Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:46
Static task
static1
Behavioral task
behavioral1
Sample
3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe
Resource
win10v2004-20230220-en
General
-
Target
3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe
-
Size
712KB
-
MD5
d2407946817d48fde12d4a37cd68fd39
-
SHA1
48fdced508c678b0737a8c0f039185ea78aa7802
-
SHA256
3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71
-
SHA512
67ee4103f3482c1e48e42af009d8fb0c91f5f091f69edb158634d04ea6a3f8e9b3c7586bb7543d9eec568293d1f97c699ae1360ee643f80ceec8ecf67deaeed9
-
SSDEEP
12288:cMr/y909rVrS79JiNnG6q1oBTdDpRzr07NCzRO5pgIUVdmJMv7/PtfigMZ/N2rM6:jykrc77ixTq1I1TbmJMDPtagcorMH8H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6834.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6834.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2332-192-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-193-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-195-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-197-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-199-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-201-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-203-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-205-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-207-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-209-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-211-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-213-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-215-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-217-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-219-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-221-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-223-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-225-0x0000000003A80000-0x0000000003ABF000-memory.dmp family_redline behavioral1/memory/2332-1111-0x0000000006260000-0x0000000006270000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un094566.exepro6834.exequ7920.exesi661013.exepid process 4480 un094566.exe 2024 pro6834.exe 2332 qu7920.exe 3708 si661013.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6834.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6834.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un094566.exe3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un094566.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un094566.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2152 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4236 2024 WerFault.exe pro6834.exe 1304 2332 WerFault.exe qu7920.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6834.exequ7920.exesi661013.exepid process 2024 pro6834.exe 2024 pro6834.exe 2332 qu7920.exe 2332 qu7920.exe 3708 si661013.exe 3708 si661013.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6834.exequ7920.exesi661013.exedescription pid process Token: SeDebugPrivilege 2024 pro6834.exe Token: SeDebugPrivilege 2332 qu7920.exe Token: SeDebugPrivilege 3708 si661013.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exeun094566.exedescription pid process target process PID 1244 wrote to memory of 4480 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe un094566.exe PID 1244 wrote to memory of 4480 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe un094566.exe PID 1244 wrote to memory of 4480 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe un094566.exe PID 4480 wrote to memory of 2024 4480 un094566.exe pro6834.exe PID 4480 wrote to memory of 2024 4480 un094566.exe pro6834.exe PID 4480 wrote to memory of 2024 4480 un094566.exe pro6834.exe PID 4480 wrote to memory of 2332 4480 un094566.exe qu7920.exe PID 4480 wrote to memory of 2332 4480 un094566.exe qu7920.exe PID 4480 wrote to memory of 2332 4480 un094566.exe qu7920.exe PID 1244 wrote to memory of 3708 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe si661013.exe PID 1244 wrote to memory of 3708 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe si661013.exe PID 1244 wrote to memory of 3708 1244 3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe si661013.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe"C:\Users\Admin\AppData\Local\Temp\3a9b524746f8836b66ae64183f154610b6ab0093e3ca25b7686d9137bed31e71.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094566.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094566.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6834.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10804⤵
- Program crash
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7920.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 13524⤵
- Program crash
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661013.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2024 -ip 20241⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2332 -ip 23321⤵PID:2488
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5afdfde1f75fbe2dcc12c579b844461f4
SHA14b96a66372a83b4b656ec3f8abe99ee2a17bc4cd
SHA256cccec693d8661681acb074521fd2982f137651a82e8444fc2949657dee98148c
SHA512db91d0eeb029a201057a14ec3d88bc1f8829a44fd6f0cf4f10999824ce2aea9ccfa577b0aa8c1254585cc40b5e35eca62e6400cb9f8d71f6a056dfeef74b70fc
-
Filesize
175KB
MD5afdfde1f75fbe2dcc12c579b844461f4
SHA14b96a66372a83b4b656ec3f8abe99ee2a17bc4cd
SHA256cccec693d8661681acb074521fd2982f137651a82e8444fc2949657dee98148c
SHA512db91d0eeb029a201057a14ec3d88bc1f8829a44fd6f0cf4f10999824ce2aea9ccfa577b0aa8c1254585cc40b5e35eca62e6400cb9f8d71f6a056dfeef74b70fc
-
Filesize
570KB
MD59a99a2c5c5e5cb32052c72289417c5be
SHA131f8cf427f6917ba38aa8e6290607743bae70d39
SHA256354771d5353c29146a09630644ee40de362705fe345bfa0fa19fe184fcac8dd7
SHA512a673604b6b52a8d73b78768bde7be95093e2eda263f04e9d59891e1b0e2e797bf151e1b45c3a8d8772bc4394f5cd65a21258a8f20fa89acf5cbc0798efb0b208
-
Filesize
570KB
MD59a99a2c5c5e5cb32052c72289417c5be
SHA131f8cf427f6917ba38aa8e6290607743bae70d39
SHA256354771d5353c29146a09630644ee40de362705fe345bfa0fa19fe184fcac8dd7
SHA512a673604b6b52a8d73b78768bde7be95093e2eda263f04e9d59891e1b0e2e797bf151e1b45c3a8d8772bc4394f5cd65a21258a8f20fa89acf5cbc0798efb0b208
-
Filesize
322KB
MD5d370697907586196e7b10d79e2946d1e
SHA128af16483e9dd5081f12cbf36d71098ca1ec3406
SHA256ae18e9b45d4030540f5bb3cfb5e7bb79042706fcbebb4c31ffe44226407b5899
SHA5124b396e11962dd0e0f22ff56a1c43a9348d2373a7767cb4fd99d7ca68c870f86935c215d476058ba911b46d99f42377773069069443b0e921bf8668d813ac9bee
-
Filesize
322KB
MD5d370697907586196e7b10d79e2946d1e
SHA128af16483e9dd5081f12cbf36d71098ca1ec3406
SHA256ae18e9b45d4030540f5bb3cfb5e7bb79042706fcbebb4c31ffe44226407b5899
SHA5124b396e11962dd0e0f22ff56a1c43a9348d2373a7767cb4fd99d7ca68c870f86935c215d476058ba911b46d99f42377773069069443b0e921bf8668d813ac9bee
-
Filesize
345KB
MD5db38f108cd011c662a224ea03b01506d
SHA1013b599a5140e66bf78871f017cb81fefc1710ab
SHA25656c68c5acd27c36f2056ec1e0179041521fa7961f3799fb519ab3e4fd5f4a714
SHA5120898685046f786289311c9da2cd433840f431fa1eb492bcd8c94741547e53f9f6f891a6d59e09a566a8b1c141b7caaf0860416d619eab3f8e0b5232f7c29b0f1
-
Filesize
345KB
MD5db38f108cd011c662a224ea03b01506d
SHA1013b599a5140e66bf78871f017cb81fefc1710ab
SHA25656c68c5acd27c36f2056ec1e0179041521fa7961f3799fb519ab3e4fd5f4a714
SHA5120898685046f786289311c9da2cd433840f431fa1eb492bcd8c94741547e53f9f6f891a6d59e09a566a8b1c141b7caaf0860416d619eab3f8e0b5232f7c29b0f1