Analysis
-
max time kernel
61s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe
Resource
win10v2004-20230220-en
General
-
Target
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe
-
Size
684KB
-
MD5
a8110a5f0154f9a05e8f4dc75cc9e5f6
-
SHA1
c1b14297e9bc68837274d891859dcc1e6d95dce4
-
SHA256
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a
-
SHA512
cec227b0fd54d4965efaf2b568167c52567729ae5736ebc5a503f1cf8e7bab27db94f0a9530f23ecaefa0f22eaa51f0339ed7630d485788d7f279e7761a1cd97
-
SSDEEP
12288:aMriy90vXsX5JpP5p+nJb6yjC32R51yazMwH5UUVmzL3w3:EyhKjCm5MGfH5vmzL4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro8357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8357.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4728-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-195-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-197-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-199-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-203-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-207-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-209-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-211-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-213-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-215-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-217-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-219-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-221-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-223-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-225-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-227-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-229-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-231-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/4728-1111-0x0000000004A60000-0x0000000004A70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un841122.exepro8357.exequ2363.exesi131722.exepid process 3264 un841122.exe 3244 pro8357.exe 4728 qu2363.exe 3808 si131722.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8357.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exeun841122.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un841122.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un841122.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4984 3244 WerFault.exe pro8357.exe 3964 4728 WerFault.exe qu2363.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8357.exequ2363.exesi131722.exepid process 3244 pro8357.exe 3244 pro8357.exe 4728 qu2363.exe 4728 qu2363.exe 3808 si131722.exe 3808 si131722.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8357.exequ2363.exesi131722.exedescription pid process Token: SeDebugPrivilege 3244 pro8357.exe Token: SeDebugPrivilege 4728 qu2363.exe Token: SeDebugPrivilege 3808 si131722.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exeun841122.exedescription pid process target process PID 3148 wrote to memory of 3264 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe un841122.exe PID 3148 wrote to memory of 3264 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe un841122.exe PID 3148 wrote to memory of 3264 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe un841122.exe PID 3264 wrote to memory of 3244 3264 un841122.exe pro8357.exe PID 3264 wrote to memory of 3244 3264 un841122.exe pro8357.exe PID 3264 wrote to memory of 3244 3264 un841122.exe pro8357.exe PID 3264 wrote to memory of 4728 3264 un841122.exe qu2363.exe PID 3264 wrote to memory of 4728 3264 un841122.exe qu2363.exe PID 3264 wrote to memory of 4728 3264 un841122.exe qu2363.exe PID 3148 wrote to memory of 3808 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe si131722.exe PID 3148 wrote to memory of 3808 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe si131722.exe PID 3148 wrote to memory of 3808 3148 b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe si131722.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe"C:\Users\Admin\AppData\Local\Temp\b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841122.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841122.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8357.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 10644⤵
- Program crash
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2363.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 13484⤵
- Program crash
PID:3964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si131722.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si131722.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3244 -ip 32441⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4728 -ip 47281⤵PID:2216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d8d06b0ed01045a25283557f9315e9a2
SHA1aa3dfc55e844e8e9175e80727f5442c659c1d5b5
SHA256f5aa48f36791f83e23cbdd23d3d1a6894db170cb2a95bbe710fefb9838e49891
SHA5126796efa0a546e30624821a4c7c46e031827626ee4b679f26a6d4b8aec536adc19112f898143e30e8f9f308fb4418763afd7ee00fd046effdbcc1adbc8f0c8046
-
Filesize
175KB
MD5d8d06b0ed01045a25283557f9315e9a2
SHA1aa3dfc55e844e8e9175e80727f5442c659c1d5b5
SHA256f5aa48f36791f83e23cbdd23d3d1a6894db170cb2a95bbe710fefb9838e49891
SHA5126796efa0a546e30624821a4c7c46e031827626ee4b679f26a6d4b8aec536adc19112f898143e30e8f9f308fb4418763afd7ee00fd046effdbcc1adbc8f0c8046
-
Filesize
542KB
MD5b86d3b1b167b505086bce85ff55a6a7b
SHA19c1ddbb6e3055a27c22f9bded7a4cc002672dd06
SHA256792cee0a1ff1a44832152a19b161e62f3fb97f7cfd5d02b2500ea049c19024ec
SHA512a9adb27be0ca10f0eac9584a4ed6ed8552d417a6f915be3f2313ce80bf9dfd83ffa246b2c55282b41471803f9eb8ea7d532146f47d69f104584ea102b176f85b
-
Filesize
542KB
MD5b86d3b1b167b505086bce85ff55a6a7b
SHA19c1ddbb6e3055a27c22f9bded7a4cc002672dd06
SHA256792cee0a1ff1a44832152a19b161e62f3fb97f7cfd5d02b2500ea049c19024ec
SHA512a9adb27be0ca10f0eac9584a4ed6ed8552d417a6f915be3f2313ce80bf9dfd83ffa246b2c55282b41471803f9eb8ea7d532146f47d69f104584ea102b176f85b
-
Filesize
321KB
MD560edb6c7c12956bb473eacf0abdc6069
SHA180583251c44d583775a26243785c8fb0e580227e
SHA256662d1c279a69e54cf694f30ac9ac77f5368dc26923d48801c499096c80e1d74c
SHA5128a3d453c276de016d543e986f30363c5d052d87d8f38b420d923cd645899b5d7f1f70429839c4c3e1d0ce7a702c6ac008587d9962c79aa1851049372d10b3622
-
Filesize
321KB
MD560edb6c7c12956bb473eacf0abdc6069
SHA180583251c44d583775a26243785c8fb0e580227e
SHA256662d1c279a69e54cf694f30ac9ac77f5368dc26923d48801c499096c80e1d74c
SHA5128a3d453c276de016d543e986f30363c5d052d87d8f38b420d923cd645899b5d7f1f70429839c4c3e1d0ce7a702c6ac008587d9962c79aa1851049372d10b3622
-
Filesize
380KB
MD53ab6e2b61263d096ffea1279401c1d07
SHA1a33422a4399fb61d70738c566353613d9ac4b04a
SHA2560425966a4a7283a812df27ba7e083b00c44dd6cf8f5768155327d65592d8d9a3
SHA51243eacc9bd040261f959dfedc0d793e9b3b8941fd60d036b8fa27fe7ef0734bd5e06e3246db7be0ced0aca929edf8c08c20d8c2568d2d267d5239c14e3f19050f
-
Filesize
380KB
MD53ab6e2b61263d096ffea1279401c1d07
SHA1a33422a4399fb61d70738c566353613d9ac4b04a
SHA2560425966a4a7283a812df27ba7e083b00c44dd6cf8f5768155327d65592d8d9a3
SHA51243eacc9bd040261f959dfedc0d793e9b3b8941fd60d036b8fa27fe7ef0734bd5e06e3246db7be0ced0aca929edf8c08c20d8c2568d2d267d5239c14e3f19050f