Analysis
-
max time kernel
60s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:25
Static task
static1
Behavioral task
behavioral1
Sample
3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe
Resource
win10v2004-20230220-en
General
-
Target
3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe
-
Size
690KB
-
MD5
6c8191af94e3a7bed7547485c3e4a6ae
-
SHA1
e256673c39db83176471760c3048523367309238
-
SHA256
3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5
-
SHA512
26fd48c64cc5f26fecd296539b275337e3f689048f9037114b0c5a7de746552a26dfff04ee73515d6a47675a56aa10867a210b0391d63e7a9aecb78a783b9065
-
SSDEEP
12288:pMrSy906uyVRrVAPpZLdyY65hLuyIK39uSl6hPbavhFR4figF//gO8D:LyD7rSUXfayIKNuE6ZbazR4agGOi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4622.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4622.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2080-190-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-193-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-195-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-191-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-197-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-199-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-201-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-203-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-205-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-208-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-215-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-211-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-217-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-219-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-221-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-223-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-225-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-227-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/2080-1108-0x00000000060A0000-0x00000000060B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un527674.exepro4622.exequ2373.exesi127032.exepid process 4100 un527674.exe 3228 pro4622.exe 2080 qu2373.exe 1916 si127032.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4622.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4622.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exeun527674.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un527674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un527674.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4856 3228 WerFault.exe pro4622.exe 3684 2080 WerFault.exe qu2373.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4622.exequ2373.exesi127032.exepid process 3228 pro4622.exe 3228 pro4622.exe 2080 qu2373.exe 2080 qu2373.exe 1916 si127032.exe 1916 si127032.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4622.exequ2373.exesi127032.exedescription pid process Token: SeDebugPrivilege 3228 pro4622.exe Token: SeDebugPrivilege 2080 qu2373.exe Token: SeDebugPrivilege 1916 si127032.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exeun527674.exedescription pid process target process PID 2152 wrote to memory of 4100 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe un527674.exe PID 2152 wrote to memory of 4100 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe un527674.exe PID 2152 wrote to memory of 4100 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe un527674.exe PID 4100 wrote to memory of 3228 4100 un527674.exe pro4622.exe PID 4100 wrote to memory of 3228 4100 un527674.exe pro4622.exe PID 4100 wrote to memory of 3228 4100 un527674.exe pro4622.exe PID 4100 wrote to memory of 2080 4100 un527674.exe qu2373.exe PID 4100 wrote to memory of 2080 4100 un527674.exe qu2373.exe PID 4100 wrote to memory of 2080 4100 un527674.exe qu2373.exe PID 2152 wrote to memory of 1916 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe si127032.exe PID 2152 wrote to memory of 1916 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe si127032.exe PID 2152 wrote to memory of 1916 2152 3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe si127032.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe"C:\Users\Admin\AppData\Local\Temp\3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 10284⤵
- Program crash
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 19364⤵
- Program crash
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3228 -ip 32281⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2080 -ip 20801⤵PID:3672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c2fbee9873b1d29d0a3fb24b5fed6750
SHA19310871bff5f8e9c19279f2069ccddad51da6b53
SHA256c3ae1d65d1a04dfb74bddf26175733f2089b55b166819608a365adbb2a58ec2c
SHA512b1bc1ad2168c74621edf327572f9556419ad5778efc693ab581f14c651d8a701a3b07ac29331192ec4f1e8e9a24be2bc64432803b4f322dd599a6ecef71d6dbb
-
Filesize
175KB
MD5c2fbee9873b1d29d0a3fb24b5fed6750
SHA19310871bff5f8e9c19279f2069ccddad51da6b53
SHA256c3ae1d65d1a04dfb74bddf26175733f2089b55b166819608a365adbb2a58ec2c
SHA512b1bc1ad2168c74621edf327572f9556419ad5778efc693ab581f14c651d8a701a3b07ac29331192ec4f1e8e9a24be2bc64432803b4f322dd599a6ecef71d6dbb
-
Filesize
548KB
MD52929e1e15a1d58d1b6a18f054dd04868
SHA1fb278da747b9d11ad79bd105418f9af279756801
SHA256dc96381b0ca1ed33ddd3bae009cd8fe1c36c11bb1830b0b11d1bab7a58419d33
SHA512f10b6f0fc3ae8ee04780d4883dc7a241de49ad4d79f67c55e0401a7c13d80e4fd98ed2f717c1a87eb830b2727c7254a85b87e815265717094088cc59de5911a0
-
Filesize
548KB
MD52929e1e15a1d58d1b6a18f054dd04868
SHA1fb278da747b9d11ad79bd105418f9af279756801
SHA256dc96381b0ca1ed33ddd3bae009cd8fe1c36c11bb1830b0b11d1bab7a58419d33
SHA512f10b6f0fc3ae8ee04780d4883dc7a241de49ad4d79f67c55e0401a7c13d80e4fd98ed2f717c1a87eb830b2727c7254a85b87e815265717094088cc59de5911a0
-
Filesize
291KB
MD576ecc22b3359b06091f739cdf17409a9
SHA1f3508ec56967b33f75b14bcfb9b2412ee3a681aa
SHA256fa90808cf2e4594df52d53fa6252490069d46323500e6e1131713376b7b1be91
SHA512206f652b604d5549a332d8ade82a55923ecab3b0831059bdc0064186fc36609822ee900e33dad13a9fbbdfd75b3022ca1254022b1318a80ef6532105269b0e70
-
Filesize
291KB
MD576ecc22b3359b06091f739cdf17409a9
SHA1f3508ec56967b33f75b14bcfb9b2412ee3a681aa
SHA256fa90808cf2e4594df52d53fa6252490069d46323500e6e1131713376b7b1be91
SHA512206f652b604d5549a332d8ade82a55923ecab3b0831059bdc0064186fc36609822ee900e33dad13a9fbbdfd75b3022ca1254022b1318a80ef6532105269b0e70
-
Filesize
345KB
MD5e6de5a0d17722031c175a2d51d64f1ee
SHA19ab91093a0d1b199676fa301d9a20ff90bb2c716
SHA2561d314d3a89a85eec34cff3eca9b9101fa13c887b592dfae519f447e285723b5f
SHA512d87873658e4caffdcc03bf96690683d726f6a1458082c518c51c6e1455db40572a61ac6a15f2f8b6bde373ddd08bfcc4f95e5f258e88524d981e4fbe69a9f7de
-
Filesize
345KB
MD5e6de5a0d17722031c175a2d51d64f1ee
SHA19ab91093a0d1b199676fa301d9a20ff90bb2c716
SHA2561d314d3a89a85eec34cff3eca9b9101fa13c887b592dfae519f447e285723b5f
SHA512d87873658e4caffdcc03bf96690683d726f6a1458082c518c51c6e1455db40572a61ac6a15f2f8b6bde373ddd08bfcc4f95e5f258e88524d981e4fbe69a9f7de