Analysis
-
max time kernel
130s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:12
Static task
static1
Behavioral task
behavioral1
Sample
c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe
Resource
win10v2004-20230220-en
General
-
Target
c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe
-
Size
685KB
-
MD5
c7ae216ae7cd212b835134c78b3a76c8
-
SHA1
007e58d8d1c85d2f3266207d3a0dbcab97aea06c
-
SHA256
c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7
-
SHA512
98285b651cc6df5a9fef1ce5d14499a382d18589403c3f4554395c7bc8950ecfe8b092a398ad6386c30308b00c8ec2837cddbd7254810f1cd0416d1405135905
-
SSDEEP
12288:HMray90Tul/IY8b6rvYS1okRKzAjgRUb3XFyljQqE5Rt52UDmNO3:pyour8bpSyAcRAXYJQx5RT27NQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8651.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8651.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8651.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-191-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-192-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-195-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-199-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-202-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-204-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-206-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-208-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-216-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-214-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-212-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-210-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-218-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-220-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-222-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-224-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-226-0x0000000007710000-0x000000000774F000-memory.dmp family_redline behavioral1/memory/2352-228-0x0000000007710000-0x000000000774F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un353740.exepro8651.exequ4483.exesi774506.exepid process 1008 un353740.exe 4760 pro8651.exe 2352 qu4483.exe 2300 si774506.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8651.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8651.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exeun353740.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un353740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un353740.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5000 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3316 4760 WerFault.exe pro8651.exe 1388 2352 WerFault.exe qu4483.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8651.exequ4483.exesi774506.exepid process 4760 pro8651.exe 4760 pro8651.exe 2352 qu4483.exe 2352 qu4483.exe 2300 si774506.exe 2300 si774506.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8651.exequ4483.exesi774506.exedescription pid process Token: SeDebugPrivilege 4760 pro8651.exe Token: SeDebugPrivilege 2352 qu4483.exe Token: SeDebugPrivilege 2300 si774506.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exeun353740.exedescription pid process target process PID 4400 wrote to memory of 1008 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe un353740.exe PID 4400 wrote to memory of 1008 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe un353740.exe PID 4400 wrote to memory of 1008 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe un353740.exe PID 1008 wrote to memory of 4760 1008 un353740.exe pro8651.exe PID 1008 wrote to memory of 4760 1008 un353740.exe pro8651.exe PID 1008 wrote to memory of 4760 1008 un353740.exe pro8651.exe PID 1008 wrote to memory of 2352 1008 un353740.exe qu4483.exe PID 1008 wrote to memory of 2352 1008 un353740.exe qu4483.exe PID 1008 wrote to memory of 2352 1008 un353740.exe qu4483.exe PID 4400 wrote to memory of 2300 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe si774506.exe PID 4400 wrote to memory of 2300 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe si774506.exe PID 4400 wrote to memory of 2300 4400 c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe si774506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe"C:\Users\Admin\AppData\Local\Temp\c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10804⤵
- Program crash
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 13284⤵
- Program crash
PID:1388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4760 -ip 47601⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2352 -ip 23521⤵PID:1016
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58d3c1a1c3fe3885f28900f32708170af
SHA1642fca80bf2c6783d4856a24c204883edfac4ac2
SHA256ffa9205cc70f79538d69cada4267a4037eec2b5b2c4298a0061f852dd17098af
SHA5128484d025b1f78ae3e1319ce4f9cd22e01210f296ec238a96f149bbbcfba5cfe1c1e3ee4775a0c1309b5767f96b96a47a72681fff96c2eb9e819a0f5899483774
-
Filesize
175KB
MD58d3c1a1c3fe3885f28900f32708170af
SHA1642fca80bf2c6783d4856a24c204883edfac4ac2
SHA256ffa9205cc70f79538d69cada4267a4037eec2b5b2c4298a0061f852dd17098af
SHA5128484d025b1f78ae3e1319ce4f9cd22e01210f296ec238a96f149bbbcfba5cfe1c1e3ee4775a0c1309b5767f96b96a47a72681fff96c2eb9e819a0f5899483774
-
Filesize
544KB
MD52533d60ffb170d83a79f31f472f9da35
SHA1278d480aae6e4e3b04b4279f92956eebb16a5144
SHA256e19d8cdcf7eb7da18fe7bc4e7027d9702f58946acfc128484a3e3badd1ac4bc8
SHA512d90250948ba6808b2956b7a8c3c15a8a509d0ae7f9b0965e7e0a7a7ef06d577f4d494d8db44d6c3f9216371c6f6a77195ba9b2c64ab610579f642cdab613e716
-
Filesize
544KB
MD52533d60ffb170d83a79f31f472f9da35
SHA1278d480aae6e4e3b04b4279f92956eebb16a5144
SHA256e19d8cdcf7eb7da18fe7bc4e7027d9702f58946acfc128484a3e3badd1ac4bc8
SHA512d90250948ba6808b2956b7a8c3c15a8a509d0ae7f9b0965e7e0a7a7ef06d577f4d494d8db44d6c3f9216371c6f6a77195ba9b2c64ab610579f642cdab613e716
-
Filesize
321KB
MD536d65663a1d3465266951c2be5198d89
SHA11b46be78692d725d4127f9b281032ef05b0d9d8a
SHA2566365a2f630778ad2fe01fef178a693abff82baa686aac162804b95aa1e3a4125
SHA512b4444703489b5524e84cc052e5e89fa69b0a64b4a4b27c7112e8279e49c9248d51c79683e26ce65de7e5ef20d14474e326cf9b3e6dbfa2af28f915342ed5f090
-
Filesize
321KB
MD536d65663a1d3465266951c2be5198d89
SHA11b46be78692d725d4127f9b281032ef05b0d9d8a
SHA2566365a2f630778ad2fe01fef178a693abff82baa686aac162804b95aa1e3a4125
SHA512b4444703489b5524e84cc052e5e89fa69b0a64b4a4b27c7112e8279e49c9248d51c79683e26ce65de7e5ef20d14474e326cf9b3e6dbfa2af28f915342ed5f090
-
Filesize
380KB
MD5e9719ac56ce87283e8ed4eb58275ec1c
SHA1f1ab380f89b6b22e8b1014dedb49fd41c9f8affe
SHA25697aa7d2a08b4c7c74b627da9ac4baf36cc2b9a44c944ec3f228c95ff23e867b1
SHA512399569accaa87fb81be9539207ebe95b946fb843c07648ee713f53afe0b5580ca068b41ceeaace58ce7cb7c0a955f621c7183f5eba9c5b3bf5b60bb494fa89ae
-
Filesize
380KB
MD5e9719ac56ce87283e8ed4eb58275ec1c
SHA1f1ab380f89b6b22e8b1014dedb49fd41c9f8affe
SHA25697aa7d2a08b4c7c74b627da9ac4baf36cc2b9a44c944ec3f228c95ff23e867b1
SHA512399569accaa87fb81be9539207ebe95b946fb843c07648ee713f53afe0b5580ca068b41ceeaace58ce7cb7c0a955f621c7183f5eba9c5b3bf5b60bb494fa89ae