Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:15
Static task
static1
Behavioral task
behavioral1
Sample
812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe
Resource
win10v2004-20230220-en
General
-
Target
812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe
-
Size
687KB
-
MD5
a49ce846a74fce3f014bbf0ee3b32d81
-
SHA1
f00e603f7d66e957d63987cb50024a8aa2a8f868
-
SHA256
812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a
-
SHA512
13e7e92d9fe5f5cb7c3019f801120e7f935654a7b1bf99b2df546ebeee7f0105ec2d8a7db80d755e6fca90d15065a7294a80fd86cd20df9f7d4ef563a37dbc79
-
SSDEEP
12288:EMrLy9059oa4lqp9H7FUk6yjCdUR5QiQvr8p5UqbuX8aepAKoQ:3yX09H7FljCG5Kr8PBuXLUoQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro2130.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2130.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1952-226-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline behavioral1/memory/1952-230-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un096874.exepro2130.exequ1149.exesi000809.exepid process 1348 un096874.exe 1788 pro2130.exe 1952 qu1149.exe 4608 si000809.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro2130.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2130.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2130.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un096874.exe812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un096874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un096874.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4556 1788 WerFault.exe pro2130.exe 856 1952 WerFault.exe qu1149.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro2130.exequ1149.exesi000809.exepid process 1788 pro2130.exe 1788 pro2130.exe 1952 qu1149.exe 1952 qu1149.exe 4608 si000809.exe 4608 si000809.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro2130.exequ1149.exesi000809.exedescription pid process Token: SeDebugPrivilege 1788 pro2130.exe Token: SeDebugPrivilege 1952 qu1149.exe Token: SeDebugPrivilege 4608 si000809.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exeun096874.exedescription pid process target process PID 4480 wrote to memory of 1348 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe un096874.exe PID 4480 wrote to memory of 1348 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe un096874.exe PID 4480 wrote to memory of 1348 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe un096874.exe PID 1348 wrote to memory of 1788 1348 un096874.exe pro2130.exe PID 1348 wrote to memory of 1788 1348 un096874.exe pro2130.exe PID 1348 wrote to memory of 1788 1348 un096874.exe pro2130.exe PID 1348 wrote to memory of 1952 1348 un096874.exe qu1149.exe PID 1348 wrote to memory of 1952 1348 un096874.exe qu1149.exe PID 1348 wrote to memory of 1952 1348 un096874.exe qu1149.exe PID 4480 wrote to memory of 4608 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe si000809.exe PID 4480 wrote to memory of 4608 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe si000809.exe PID 4480 wrote to memory of 4608 4480 812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe si000809.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe"C:\Users\Admin\AppData\Local\Temp\812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 10844⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 17724⤵
- Program crash
PID:856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1788 -ip 17881⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1952 -ip 19521⤵PID:2100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5953948aa76c6166504e804faf29b654d
SHA1c8ba4e788eb252a7874f2f0caf2b9cca00618056
SHA256cd8e26021ab132581f9c9159cf0bd5708b4bf5ad9e6ce1b256dbf0ff4a0321e9
SHA51258c1669cc483be1fe009c8d6277b336d99f26edb0a2490836e7627cbb143dcf09df6c0df82dc1d17928babb72d14d2eba6d26e77c28a24868d15dfdd982a1cdd
-
Filesize
175KB
MD5953948aa76c6166504e804faf29b654d
SHA1c8ba4e788eb252a7874f2f0caf2b9cca00618056
SHA256cd8e26021ab132581f9c9159cf0bd5708b4bf5ad9e6ce1b256dbf0ff4a0321e9
SHA51258c1669cc483be1fe009c8d6277b336d99f26edb0a2490836e7627cbb143dcf09df6c0df82dc1d17928babb72d14d2eba6d26e77c28a24868d15dfdd982a1cdd
-
Filesize
545KB
MD5ab41efebaa682b7c9c4716f2b7800fa3
SHA1f4848cb9ed5fd7b4cfc11512c3770a4b0e867179
SHA25694e2cc962902057318dad537f9000dbe7c8aba0a02d6c5d18e4f793ab06397d1
SHA512ff3a38371aee05793d68ec2b41d15a02644e4fb389f601af71a007d37157dde06f432074a0b82a43d6030bfb569586e8ce479aff0604d39afc7c1730071a7596
-
Filesize
545KB
MD5ab41efebaa682b7c9c4716f2b7800fa3
SHA1f4848cb9ed5fd7b4cfc11512c3770a4b0e867179
SHA25694e2cc962902057318dad537f9000dbe7c8aba0a02d6c5d18e4f793ab06397d1
SHA512ff3a38371aee05793d68ec2b41d15a02644e4fb389f601af71a007d37157dde06f432074a0b82a43d6030bfb569586e8ce479aff0604d39afc7c1730071a7596
-
Filesize
321KB
MD5cd11a933c899bb55437da71a5b6e48de
SHA1ccc05229aeeaa7bb1b9516fab86a553e65db2667
SHA256b57f93a027fdbbfcf4572cd204e898422c6d3fbd0cdb0a191b008473159b8b8a
SHA512c046cce930cdd90058e5de654f7c576ba11be64cf4144f1ad5346b91de009c04ab8044e166a02fc5fab6a6e91a4f7ff257e8c8956097928d90bb167205019361
-
Filesize
321KB
MD5cd11a933c899bb55437da71a5b6e48de
SHA1ccc05229aeeaa7bb1b9516fab86a553e65db2667
SHA256b57f93a027fdbbfcf4572cd204e898422c6d3fbd0cdb0a191b008473159b8b8a
SHA512c046cce930cdd90058e5de654f7c576ba11be64cf4144f1ad5346b91de009c04ab8044e166a02fc5fab6a6e91a4f7ff257e8c8956097928d90bb167205019361
-
Filesize
380KB
MD54aefcff8775793114625b68b834a1f30
SHA1e8b0bad9648b24025f81fd1e9e442f0d9b2916e1
SHA256a142771a9c4e9a8e08b571301388c513a1c532a3801f8fa0eea1cd2f54bc31d6
SHA512e8675da88579a5c186db9d6d930cfb335de1d3a8220cb300891f2b280497b5e427fe042b78b8498220a1f0083f1d822e585a49ab00839b1e9ddcffbc45a9db40
-
Filesize
380KB
MD54aefcff8775793114625b68b834a1f30
SHA1e8b0bad9648b24025f81fd1e9e442f0d9b2916e1
SHA256a142771a9c4e9a8e08b571301388c513a1c532a3801f8fa0eea1cd2f54bc31d6
SHA512e8675da88579a5c186db9d6d930cfb335de1d3a8220cb300891f2b280497b5e427fe042b78b8498220a1f0083f1d822e585a49ab00839b1e9ddcffbc45a9db40