c13c0ea571edf3033fb4b2a66
-
Filesize
175KB
MD5a32d965cbf474bafe21ca2c3bd32cca3
SHA1874cbcf1c6d3dc0875304ccb3693d58807710348
SHA256cf093c2db190e1b7fdceba4bb4b63c00e82d2cca682e8643e69719b5b629d7e3
SHA512298ec3260b7b59e05c733cb7966ae7eb1413464cf721c238b64e3539761e77051ca8832b32bb3ba1aaaccb4e7ef64be0a1d2b21c13c0ea571edf3033fb4b2a66
-
Filesize
548KB
MD566ef03aadc73da1027b7f2f990e98105
SHA1c43a44c93fa28ace8f2b082f104d074201c4358c
SHA25639b3143f49b9d1c3dcf709cdbcf1eccffd210a74ede61e2295c5da59058a5e4b
SHA512d299508247782075f2ba147950cca24b1af15c6aaa06c2372a5edf928fd8856445ffbc9b881632a2a8bdbd757a8605ed9007d1004162bc8d1b8d2133535ba0ba
-
Filesize
548KB
MD566ef03aadc73da1027b7f2f990e98105
SHA1c43a44c93fa28ace8f2b082f104d074201c4358c
SHA25639b3143f49b9d1c3dcf709cdbcf1eccffd210a74ede61e2295c5da59058a5e4b
SHA512d299508247782075f2ba147950cca24b1af15c6aaa06c2372a5edf928fd8856445ffbc9b881632a2a8bdbd757a8605ed9007d1004162bc8d1b8d2133535ba0ba
-
Filesize
291KB
MD54dbd6732e66e7ec8682f8295e1aff8e2
SHA15b8908ff0874d65681c325c1dd9b801abd66449b
SHA2568e6b6aee564d1483dd0fe519dfd75463249c0d0636e1f7b5cc9fcb709714399d
SHA512c96a1dceb1911f7ffa7496a63b0a1d2f31c65c7d9713eb3af526cb57f62133fdd9be5ed0557a2e968301d8f65ff8867d2aa0e2fb6096275b254dee856035d5aa
-
Filesize
291KB
MD54dbd6732e66e7ec8682f8295e1aff8e2
SHA15b8908ff0874d65681c325c1dd9b801abd66449b
SHA2568e6b6aee564d1483dd0fe519dfd75463249c0d0636e1f7b5cc9fcb709714399d
SHA512c96a1dceb1911f7ffa7496a63b0a1d2f31c65c7d9713eb3af526cb57f62133fdd9be5ed0557a2e968301d8f65ff8867d2aa0e2fb6096275b254dee856035d5aa
-
Filesize
345KB
MD54a2f6acd2da4c203927448261a4bfdf1
SHA13e89744160eb200ce60cb775ca0f49f71ee79d32
SHA256ef7babc0b189ef44cddaf2d721cd6a994abfb5f698bfddce4a3cce7bdee7b4a2
SHA512e655467aac854f95f99d3ebcca3b9cc29ae662fc60a7e7ada25f5ab8f6cb4adbe42d5c45ffedee39101c426621ac4af25d144c3ac4e40483876ef01fe179ddaf
-
Filesize
345KB
MD54a2f6acd2da4c203927448261a4bfdf1
SHA13e89744160eb200ce60cb775ca0f49f71ee79d32
SHA256ef7babc0b189ef44cddaf2d721cd6a994abfb5f698bfddce4a3cce7bdee7b4a2
SHA512e655467aac854f95f99d3ebcca3b9cc29ae662fc60a7e7ada25f5ab8f6cb4adbe42d5c45ffedee39101c426621ac4af25d144c3ac4e40483876ef01fe179ddaf