Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:42
Static task
static1
Behavioral task
behavioral1
Sample
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe
Resource
win10v2004-20230220-en
General
-
Target
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe
-
Size
684KB
-
MD5
fdca260dbb70f4f9e960ed73cdf9a41f
-
SHA1
d0917ee0c376b76a1ac683c4859a9549fc857061
-
SHA256
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f
-
SHA512
eea03297e3cdc78d57b33bd8857cfab3fa9352062443c8c62f24669a9cc8d0ca1f9f715e8034b0112bee5415b41dcf144d5dabb373c2e7065e4bc45a6868bb08
-
SSDEEP
12288:yMroy90y2ilgmTHLO+BhwaD0gbO26yjCcpR5o8LgIAUV8U7nm+L3epUlQoZh/:myKiJfOkhwaDjbO+jC25AICKm+LupW/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro4877.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4877.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4877.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4052-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4052-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un074972.exepro4877.exequ1854.exesi953937.exepid process 2372 un074972.exe 1264 pro4877.exe 4052 qu1854.exe 2840 si953937.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4877.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4877.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exeun074972.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un074972.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un074972.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 420 1264 WerFault.exe pro4877.exe 2324 4052 WerFault.exe qu1854.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4877.exequ1854.exesi953937.exepid process 1264 pro4877.exe 1264 pro4877.exe 4052 qu1854.exe 4052 qu1854.exe 2840 si953937.exe 2840 si953937.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4877.exequ1854.exesi953937.exedescription pid process Token: SeDebugPrivilege 1264 pro4877.exe Token: SeDebugPrivilege 4052 qu1854.exe Token: SeDebugPrivilege 2840 si953937.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exeun074972.exedescription pid process target process PID 5100 wrote to memory of 2372 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe un074972.exe PID 5100 wrote to memory of 2372 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe un074972.exe PID 5100 wrote to memory of 2372 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe un074972.exe PID 2372 wrote to memory of 1264 2372 un074972.exe pro4877.exe PID 2372 wrote to memory of 1264 2372 un074972.exe pro4877.exe PID 2372 wrote to memory of 1264 2372 un074972.exe pro4877.exe PID 2372 wrote to memory of 4052 2372 un074972.exe qu1854.exe PID 2372 wrote to memory of 4052 2372 un074972.exe qu1854.exe PID 2372 wrote to memory of 4052 2372 un074972.exe qu1854.exe PID 5100 wrote to memory of 2840 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe si953937.exe PID 5100 wrote to memory of 2840 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe si953937.exe PID 5100 wrote to memory of 2840 5100 834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe si953937.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe"C:\Users\Admin\AppData\Local\Temp\834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un074972.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un074972.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4877.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10844⤵
- Program crash
PID:420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1854.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 17044⤵
- Program crash
PID:2324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953937.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1264 -ip 12641⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4052 -ip 40521⤵PID:1788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a973400bc3b7274434ca3506f8fca840
SHA113cce58f5f5e72f82b8073cb05c7b27a80c52dab
SHA256173c4c01c7f67fa127a758f6bf48a1a62a7c5c97b99ad140bb9685ec5613966e
SHA51299789c34449a4a4afd7b0df70fd4949ef651e633eaff762ce15964d0e8e8d47d5b517bd62c3cd62b4aa5e119524f5f58784d9e93c43d1a51d4bdd6eba07dc25e
-
Filesize
175KB
MD5a973400bc3b7274434ca3506f8fca840
SHA113cce58f5f5e72f82b8073cb05c7b27a80c52dab
SHA256173c4c01c7f67fa127a758f6bf48a1a62a7c5c97b99ad140bb9685ec5613966e
SHA51299789c34449a4a4afd7b0df70fd4949ef651e633eaff762ce15964d0e8e8d47d5b517bd62c3cd62b4aa5e119524f5f58784d9e93c43d1a51d4bdd6eba07dc25e
-
Filesize
542KB
MD5042dbcc0bf4994267f4ee0ce4aed44c1
SHA1efa9a716cdd43cdb937fcd155dc8d46f56139499
SHA256562c90843c1aee8e3b1d539c8cf36f4a798d204dabb88ce5370c9d2b3fe83c8a
SHA5124e1aa7c4e62fe3700e27a44359e14b71a7433360c38b4b55c5e08dc1a00e8f5ed0f5b336683677f4012b6abe05b79496867d8667ad93ae60a477ae28ffe562a2
-
Filesize
542KB
MD5042dbcc0bf4994267f4ee0ce4aed44c1
SHA1efa9a716cdd43cdb937fcd155dc8d46f56139499
SHA256562c90843c1aee8e3b1d539c8cf36f4a798d204dabb88ce5370c9d2b3fe83c8a
SHA5124e1aa7c4e62fe3700e27a44359e14b71a7433360c38b4b55c5e08dc1a00e8f5ed0f5b336683677f4012b6abe05b79496867d8667ad93ae60a477ae28ffe562a2
-
Filesize
321KB
MD56ed533fc925952cd29b336b324dc26ad
SHA1004450b2339b9325c4febe2a672a6e07f2c5541e
SHA2567e08a0b5113933d44014e2ad5aa99dd63fbd2e70240fd452d35b014f41579f77
SHA51229e50f1695d0aa0a9b71276ed1b4c9cbc1c7037ed602d6cfbb0a93739f42acd8b97251819ac8c51e18cfbe2a21cb5debe17c3d275e506df9de8c8f0e8f11d635
-
Filesize
321KB
MD56ed533fc925952cd29b336b324dc26ad
SHA1004450b2339b9325c4febe2a672a6e07f2c5541e
SHA2567e08a0b5113933d44014e2ad5aa99dd63fbd2e70240fd452d35b014f41579f77
SHA51229e50f1695d0aa0a9b71276ed1b4c9cbc1c7037ed602d6cfbb0a93739f42acd8b97251819ac8c51e18cfbe2a21cb5debe17c3d275e506df9de8c8f0e8f11d635
-
Filesize
380KB
MD55593151b55757896de2db97172e30644
SHA154d927eeb90b557076138151b44406b8e0fa7af0
SHA256603785762abc314ae7291dc5fa12cdaaa197cc1c1fe2bb9b9c259e619a92f62e
SHA5123f8bd96bea4441e1378749b65a82b6ac85fa4c7f924df2eea48e6c498c5e455fafc24ca2c1effb139ee2f621ff2559961ab4d046a5b55d46e4542a1e375c3576
-
Filesize
380KB
MD55593151b55757896de2db97172e30644
SHA154d927eeb90b557076138151b44406b8e0fa7af0
SHA256603785762abc314ae7291dc5fa12cdaaa197cc1c1fe2bb9b9c259e619a92f62e
SHA5123f8bd96bea4441e1378749b65a82b6ac85fa4c7f924df2eea48e6c498c5e455fafc24ca2c1effb139ee2f621ff2559961ab4d046a5b55d46e4542a1e375c3576