Analysis
-
max time kernel
145s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:35
Static task
static1
Behavioral task
behavioral1
Sample
aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe
Resource
win10v2004-20230221-en
General
-
Target
aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe
-
Size
684KB
-
MD5
601a0f7921be7d616e2436b0a720d435
-
SHA1
bbbcfd9230fafdb9776261f1eb88bf0908d8a199
-
SHA256
aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e
-
SHA512
7b017860c1054b104df03b47a36aa6e04d59ebbe98ae0494cf86d67b5676eecccddba96052a81dcda7c70d5eadbb25a22f62595497a4ff59642b1b2024a347d6
-
SSDEEP
12288:bMrMy90gBtj1k7G7DETVD4u0INO3RCuWL5Bpt4CWSDt9B:7yLT7DETVsuAWLVWWt9B
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5021.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5021.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2332-192-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-193-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-195-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-197-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-199-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-201-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-203-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-205-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-207-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-209-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-211-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-213-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-215-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-217-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-219-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-221-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-223-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-225-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/2332-1108-0x00000000072B0000-0x00000000072C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1456 un429969.exe 1524 pro5021.exe 2332 qu6183.exe 216 si085857.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5021.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un429969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un429969.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1828 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5056 1524 WerFault.exe 87 540 2332 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1524 pro5021.exe 1524 pro5021.exe 2332 qu6183.exe 2332 qu6183.exe 216 si085857.exe 216 si085857.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1524 pro5021.exe Token: SeDebugPrivilege 2332 qu6183.exe Token: SeDebugPrivilege 216 si085857.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1456 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 86 PID 1304 wrote to memory of 1456 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 86 PID 1304 wrote to memory of 1456 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 86 PID 1456 wrote to memory of 1524 1456 un429969.exe 87 PID 1456 wrote to memory of 1524 1456 un429969.exe 87 PID 1456 wrote to memory of 1524 1456 un429969.exe 87 PID 1456 wrote to memory of 2332 1456 un429969.exe 93 PID 1456 wrote to memory of 2332 1456 un429969.exe 93 PID 1456 wrote to memory of 2332 1456 un429969.exe 93 PID 1304 wrote to memory of 216 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 97 PID 1304 wrote to memory of 216 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 97 PID 1304 wrote to memory of 216 1304 aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe"C:\Users\Admin\AppData\Local\Temp\aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 10924⤵
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 13284⤵
- Program crash
PID:540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1524 -ip 15241⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2332 -ip 23321⤵PID:1300
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a7ffe7f6d5722dc328fa6ae1462a866b
SHA10a8349d4df0610c75bbcb4a90ec8c35a3aee3a60
SHA256f759067e77767f40e5857190b0431ec99f382837f97a7c8f19d58cd530f214aa
SHA5122fd94ca5914423653604ac2c2857062a40079acaf0fd59c3b8dbd4bb8834b805b70ae4ac0dae7ae1713edf974397732047308f1ec6c6098d9a990c6ae99beb2b
-
Filesize
175KB
MD5a7ffe7f6d5722dc328fa6ae1462a866b
SHA10a8349d4df0610c75bbcb4a90ec8c35a3aee3a60
SHA256f759067e77767f40e5857190b0431ec99f382837f97a7c8f19d58cd530f214aa
SHA5122fd94ca5914423653604ac2c2857062a40079acaf0fd59c3b8dbd4bb8834b805b70ae4ac0dae7ae1713edf974397732047308f1ec6c6098d9a990c6ae99beb2b
-
Filesize
541KB
MD5916555b047313d9e75d7e69b8fbed60e
SHA1d52e05fbc47f36dba12e35e331dd6bd0a7081458
SHA25623232ce3f478569138a04316d25e1a47d0d79fbee6e4683933121b08c110200a
SHA51274c4ea5dad16438acebe43eeb3a3c3639847652868506a59e30322ce8083f799feedd83f743c607d3ff0f28bf3f8c9303c7e11c5b89bf95d3dddf03f906a5251
-
Filesize
541KB
MD5916555b047313d9e75d7e69b8fbed60e
SHA1d52e05fbc47f36dba12e35e331dd6bd0a7081458
SHA25623232ce3f478569138a04316d25e1a47d0d79fbee6e4683933121b08c110200a
SHA51274c4ea5dad16438acebe43eeb3a3c3639847652868506a59e30322ce8083f799feedd83f743c607d3ff0f28bf3f8c9303c7e11c5b89bf95d3dddf03f906a5251
-
Filesize
322KB
MD5864e6a6237ef5900d4160606848ee6f0
SHA1613a19cb25d0a6ba8b4d681cea35ebe8bfc87866
SHA256f27c08369c2bb630b1712bbc9d986eab0aed6ac1088d646c4dc3075445ae4c3e
SHA512fdfef3426778ed3d99b0e5abaa71fe9f2c9336a44a03061b799816645655fa8dabc9ed9578549853fe5da5808623ee121b002d6c7ef928f9735c736cc2e03397
-
Filesize
322KB
MD5864e6a6237ef5900d4160606848ee6f0
SHA1613a19cb25d0a6ba8b4d681cea35ebe8bfc87866
SHA256f27c08369c2bb630b1712bbc9d986eab0aed6ac1088d646c4dc3075445ae4c3e
SHA512fdfef3426778ed3d99b0e5abaa71fe9f2c9336a44a03061b799816645655fa8dabc9ed9578549853fe5da5808623ee121b002d6c7ef928f9735c736cc2e03397
-
Filesize
379KB
MD5f46c44f4df4891313bb7f361efbaba95
SHA1beefb123781e4b99ede07cfd73572cb145216eae
SHA256482bfd93f65320357b646934f50e6b87493d13abb02502fa0fb651d1b5a2d1c9
SHA5126d214a7e8434f00f57877eb90d1c00786ce56bcb537509f52e77e2c7688a2f189feb05fb12087709263dad442ebf4df01002182b063b7f1cb61e84753746a70e
-
Filesize
379KB
MD5f46c44f4df4891313bb7f361efbaba95
SHA1beefb123781e4b99ede07cfd73572cb145216eae
SHA256482bfd93f65320357b646934f50e6b87493d13abb02502fa0fb651d1b5a2d1c9
SHA5126d214a7e8434f00f57877eb90d1c00786ce56bcb537509f52e77e2c7688a2f189feb05fb12087709263dad442ebf4df01002182b063b7f1cb61e84753746a70e