Analysis
-
max time kernel
52s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:08
Static task
static1
Behavioral task
behavioral1
Sample
e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe
Resource
win10v2004-20230220-en
General
-
Target
e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe
-
Size
683KB
-
MD5
f356b5df869620a4edbd90c2a054ea7c
-
SHA1
93081c44bd3e08298ef2ecb634ba25633176927e
-
SHA256
e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57
-
SHA512
bb5c25934568dcc330534ff763579a4bcbeb5b13df1c246afce2054305601371471d3aaac4735da8953be52e70b2e1d3fabd209d9e7e44737874f52fb29480fe
-
SSDEEP
12288:qMrdy9047D4FSWiEFW/TGFUs4LloxNsUAiU0RmwL38YDv:jyPX4QkGTGl4RoxNsUzzmwLMYj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6604.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6604.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6604.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3604-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3604-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un564023.exepro6604.exequ6429.exesi974251.exepid process 1312 un564023.exe 1968 pro6604.exe 3604 qu6429.exe 4628 si974251.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6604.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6604.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6604.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exeun564023.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un564023.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un564023.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4412 1968 WerFault.exe pro6604.exe 4796 3604 WerFault.exe qu6429.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6604.exequ6429.exesi974251.exepid process 1968 pro6604.exe 1968 pro6604.exe 3604 qu6429.exe 3604 qu6429.exe 4628 si974251.exe 4628 si974251.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6604.exequ6429.exesi974251.exedescription pid process Token: SeDebugPrivilege 1968 pro6604.exe Token: SeDebugPrivilege 3604 qu6429.exe Token: SeDebugPrivilege 4628 si974251.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exeun564023.exedescription pid process target process PID 2900 wrote to memory of 1312 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe un564023.exe PID 2900 wrote to memory of 1312 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe un564023.exe PID 2900 wrote to memory of 1312 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe un564023.exe PID 1312 wrote to memory of 1968 1312 un564023.exe pro6604.exe PID 1312 wrote to memory of 1968 1312 un564023.exe pro6604.exe PID 1312 wrote to memory of 1968 1312 un564023.exe pro6604.exe PID 1312 wrote to memory of 3604 1312 un564023.exe qu6429.exe PID 1312 wrote to memory of 3604 1312 un564023.exe qu6429.exe PID 1312 wrote to memory of 3604 1312 un564023.exe qu6429.exe PID 2900 wrote to memory of 4628 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe si974251.exe PID 2900 wrote to memory of 4628 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe si974251.exe PID 2900 wrote to memory of 4628 2900 e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe si974251.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe"C:\Users\Admin\AppData\Local\Temp\e9e786af7fb89ed0999f2c1f37368c8e33f8b2f97154bb712d017b20bb66ef57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564023.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6604.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 10844⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6429.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 14724⤵
- Program crash
PID:4796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si974251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si974251.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1968 -ip 19681⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3604 -ip 36041⤵PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD522b8462be444cbfc3a62ca734d1274dc
SHA12b6ad78b1807de39e79061720c66c5975a796ede
SHA2568ef1f5f6deefecc2a1287298d7a0f52074e797a6470c18224b36396daffd7001
SHA512d3bb02d990710fd6a902b457b1bd259bccb5cf084909e6bf0df2a6e90fb77618f5bf5036b9d4530e0dcadaf98f35d22bec5223cf2db5228c57fc1af6c1ffa846
-
Filesize
175KB
MD522b8462be444cbfc3a62ca734d1274dc
SHA12b6ad78b1807de39e79061720c66c5975a796ede
SHA2568ef1f5f6deefecc2a1287298d7a0f52074e797a6470c18224b36396daffd7001
SHA512d3bb02d990710fd6a902b457b1bd259bccb5cf084909e6bf0df2a6e90fb77618f5bf5036b9d4530e0dcadaf98f35d22bec5223cf2db5228c57fc1af6c1ffa846
-
Filesize
542KB
MD5bbdc34592189ed343daf63f2c322ecf8
SHA1e452ffcbd9470eaefdf815277895f3a7714c74d4
SHA25685ab7087dca92f1adb8381b458a8df6582fb0fc4ee96f4e94d8ab1f868a2c6e4
SHA512985160b4966a6dc88eed994cc427a22df9a8d7e9b07aa10c6da778c74429bb27416189aeed98b59535bbdd47722e708a04ce54edac753630065ad0e8ec4634ce
-
Filesize
542KB
MD5bbdc34592189ed343daf63f2c322ecf8
SHA1e452ffcbd9470eaefdf815277895f3a7714c74d4
SHA25685ab7087dca92f1adb8381b458a8df6582fb0fc4ee96f4e94d8ab1f868a2c6e4
SHA512985160b4966a6dc88eed994cc427a22df9a8d7e9b07aa10c6da778c74429bb27416189aeed98b59535bbdd47722e708a04ce54edac753630065ad0e8ec4634ce
-
Filesize
321KB
MD5cc16a58ce7db122f0896dbd79399373f
SHA160096225b94a6f6805326a8fee3795f69aa0c267
SHA2560f0e88c7c5c139087565903d74167f9bbd0d8c95ce617155e64dab45322770f3
SHA5125f138da8121821a2a2cfd79a554555f8e853abb49d082c3ac1bc0f9523d4ba2ff6dd622173508863f1b4e6ec68cc2c7247cfb3ae8c39c527bde09cb342e108bd
-
Filesize
321KB
MD5cc16a58ce7db122f0896dbd79399373f
SHA160096225b94a6f6805326a8fee3795f69aa0c267
SHA2560f0e88c7c5c139087565903d74167f9bbd0d8c95ce617155e64dab45322770f3
SHA5125f138da8121821a2a2cfd79a554555f8e853abb49d082c3ac1bc0f9523d4ba2ff6dd622173508863f1b4e6ec68cc2c7247cfb3ae8c39c527bde09cb342e108bd
-
Filesize
380KB
MD540b1ffd48f923104d029477a1f93f7a9
SHA1e88237e04abb132ef83fb6b9b08b978f9155f400
SHA256e637521d848414bb7c091314a17eb5f4b9979e7af6eddef1114b9f5bc28cca50
SHA5127d3b87fe3d06a1e3e12fbc05e42d854d94a464ecce9e10c42aaad6ec9214f4834e1c536e91852bc69587b4843d3c841bce2a231cd27f649727d1f48966f93f95
-
Filesize
380KB
MD540b1ffd48f923104d029477a1f93f7a9
SHA1e88237e04abb132ef83fb6b9b08b978f9155f400
SHA256e637521d848414bb7c091314a17eb5f4b9979e7af6eddef1114b9f5bc28cca50
SHA5127d3b87fe3d06a1e3e12fbc05e42d854d94a464ecce9e10c42aaad6ec9214f4834e1c536e91852bc69587b4843d3c841bce2a231cd27f649727d1f48966f93f95