Analysis
-
max time kernel
124s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:25
Static task
static1
Behavioral task
behavioral1
Sample
951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe
Resource
win10v2004-20230220-en
General
-
Target
951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe
-
Size
683KB
-
MD5
f058a9050b16e8e3e4bad3c1d39ef3f8
-
SHA1
791b8dac0830a84ae98ae56d9013c4d2360a703f
-
SHA256
951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d
-
SHA512
7defac0e10804875472284046251c545da4b383b37fc396f0934b9934df3dfc7b628ddc4414c7c8d6725d4fab10bb36b24bd7dae51f6ce6f4d37bca3029b2109
-
SSDEEP
12288:4MrCy90r2dn+0+5i6yAZU0DNxyUr5X9fA4XWzjo/l9:6yI2J+RU6yAiWRt9fjXN9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5453.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5453.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3716-196-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-202-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3716-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un947040.exepro5453.exequ8857.exesi114789.exepid process 3268 un947040.exe 4404 pro5453.exe 3716 qu8857.exe 4892 si114789.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5453.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5453.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exeun947040.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un947040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un947040.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4380 4404 WerFault.exe pro5453.exe 4808 3716 WerFault.exe qu8857.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5453.exequ8857.exesi114789.exepid process 4404 pro5453.exe 4404 pro5453.exe 3716 qu8857.exe 3716 qu8857.exe 4892 si114789.exe 4892 si114789.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5453.exequ8857.exesi114789.exedescription pid process Token: SeDebugPrivilege 4404 pro5453.exe Token: SeDebugPrivilege 3716 qu8857.exe Token: SeDebugPrivilege 4892 si114789.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exeun947040.exedescription pid process target process PID 984 wrote to memory of 3268 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe un947040.exe PID 984 wrote to memory of 3268 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe un947040.exe PID 984 wrote to memory of 3268 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe un947040.exe PID 3268 wrote to memory of 4404 3268 un947040.exe pro5453.exe PID 3268 wrote to memory of 4404 3268 un947040.exe pro5453.exe PID 3268 wrote to memory of 4404 3268 un947040.exe pro5453.exe PID 3268 wrote to memory of 3716 3268 un947040.exe qu8857.exe PID 3268 wrote to memory of 3716 3268 un947040.exe qu8857.exe PID 3268 wrote to memory of 3716 3268 un947040.exe qu8857.exe PID 984 wrote to memory of 4892 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe si114789.exe PID 984 wrote to memory of 4892 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe si114789.exe PID 984 wrote to memory of 4892 984 951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe si114789.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe"C:\Users\Admin\AppData\Local\Temp\951f254449ce13ec08d8f004a97f37464aaefdfdec9804e034e16b4b2876eb2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un947040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un947040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5453.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 10844⤵
- Program crash
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8857.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 13684⤵
- Program crash
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si114789.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si114789.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4404 -ip 44041⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3716 -ip 37161⤵PID:3328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c0325c31fbe482099c8faa1238989cfd
SHA1f8685abcb06d9ebe08e04e573a41ab2011db5211
SHA256cd3086103acffb4d498bbeaa0702109301685a52e05b3bf5cf0ff1a66e8cff52
SHA51216748dddbf03e64216783bdf1e942ccdb6eddb37d94eaad85b687a9573ba425e2246f0afc3153f1d72810f873a26ca5c3af2d7d5901b0fc20e7c287a4a35813c
-
Filesize
175KB
MD5c0325c31fbe482099c8faa1238989cfd
SHA1f8685abcb06d9ebe08e04e573a41ab2011db5211
SHA256cd3086103acffb4d498bbeaa0702109301685a52e05b3bf5cf0ff1a66e8cff52
SHA51216748dddbf03e64216783bdf1e942ccdb6eddb37d94eaad85b687a9573ba425e2246f0afc3153f1d72810f873a26ca5c3af2d7d5901b0fc20e7c287a4a35813c
-
Filesize
542KB
MD5889b9e0d0843dfc6a71447495110f3ee
SHA160876cd63012be665d3a95fe62f37c52e7f45edc
SHA256f04ea7c66375998cebc60275819a5f6be10768885d5dee9400b5ebcb1043a857
SHA51242d85b7e76c4a8ffa5b7d098ad0593cc579bcc17bf9e1617815fc301b5a4b6f0780e0515036ac18df8ce416bf52c37a492263f780b9cacca662d15e97e5a781b
-
Filesize
542KB
MD5889b9e0d0843dfc6a71447495110f3ee
SHA160876cd63012be665d3a95fe62f37c52e7f45edc
SHA256f04ea7c66375998cebc60275819a5f6be10768885d5dee9400b5ebcb1043a857
SHA51242d85b7e76c4a8ffa5b7d098ad0593cc579bcc17bf9e1617815fc301b5a4b6f0780e0515036ac18df8ce416bf52c37a492263f780b9cacca662d15e97e5a781b
-
Filesize
322KB
MD5506131550b0bb3b86e32978cb9f91b65
SHA1bb0a820128d6d09fe861f31fa4465d3529657d33
SHA2564e2c692e81b17a190636fb1badb6997abc092daca035d20851d1781e6f0834dc
SHA512b39e3458a8529ee673c6c5df3ce7635a5fc559c17c2b1a7fd3110dcfcc28344b3aa2fdb50d350bb242d2e748f7cd145b887cb61b43006a0a5ab8cc1f666b0b3e
-
Filesize
322KB
MD5506131550b0bb3b86e32978cb9f91b65
SHA1bb0a820128d6d09fe861f31fa4465d3529657d33
SHA2564e2c692e81b17a190636fb1badb6997abc092daca035d20851d1781e6f0834dc
SHA512b39e3458a8529ee673c6c5df3ce7635a5fc559c17c2b1a7fd3110dcfcc28344b3aa2fdb50d350bb242d2e748f7cd145b887cb61b43006a0a5ab8cc1f666b0b3e
-
Filesize
379KB
MD5a415482490b01352c97e25f75d7b7c12
SHA10378220df056da923cc15b3edb63c6d1244ad27c
SHA25641e8ebabe9ad1e6fbb0f7251a70823c701861a5b8c81c86063a0c3ae93625d50
SHA51294f9e558c2c16c44543cd2a29e0e03ebb9ec97de44a19bbc8f486ef539a92e56d7ba675e24145173253c3fcbf5e040bceb72adbc531d264a8d17afdc0597deca
-
Filesize
379KB
MD5a415482490b01352c97e25f75d7b7c12
SHA10378220df056da923cc15b3edb63c6d1244ad27c
SHA25641e8ebabe9ad1e6fbb0f7251a70823c701861a5b8c81c86063a0c3ae93625d50
SHA51294f9e558c2c16c44543cd2a29e0e03ebb9ec97de44a19bbc8f486ef539a92e56d7ba675e24145173253c3fcbf5e040bceb72adbc531d264a8d17afdc0597deca