Analysis
-
max time kernel
60s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe
Resource
win10v2004-20230220-en
General
-
Target
02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe
-
Size
690KB
-
MD5
dda2e29c4c3e859082cf5c09a9ded730
-
SHA1
b76302590fccf549dbc21fb96a301e4a163c04bd
-
SHA256
02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9
-
SHA512
9c43feb420d22b35d58beaed85a8146a0c07eac571b7ebf2f0b199c8de2a316dc2833aa83ea3397e623609d57028e18505f9b24d9c5c37e4b38a7c35e862bd65
-
SSDEEP
12288:nMrgy901YicYgTFa13zEvfVyK65hLuXeaMSKx3PHXLihOuavBFd6figbjy/+PK7T:3y+TcYg0E85fauaLw3PHbGOuazd6ageT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7004.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2884-189-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-190-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-192-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-194-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-196-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-198-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-200-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-202-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-204-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-208-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-206-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-210-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-212-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-214-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-216-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-218-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-220-0x0000000006000000-0x000000000603F000-memory.dmp family_redline behavioral1/memory/2884-222-0x0000000006000000-0x000000000603F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1256 un682180.exe 4020 pro7004.exe 2884 qu5443.exe 3056 si884141.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7004.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un682180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un682180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1272 4020 WerFault.exe 85 2640 2884 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4020 pro7004.exe 4020 pro7004.exe 2884 qu5443.exe 2884 qu5443.exe 3056 si884141.exe 3056 si884141.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4020 pro7004.exe Token: SeDebugPrivilege 2884 qu5443.exe Token: SeDebugPrivilege 3056 si884141.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4740 wrote to memory of 1256 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 84 PID 4740 wrote to memory of 1256 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 84 PID 4740 wrote to memory of 1256 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 84 PID 1256 wrote to memory of 4020 1256 un682180.exe 85 PID 1256 wrote to memory of 4020 1256 un682180.exe 85 PID 1256 wrote to memory of 4020 1256 un682180.exe 85 PID 1256 wrote to memory of 2884 1256 un682180.exe 91 PID 1256 wrote to memory of 2884 1256 un682180.exe 91 PID 1256 wrote to memory of 2884 1256 un682180.exe 91 PID 4740 wrote to memory of 3056 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 95 PID 4740 wrote to memory of 3056 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 95 PID 4740 wrote to memory of 3056 4740 02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe"C:\Users\Admin\AppData\Local\Temp\02c39595e0c4b2a9e37bea25bbe4dbafdc4bf8978217b18edbf8652b550616e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7004.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7004.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 10884⤵
- Program crash
PID:1272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5443.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 13324⤵
- Program crash
PID:2640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si884141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si884141.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4020 -ip 40201⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2884 -ip 28841⤵PID:3220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ae26297715cc109c042d3231684aad5d
SHA1d10de0e5131b08a9d5c7fa0cbbf90a89efec933b
SHA2563639809dcb119d187afb980561235fa792cff97d8a770098a163ff8fdf761f1b
SHA5120a3b2276766b074a599d21dea1acc7a63abbcdbcf2b91fe21220d2114c27f694abde338fecac1d64a8fbc46e1b3dcdd62bdd15ade5c2a2651135f57f35f69b64
-
Filesize
175KB
MD5ae26297715cc109c042d3231684aad5d
SHA1d10de0e5131b08a9d5c7fa0cbbf90a89efec933b
SHA2563639809dcb119d187afb980561235fa792cff97d8a770098a163ff8fdf761f1b
SHA5120a3b2276766b074a599d21dea1acc7a63abbcdbcf2b91fe21220d2114c27f694abde338fecac1d64a8fbc46e1b3dcdd62bdd15ade5c2a2651135f57f35f69b64
-
Filesize
548KB
MD5bc7b536d732ec0063b3abfcb403296ab
SHA1624e754ccbd150a85c537d776933813a07be4c3c
SHA256ad45ee4d6aa8cc4d1c1ad316f788c881d2878e04113750c13075aa30f342224b
SHA512da0577c42c258193e054fcef6db00661eb783449bc548b020cf20038eb5db786234170ffd7d2f88c2bbb1278fbbf9953ec07c73470d7b70418a6b70341f6cb48
-
Filesize
548KB
MD5bc7b536d732ec0063b3abfcb403296ab
SHA1624e754ccbd150a85c537d776933813a07be4c3c
SHA256ad45ee4d6aa8cc4d1c1ad316f788c881d2878e04113750c13075aa30f342224b
SHA512da0577c42c258193e054fcef6db00661eb783449bc548b020cf20038eb5db786234170ffd7d2f88c2bbb1278fbbf9953ec07c73470d7b70418a6b70341f6cb48
-
Filesize
291KB
MD5e6ad032d27965bf1fc2cb1c8df5b8e10
SHA118d44bf49843f10d2971bd0f295b65efaf0b9900
SHA256bc6285748f5ef893271b53ecf20a497ea11c1f416a903238a5c365ae981acbae
SHA5129403dadb73fe1298267669bdf298f9af7dc256fcd053f7775603ce3ef0e129560919940d087284ab8f54eb4b793edbd480ba39c596e7638017aba099e9fa8393
-
Filesize
291KB
MD5e6ad032d27965bf1fc2cb1c8df5b8e10
SHA118d44bf49843f10d2971bd0f295b65efaf0b9900
SHA256bc6285748f5ef893271b53ecf20a497ea11c1f416a903238a5c365ae981acbae
SHA5129403dadb73fe1298267669bdf298f9af7dc256fcd053f7775603ce3ef0e129560919940d087284ab8f54eb4b793edbd480ba39c596e7638017aba099e9fa8393
-
Filesize
345KB
MD5f7bced85fa9530e0bb3d0ac7c7248f86
SHA1f57a175d61abb8eccf8fc0969bd67d1b79934696
SHA25694693978c3d04df1591170b527c00346a684b746b5b551e564ff7584a2d2bb61
SHA512c6ac6429868cf83246751457f823c70df46c2dd6e81f6d983b30a5f510db23969306e48a0ce97df5c08a97ab8d21695217863f3624bc6110167caac8810ffc7d
-
Filesize
345KB
MD5f7bced85fa9530e0bb3d0ac7c7248f86
SHA1f57a175d61abb8eccf8fc0969bd67d1b79934696
SHA25694693978c3d04df1591170b527c00346a684b746b5b551e564ff7584a2d2bb61
SHA512c6ac6429868cf83246751457f823c70df46c2dd6e81f6d983b30a5f510db23969306e48a0ce97df5c08a97ab8d21695217863f3624bc6110167caac8810ffc7d