Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe
Resource
win10v2004-20230220-en
General
-
Target
021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe
-
Size
683KB
-
MD5
f352e6e65fc953f631c2cdcca9a68c8d
-
SHA1
6c46a12a67975d4f45a6ad34922b1c526c509bd4
-
SHA256
021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9
-
SHA512
fa8acae5a58459e1a5101e34298fea8c9066e1ef78c6389127ee964254a16a13207b70284153dfe37f9d9d0f7915a42539cdeb3052327aa7482b018994ade9a5
-
SSDEEP
12288:bMr4y90fNholljwQKELGGBeustGVjrD410xNdzx+SjbZYF4AWXgnaeZ0:ryONqlNzjeus2jrs1AzxEuaPZ0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1697.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1697.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1697.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2356-193-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-199-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-219-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-223-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-225-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/2356-227-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un520912.exepro1697.exequ7106.exesi345048.exepid process 1604 un520912.exe 644 pro1697.exe 2356 qu7106.exe 1472 si345048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1697.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1697.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exeun520912.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un520912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un520912.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3304 644 WerFault.exe pro1697.exe 1272 2356 WerFault.exe qu7106.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1697.exequ7106.exesi345048.exepid process 644 pro1697.exe 644 pro1697.exe 2356 qu7106.exe 2356 qu7106.exe 1472 si345048.exe 1472 si345048.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1697.exequ7106.exesi345048.exedescription pid process Token: SeDebugPrivilege 644 pro1697.exe Token: SeDebugPrivilege 2356 qu7106.exe Token: SeDebugPrivilege 1472 si345048.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exeun520912.exedescription pid process target process PID 2680 wrote to memory of 1604 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe un520912.exe PID 2680 wrote to memory of 1604 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe un520912.exe PID 2680 wrote to memory of 1604 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe un520912.exe PID 1604 wrote to memory of 644 1604 un520912.exe pro1697.exe PID 1604 wrote to memory of 644 1604 un520912.exe pro1697.exe PID 1604 wrote to memory of 644 1604 un520912.exe pro1697.exe PID 1604 wrote to memory of 2356 1604 un520912.exe qu7106.exe PID 1604 wrote to memory of 2356 1604 un520912.exe qu7106.exe PID 1604 wrote to memory of 2356 1604 un520912.exe qu7106.exe PID 2680 wrote to memory of 1472 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe si345048.exe PID 2680 wrote to memory of 1472 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe si345048.exe PID 2680 wrote to memory of 1472 2680 021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe si345048.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe"C:\Users\Admin\AppData\Local\Temp\021461ce40abf7749c63d6556fd19bf9f37415678f1146f014ca819416f00ff9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520912.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1697.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 10964⤵
- Program crash
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7106.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 13484⤵
- Program crash
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si345048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si345048.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 644 -ip 6441⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2356 -ip 23561⤵PID:2396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD555b784a966bc2cf062009d10ac39780e
SHA1722a5fc53a6d8446eb0f12a06f7d3c60065b2a2b
SHA256e6ccfe0911c91e51bf2e05ef1672a5d4815b2682392c50d0209cb91af265dde4
SHA5127d5662cc1bff87cde5c15834ba97b4911e721633bce25c076b7d085c55b4185e54a0698ff19e657e61461a13b3f37d8fd85d18017d152fbda4ac886b863ada30
-
Filesize
175KB
MD555b784a966bc2cf062009d10ac39780e
SHA1722a5fc53a6d8446eb0f12a06f7d3c60065b2a2b
SHA256e6ccfe0911c91e51bf2e05ef1672a5d4815b2682392c50d0209cb91af265dde4
SHA5127d5662cc1bff87cde5c15834ba97b4911e721633bce25c076b7d085c55b4185e54a0698ff19e657e61461a13b3f37d8fd85d18017d152fbda4ac886b863ada30
-
Filesize
541KB
MD543ccc757d8ea015cc8b2315a3d958c14
SHA149465a02d95bd5d95d6acd579c81f34e0a34de2c
SHA256a45b5d69017fc75638ada700b304b169465805ab8056d45c96492371c52087fd
SHA512ba7590bb82b72686b905c60c73b3b96cc9962187810d03d004a25c9d25f62146b420ac7fc1f20e1c8395cccaf4f27b11d81481e042e6c2426ad52e939f4c3c05
-
Filesize
541KB
MD543ccc757d8ea015cc8b2315a3d958c14
SHA149465a02d95bd5d95d6acd579c81f34e0a34de2c
SHA256a45b5d69017fc75638ada700b304b169465805ab8056d45c96492371c52087fd
SHA512ba7590bb82b72686b905c60c73b3b96cc9962187810d03d004a25c9d25f62146b420ac7fc1f20e1c8395cccaf4f27b11d81481e042e6c2426ad52e939f4c3c05
-
Filesize
322KB
MD5d54119701dc9586e580cc160a96ef064
SHA18ff603015ce6fdf28dc4aca474ed332ccfeab579
SHA25605a814d24f4d0eea0bcaef4643ab862722ee4f3d903d21278b5a2038903259e9
SHA512ad6e258f464261da5b3b2178c1938e9b9bfc72bc4a694b27f922b0ed1f737ba85d3202eb8ef730aec12c83f8697642ede3bafbbf2ebc7b3a99eb0e6b9ea2d51d
-
Filesize
322KB
MD5d54119701dc9586e580cc160a96ef064
SHA18ff603015ce6fdf28dc4aca474ed332ccfeab579
SHA25605a814d24f4d0eea0bcaef4643ab862722ee4f3d903d21278b5a2038903259e9
SHA512ad6e258f464261da5b3b2178c1938e9b9bfc72bc4a694b27f922b0ed1f737ba85d3202eb8ef730aec12c83f8697642ede3bafbbf2ebc7b3a99eb0e6b9ea2d51d
-
Filesize
379KB
MD59b13b110a8a4cecffa14e1f18fd06101
SHA16c49651dadc173a62e128cc8995c148fcda2b316
SHA2568acaf49ec3a8a272a55dc5efb308b95d32c54a7049c3a320c4b0b9921c41e8bf
SHA512371ddca66215713ac489962f9056653be685b57c33eaaae7257d6bdd93e0f9bc1d4d66f466414497798a7eb7a830db9ab087404efaf10fd71a3e951e7752fe18
-
Filesize
379KB
MD59b13b110a8a4cecffa14e1f18fd06101
SHA16c49651dadc173a62e128cc8995c148fcda2b316
SHA2568acaf49ec3a8a272a55dc5efb308b95d32c54a7049c3a320c4b0b9921c41e8bf
SHA512371ddca66215713ac489962f9056653be685b57c33eaaae7257d6bdd93e0f9bc1d4d66f466414497798a7eb7a830db9ab087404efaf10fd71a3e951e7752fe18