Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:22
Static task
static1
Behavioral task
behavioral1
Sample
70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe
Resource
win10v2004-20230220-en
General
-
Target
70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe
-
Size
683KB
-
MD5
0da2ef3d507aae92305c189c16f265f5
-
SHA1
8fc2830353623a59034e3277afd32c0d0c0874db
-
SHA256
70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4
-
SHA512
06de4ad038ce61f9aec265485707ef93695cf9d418222f857bf32d661dbd9ac438d140860f13eee086ff29d3ebdbbd225a94b1a4ebe853348c4a419519d25ead
-
SSDEEP
12288:uMrQy90UCHXAjr7/qKdEeQwxMpmHaUA9mqL3ZvJ:Cy/uOr7tWwqKaZmqLJh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro5068.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5068.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5068.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4840-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-201-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-203-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-205-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-207-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-209-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-211-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-217-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-219-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-223-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-221-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-225-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4840-227-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un027740.exepro5068.exequ4446.exesi262370.exepid process 872 un027740.exe 1980 pro5068.exe 4840 qu4446.exe 3976 si262370.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5068.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5068.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exeun027740.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un027740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un027740.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3600 1980 WerFault.exe pro5068.exe 4328 4840 WerFault.exe qu4446.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5068.exequ4446.exesi262370.exepid process 1980 pro5068.exe 1980 pro5068.exe 4840 qu4446.exe 4840 qu4446.exe 3976 si262370.exe 3976 si262370.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5068.exequ4446.exesi262370.exedescription pid process Token: SeDebugPrivilege 1980 pro5068.exe Token: SeDebugPrivilege 4840 qu4446.exe Token: SeDebugPrivilege 3976 si262370.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exeun027740.exedescription pid process target process PID 3996 wrote to memory of 872 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe un027740.exe PID 3996 wrote to memory of 872 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe un027740.exe PID 3996 wrote to memory of 872 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe un027740.exe PID 872 wrote to memory of 1980 872 un027740.exe pro5068.exe PID 872 wrote to memory of 1980 872 un027740.exe pro5068.exe PID 872 wrote to memory of 1980 872 un027740.exe pro5068.exe PID 872 wrote to memory of 4840 872 un027740.exe qu4446.exe PID 872 wrote to memory of 4840 872 un027740.exe qu4446.exe PID 872 wrote to memory of 4840 872 un027740.exe qu4446.exe PID 3996 wrote to memory of 3976 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe si262370.exe PID 3996 wrote to memory of 3976 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe si262370.exe PID 3996 wrote to memory of 3976 3996 70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe si262370.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe"C:\Users\Admin\AppData\Local\Temp\70d45afdc9a4c7a86675a2549a96767f6175aa89da07641013bb62fcb928d5e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027740.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5068.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 10804⤵
- Program crash
PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4446.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4446.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 19844⤵
- Program crash
PID:4328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262370.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262370.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1980 -ip 19801⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4840 -ip 48401⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5401f2d4dd664b9c581e3b841720eca35
SHA1be68e016d7a63bf9e9c178c97ec0784b2f957405
SHA2564b1fdfc993830bdb21e37e3d8a34caa46457c3fddd1ea1422257ee50bdf1c53d
SHA512f9f5f5dd78cfba7e2ea95499cd771ebcdece38e773b755f49ff4ae606797ab720f970d71ee3bc271efd3a74d05d67e73d77b1be7ec3ad9e1c3fed302758df7bf
-
Filesize
175KB
MD5401f2d4dd664b9c581e3b841720eca35
SHA1be68e016d7a63bf9e9c178c97ec0784b2f957405
SHA2564b1fdfc993830bdb21e37e3d8a34caa46457c3fddd1ea1422257ee50bdf1c53d
SHA512f9f5f5dd78cfba7e2ea95499cd771ebcdece38e773b755f49ff4ae606797ab720f970d71ee3bc271efd3a74d05d67e73d77b1be7ec3ad9e1c3fed302758df7bf
-
Filesize
541KB
MD52bd935c987955038d667876fc79b9c94
SHA1089930b1d5cfd2f29cb143b0235ff18fb0541b62
SHA2568438d2a584a5c1fcee5eddc498c6d72993d6bf4822b7764f5ebc195d449e54fe
SHA5122c635fa83e32905bfc806d13c1676f6e0b7026b9a895ea53e0004a4f21d8334c091259341fd90a0c947a332616139932e3f5498313f806f3d4f0870db429afed
-
Filesize
541KB
MD52bd935c987955038d667876fc79b9c94
SHA1089930b1d5cfd2f29cb143b0235ff18fb0541b62
SHA2568438d2a584a5c1fcee5eddc498c6d72993d6bf4822b7764f5ebc195d449e54fe
SHA5122c635fa83e32905bfc806d13c1676f6e0b7026b9a895ea53e0004a4f21d8334c091259341fd90a0c947a332616139932e3f5498313f806f3d4f0870db429afed
-
Filesize
321KB
MD52ad53c5d8497068598430266911452a2
SHA1207f41fa1a203ec8e763de9ba99c99742fcfc2f1
SHA25653c02f9cf6fe993f5304f498e62cd3a0fe8e34d90fb6a37fdc93e859f8c02c3e
SHA51232b25e3ec81dde7b52f6f2408e4bcd06c75e3111a7b068af8337453ad4d2b3028a280e66841e54b3068eb573eb57f594eebcf6717238a57a2486e5b34c4971ef
-
Filesize
321KB
MD52ad53c5d8497068598430266911452a2
SHA1207f41fa1a203ec8e763de9ba99c99742fcfc2f1
SHA25653c02f9cf6fe993f5304f498e62cd3a0fe8e34d90fb6a37fdc93e859f8c02c3e
SHA51232b25e3ec81dde7b52f6f2408e4bcd06c75e3111a7b068af8337453ad4d2b3028a280e66841e54b3068eb573eb57f594eebcf6717238a57a2486e5b34c4971ef
-
Filesize
380KB
MD5d94e3e13ec084e297b4f2ead53876fe4
SHA1bc6f1d65ca979cf27ee489f05258371e7af7ba63
SHA25653e863e310262b134bcb8e71beaec86c27105b4854a36d35656770a98064a4fa
SHA5120ef3d2e5b9847763256f95a6ef90174a3162038ccf882bc609c16401d4766366bd239f29f6bfcff597566a31f775a155a97de19ef50f272ec557cd29054fdad3
-
Filesize
380KB
MD5d94e3e13ec084e297b4f2ead53876fe4
SHA1bc6f1d65ca979cf27ee489f05258371e7af7ba63
SHA25653e863e310262b134bcb8e71beaec86c27105b4854a36d35656770a98064a4fa
SHA5120ef3d2e5b9847763256f95a6ef90174a3162038ccf882bc609c16401d4766366bd239f29f6bfcff597566a31f775a155a97de19ef50f272ec557cd29054fdad3