Analysis
-
max time kernel
94s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 04:20
Static task
static1
Behavioral task
behavioral1
Sample
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe
Resource
win10v2004-20230220-en
General
-
Target
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe
-
Size
690KB
-
MD5
543f09f87d5da63edc098306fc11ac0d
-
SHA1
5ec3ea8635381b80459b610542f78745190296cb
-
SHA256
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b
-
SHA512
75f596ca12bd684c2b7e2d4be17add7882cf4a44e38c8c07b34e977eb36075045762cb6624af524ebe9e6cfd0b2293f9432a22d266c81267d8a125d0bca0641a
-
SSDEEP
12288:kMrUy905r0fbEFa6W6yb65hLuY8Nf3/r+tv5vFFXUfig+K44E/MgBG7Zq8:IyRjbH3GfaYmfT+B5HXUagK78
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1965.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-191-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-192-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-194-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-196-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-198-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-202-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-200-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-204-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-206-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-208-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-210-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-212-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-214-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-216-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-218-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-220-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-222-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-224-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1528-404-0x00000000060A0000-0x00000000060B0000-memory.dmp family_redline behavioral1/memory/1528-402-0x00000000060A0000-0x00000000060B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un553933.exepro1965.exequ0298.exesi010257.exepid process 4128 un553933.exe 2352 pro1965.exe 1528 qu0298.exe 3796 si010257.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1965.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exeun553933.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un553933.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un553933.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4488 2352 WerFault.exe pro1965.exe 4916 1528 WerFault.exe qu0298.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1965.exequ0298.exesi010257.exepid process 2352 pro1965.exe 2352 pro1965.exe 1528 qu0298.exe 1528 qu0298.exe 3796 si010257.exe 3796 si010257.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1965.exequ0298.exesi010257.exedescription pid process Token: SeDebugPrivilege 2352 pro1965.exe Token: SeDebugPrivilege 1528 qu0298.exe Token: SeDebugPrivilege 3796 si010257.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exeun553933.exedescription pid process target process PID 368 wrote to memory of 4128 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe un553933.exe PID 368 wrote to memory of 4128 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe un553933.exe PID 368 wrote to memory of 4128 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe un553933.exe PID 4128 wrote to memory of 2352 4128 un553933.exe pro1965.exe PID 4128 wrote to memory of 2352 4128 un553933.exe pro1965.exe PID 4128 wrote to memory of 2352 4128 un553933.exe pro1965.exe PID 4128 wrote to memory of 1528 4128 un553933.exe qu0298.exe PID 4128 wrote to memory of 1528 4128 un553933.exe qu0298.exe PID 4128 wrote to memory of 1528 4128 un553933.exe qu0298.exe PID 368 wrote to memory of 3796 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe si010257.exe PID 368 wrote to memory of 3796 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe si010257.exe PID 368 wrote to memory of 3796 368 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe si010257.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe"C:\Users\Admin\AppData\Local\Temp\30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553933.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553933.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 10644⤵
- Program crash
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0298.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0298.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 13364⤵
- Program crash
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si010257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si010257.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2352 -ip 23521⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1528 -ip 15281⤵PID:4224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50c7e85de2c67b49702e86f6d15cabd24
SHA113469479d12862f48c5054210d19add31efad269
SHA25610427ff9e8068eac1f4066dd60b7cfa29baba1e1c7992d68bdb5922396d74ad5
SHA512c31707e776a2fae7d057a17f1221e9d8aded653b1ab143f60ab46b339eb5ae4c26d31c7774bc579ef9ee7c9244b8fc6ed10530a62e499195e4396846fc0796d7
-
Filesize
175KB
MD50c7e85de2c67b49702e86f6d15cabd24
SHA113469479d12862f48c5054210d19add31efad269
SHA25610427ff9e8068eac1f4066dd60b7cfa29baba1e1c7992d68bdb5922396d74ad5
SHA512c31707e776a2fae7d057a17f1221e9d8aded653b1ab143f60ab46b339eb5ae4c26d31c7774bc579ef9ee7c9244b8fc6ed10530a62e499195e4396846fc0796d7
-
Filesize
548KB
MD5030a1889eedc15b6db06a48a81a94b94
SHA1b1d6d771e67c2242a24d802b45db1da13cc69b04
SHA256e9b2ce9f5bc0dd7a2dba3c195f9c607472c26fcae89e8b6bd0d3a3459e7dfcef
SHA512a5b8af1d84ba0b8c8f691d65aab1f7858c58bf18b32ebe017e1ed777ada2443615ca85a6b69cf299aecfa301bbbd337182212503a7625b7a4c69eb453f461b6d
-
Filesize
548KB
MD5030a1889eedc15b6db06a48a81a94b94
SHA1b1d6d771e67c2242a24d802b45db1da13cc69b04
SHA256e9b2ce9f5bc0dd7a2dba3c195f9c607472c26fcae89e8b6bd0d3a3459e7dfcef
SHA512a5b8af1d84ba0b8c8f691d65aab1f7858c58bf18b32ebe017e1ed777ada2443615ca85a6b69cf299aecfa301bbbd337182212503a7625b7a4c69eb453f461b6d
-
Filesize
291KB
MD51e59ecfc08924e2bfc50f57bc09e6fd2
SHA16aa90fb42cf65b5bca8f63aeb14c93a36670d813
SHA256fe4e9d855e3d3a0b5722a5429a464f26585965c68c9c1fac99ea41a83acd5a04
SHA5124317be1dccc72d5b523b8a0277ca70e95449289642fef4186b9cba5de8a830242b609c07429aa2dea8c2cc39bd35471518cb66d64856e3e6fccd1d43d851ef34
-
Filesize
291KB
MD51e59ecfc08924e2bfc50f57bc09e6fd2
SHA16aa90fb42cf65b5bca8f63aeb14c93a36670d813
SHA256fe4e9d855e3d3a0b5722a5429a464f26585965c68c9c1fac99ea41a83acd5a04
SHA5124317be1dccc72d5b523b8a0277ca70e95449289642fef4186b9cba5de8a830242b609c07429aa2dea8c2cc39bd35471518cb66d64856e3e6fccd1d43d851ef34
-
Filesize
345KB
MD5758b2a3185f77a1b38e2702f7edabb06
SHA19635547fa93f253b585b4a10e5f8bb92dd9cd11a
SHA256efe8004b092176cc3cae2d7588b41d36b87f6027d20b6803af6d36b95d1ca50e
SHA5121910866ede92ccfb3c20f19f368183fc91aa3d5083dc6ae9d3046c0309a1e10d6931e357345a568b42a319e1514c12259fbb2d2ee00a2efb8f3143a24d21a0f0
-
Filesize
345KB
MD5758b2a3185f77a1b38e2702f7edabb06
SHA19635547fa93f253b585b4a10e5f8bb92dd9cd11a
SHA256efe8004b092176cc3cae2d7588b41d36b87f6027d20b6803af6d36b95d1ca50e
SHA5121910866ede92ccfb3c20f19f368183fc91aa3d5083dc6ae9d3046c0309a1e10d6931e357345a568b42a319e1514c12259fbb2d2ee00a2efb8f3143a24d21a0f0