Analysis
-
max time kernel
62s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:16
Static task
static1
Behavioral task
behavioral1
Sample
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe
Resource
win10v2004-20230220-en
General
-
Target
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe
-
Size
686KB
-
MD5
435f3c10535cc1b2ee46a66c07ab92d8
-
SHA1
75a763f5e6dc32ba6595ad661426f11340b35347
-
SHA256
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3
-
SHA512
8f57b18657a3ba29827f72ce179106e4b84d934d0c9f988bce7045885287a2616f1f7c257961ae44062c80c57cc135f06e277a1d2df58818c3aa0d29e1cd3413
-
SSDEEP
12288:9Mrxy90l5lKjrLCgddadqOGH6yjCB+R50FJMhLCslUMJuXixJN5vDea/:0yY5lMldIzGBjC450bgLCQhuXENh/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0074.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0074.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0074.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3132-194-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-195-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-197-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-199-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-201-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-203-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-205-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-207-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-209-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-211-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-213-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-215-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-217-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-219-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-221-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-223-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-225-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-227-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/3132-1110-0x0000000007340000-0x0000000007350000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un681488.exepro0074.exequ4120.exesi316666.exepid process 2600 un681488.exe 1164 pro0074.exe 3132 qu4120.exe 1908 si316666.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0074.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0074.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exeun681488.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un681488.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un681488.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4184 1164 WerFault.exe pro0074.exe 3460 3132 WerFault.exe qu4120.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0074.exequ4120.exesi316666.exepid process 1164 pro0074.exe 1164 pro0074.exe 3132 qu4120.exe 3132 qu4120.exe 1908 si316666.exe 1908 si316666.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0074.exequ4120.exesi316666.exedescription pid process Token: SeDebugPrivilege 1164 pro0074.exe Token: SeDebugPrivilege 3132 qu4120.exe Token: SeDebugPrivilege 1908 si316666.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exeun681488.exedescription pid process target process PID 1696 wrote to memory of 2600 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe un681488.exe PID 1696 wrote to memory of 2600 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe un681488.exe PID 1696 wrote to memory of 2600 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe un681488.exe PID 2600 wrote to memory of 1164 2600 un681488.exe pro0074.exe PID 2600 wrote to memory of 1164 2600 un681488.exe pro0074.exe PID 2600 wrote to memory of 1164 2600 un681488.exe pro0074.exe PID 2600 wrote to memory of 3132 2600 un681488.exe qu4120.exe PID 2600 wrote to memory of 3132 2600 un681488.exe qu4120.exe PID 2600 wrote to memory of 3132 2600 un681488.exe qu4120.exe PID 1696 wrote to memory of 1908 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe si316666.exe PID 1696 wrote to memory of 1908 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe si316666.exe PID 1696 wrote to memory of 1908 1696 4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe si316666.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe"C:\Users\Admin\AppData\Local\Temp\4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681488.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681488.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0074.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 10844⤵
- Program crash
PID:4184
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4120.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4120.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 13524⤵
- Program crash
PID:3460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si316666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si316666.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1164 -ip 11641⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3132 -ip 31321⤵PID:4200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51644d28e20651e1f7ab7a4bb00639aea
SHA1111862198fa381e041d9d05dca61eedcde0d4ddf
SHA2564681dcf67c4b92b8e9531e399fd694573abc78a7c7025c347c8f17bd8879a78c
SHA512108a7ced1ad52e78eec7caa37aae6e0d1919580a2d35d7d1643c12b9287295102e92f8d0399b85d621879b700164c5c8260bba90dc2369f8e5a59d3b06959b59
-
Filesize
175KB
MD51644d28e20651e1f7ab7a4bb00639aea
SHA1111862198fa381e041d9d05dca61eedcde0d4ddf
SHA2564681dcf67c4b92b8e9531e399fd694573abc78a7c7025c347c8f17bd8879a78c
SHA512108a7ced1ad52e78eec7caa37aae6e0d1919580a2d35d7d1643c12b9287295102e92f8d0399b85d621879b700164c5c8260bba90dc2369f8e5a59d3b06959b59
-
Filesize
545KB
MD5995e3892622a0687f25b68fc18a0525e
SHA120a50f64a208040a5882c38e76d2f18d7ca51aca
SHA2563302eaeb0e4eb5d5b58c05a34278a55f39d34d8d6a3c95da0eec0effed5a54f0
SHA512ea340a6f212af999d89786224743b203850ffa010f3a6c37e5ea057c06177c15e492048f3fd6eea15bf39021ec38ae3cadb33e80b6c59d06526285132e1a5ae7
-
Filesize
545KB
MD5995e3892622a0687f25b68fc18a0525e
SHA120a50f64a208040a5882c38e76d2f18d7ca51aca
SHA2563302eaeb0e4eb5d5b58c05a34278a55f39d34d8d6a3c95da0eec0effed5a54f0
SHA512ea340a6f212af999d89786224743b203850ffa010f3a6c37e5ea057c06177c15e492048f3fd6eea15bf39021ec38ae3cadb33e80b6c59d06526285132e1a5ae7
-
Filesize
321KB
MD5362d4e3870ffa567bc134f772c956456
SHA143cac50640d6b6084c56eb426f719c3c1b1f7e1b
SHA256036a33278f978cdb12a9ea8dceac8ad2091791647aa848b119bd1933d3cc7976
SHA5124ead9f0c6641200d705be2f1e33a5f4323637e3c808201cee4ff0b5b38a949960416801d67ead8ddad5839cf55b93100a3b0588c5d701c19689104fe22ae1fbc
-
Filesize
321KB
MD5362d4e3870ffa567bc134f772c956456
SHA143cac50640d6b6084c56eb426f719c3c1b1f7e1b
SHA256036a33278f978cdb12a9ea8dceac8ad2091791647aa848b119bd1933d3cc7976
SHA5124ead9f0c6641200d705be2f1e33a5f4323637e3c808201cee4ff0b5b38a949960416801d67ead8ddad5839cf55b93100a3b0588c5d701c19689104fe22ae1fbc
-
Filesize
380KB
MD5fe7c1bcfc91cfe902bef1d84229ccdf3
SHA1223433d0070c1a855e8a74fdeb89e811684249d8
SHA256bd8b3143b4396b03d94023d66c5ab4911c80c455160077aa89f4d8de3dfc0b34
SHA512ece50268870c5d0990b9f7c5a2c6c58b5981c8cd5bab1b30aaa7d9d56eee6f49c403b95eaabc281c1ef7361b9ccb833b99901f9cb762612a7d7a2b2da715851f
-
Filesize
380KB
MD5fe7c1bcfc91cfe902bef1d84229ccdf3
SHA1223433d0070c1a855e8a74fdeb89e811684249d8
SHA256bd8b3143b4396b03d94023d66c5ab4911c80c455160077aa89f4d8de3dfc0b34
SHA512ece50268870c5d0990b9f7c5a2c6c58b5981c8cd5bab1b30aaa7d9d56eee6f49c403b95eaabc281c1ef7361b9ccb833b99901f9cb762612a7d7a2b2da715851f