Analysis
-
max time kernel
68s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:38
Static task
static1
Behavioral task
behavioral1
Sample
123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe
Resource
win10v2004-20230220-en
General
-
Target
123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe
-
Size
683KB
-
MD5
536c4dedccc4618fececdbc758d232c0
-
SHA1
4debdb943b4ac73420a7a2323638fc37ed5782d1
-
SHA256
123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a
-
SHA512
7dc9f1b4ecdf3cb29d0e815ae4cd83ce75cef0b96a5e2be86c05a2cfc0e0509e9c0b45b51a33fff1018cdf23d2dbd792e7fa05f38c562e4e8a2a97c035a38c8c
-
SSDEEP
12288:5Mrwy90dvvygfpT/YjSXrOMWyDHBC0PNYhQQIN8w44W6mX85:NywK2Tg+bO4DHk7zxTLM5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6146.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6146.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3648-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3648-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un328869.exepro6146.exequ2943.exesi825997.exepid process 2704 un328869.exe 4020 pro6146.exe 3648 qu2943.exe 3964 si825997.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6146.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6146.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exeun328869.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un328869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un328869.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3820 4020 WerFault.exe pro6146.exe 2948 3648 WerFault.exe qu2943.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6146.exequ2943.exesi825997.exepid process 4020 pro6146.exe 4020 pro6146.exe 3648 qu2943.exe 3648 qu2943.exe 3964 si825997.exe 3964 si825997.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6146.exequ2943.exesi825997.exedescription pid process Token: SeDebugPrivilege 4020 pro6146.exe Token: SeDebugPrivilege 3648 qu2943.exe Token: SeDebugPrivilege 3964 si825997.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exeun328869.exedescription pid process target process PID 932 wrote to memory of 2704 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe un328869.exe PID 932 wrote to memory of 2704 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe un328869.exe PID 932 wrote to memory of 2704 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe un328869.exe PID 2704 wrote to memory of 4020 2704 un328869.exe pro6146.exe PID 2704 wrote to memory of 4020 2704 un328869.exe pro6146.exe PID 2704 wrote to memory of 4020 2704 un328869.exe pro6146.exe PID 2704 wrote to memory of 3648 2704 un328869.exe qu2943.exe PID 2704 wrote to memory of 3648 2704 un328869.exe qu2943.exe PID 2704 wrote to memory of 3648 2704 un328869.exe qu2943.exe PID 932 wrote to memory of 3964 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe si825997.exe PID 932 wrote to memory of 3964 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe si825997.exe PID 932 wrote to memory of 3964 932 123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe si825997.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe"C:\Users\Admin\AppData\Local\Temp\123fd3fe963f8ce71b0470cb809428f9a9b4cdce4d5505ff95caa0bd023ff88a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6146.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 10804⤵
- Program crash
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2943.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 18444⤵
- Program crash
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si825997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si825997.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4020 -ip 40201⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3648 -ip 36481⤵PID:5016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f3a97f00c5ef73cafcb16b3f28966035
SHA148dc8405846f8f0a5bd1255784493fd7ab9c3e39
SHA2560eb5cdd9df732c5add2611051b3a201223898088fbfd322d3e0b747aa2fa262e
SHA512a1f32948cb34864e51ec7739f2ae21c6352175431597e86c8d93a1fe87f2137c45a0150a3f29ba054938ac5d8f112b760071c6ef85305804129172d10ab78913
-
Filesize
175KB
MD5f3a97f00c5ef73cafcb16b3f28966035
SHA148dc8405846f8f0a5bd1255784493fd7ab9c3e39
SHA2560eb5cdd9df732c5add2611051b3a201223898088fbfd322d3e0b747aa2fa262e
SHA512a1f32948cb34864e51ec7739f2ae21c6352175431597e86c8d93a1fe87f2137c45a0150a3f29ba054938ac5d8f112b760071c6ef85305804129172d10ab78913
-
Filesize
541KB
MD5588a74cdeb8915caa1d2d533dba43df9
SHA1a95a9c81942ce0c3077ab16ab2b19d0967ee9af6
SHA25689e72dff39c479b3ad6a6f6e9ce31e9211b04ab5b30b2b5a15e1155504ebf0f8
SHA512da504804e21ad8b8f78df98145c3fc53a8ee4a6386e79b1075bf55475f8a7da236a4fe9c700724093349eb16398d6c6724a3466ffd039ed2bcf328181c123e3a
-
Filesize
541KB
MD5588a74cdeb8915caa1d2d533dba43df9
SHA1a95a9c81942ce0c3077ab16ab2b19d0967ee9af6
SHA25689e72dff39c479b3ad6a6f6e9ce31e9211b04ab5b30b2b5a15e1155504ebf0f8
SHA512da504804e21ad8b8f78df98145c3fc53a8ee4a6386e79b1075bf55475f8a7da236a4fe9c700724093349eb16398d6c6724a3466ffd039ed2bcf328181c123e3a
-
Filesize
322KB
MD5be3f0b8914f5327bcba6ef25e0181d29
SHA10297d6e9fc11d8b44e19d5592c09cd2bbb6b78e2
SHA256f7d2f3a6b423c3343d2ed625bc902c093040883b3cba1e0c302efac27ae63200
SHA5128f04794c949852d492b124fb0959dce6a203605ea5e9f31e61b6d14ce7c6d44da0fdb6ad2b33eb3aac0ce95521dd890ffd4de15968b5904c3dd01b688188eb62
-
Filesize
322KB
MD5be3f0b8914f5327bcba6ef25e0181d29
SHA10297d6e9fc11d8b44e19d5592c09cd2bbb6b78e2
SHA256f7d2f3a6b423c3343d2ed625bc902c093040883b3cba1e0c302efac27ae63200
SHA5128f04794c949852d492b124fb0959dce6a203605ea5e9f31e61b6d14ce7c6d44da0fdb6ad2b33eb3aac0ce95521dd890ffd4de15968b5904c3dd01b688188eb62
-
Filesize
379KB
MD572c6c7190fb68c22773c4391393ed5c0
SHA1c06296e767352d87e01a6a3f934afdc20dc79217
SHA2563b552f6016e971d1f258195844e8134eafa473d400482a5cf3681819b43e971c
SHA51244f5d664e5ef5137ad65799e6daa0f5838d0f23ff4c409dff7ebf66897f0dd86f1ca977cf09db0fd260de2a3d2b70ffd1207f47057e9b8c4850a6b455552a9e5
-
Filesize
379KB
MD572c6c7190fb68c22773c4391393ed5c0
SHA1c06296e767352d87e01a6a3f934afdc20dc79217
SHA2563b552f6016e971d1f258195844e8134eafa473d400482a5cf3681819b43e971c
SHA51244f5d664e5ef5137ad65799e6daa0f5838d0f23ff4c409dff7ebf66897f0dd86f1ca977cf09db0fd260de2a3d2b70ffd1207f47057e9b8c4850a6b455552a9e5