Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:35
Static task
static1
Behavioral task
behavioral1
Sample
9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe
Resource
win10v2004-20230220-en
General
-
Target
9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe
-
Size
687KB
-
MD5
17c43ad6b6a539b5f702e9095a828af1
-
SHA1
7d5ab3cf61b42b7277740d35c8c9bec857740eb9
-
SHA256
9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5
-
SHA512
307077b31e9dc044fd72a4c774610f9c2bb7ee7751848544cde934e136a5e50c74627045418bb7de73d6f81b04d829f5b9876abb833dbdc25cc527e434e6b438
-
SSDEEP
12288:aMrBy90XWbao4HcR6yjCtUR5pCZDMh9Z4jgRUDhuXtikeknC:vygoycTjC25egf4c4uXSknC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0636.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0636.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1424-193-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-196-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-214-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-216-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-220-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-218-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1424-226-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un590154.exepro0636.exequ4206.exesi945532.exepid process 4412 un590154.exe 3716 pro0636.exe 1424 qu4206.exe 2212 si945532.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0636.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0636.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exeun590154.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un590154.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un590154.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4108 3716 WerFault.exe pro0636.exe 1596 1424 WerFault.exe qu4206.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0636.exequ4206.exesi945532.exepid process 3716 pro0636.exe 3716 pro0636.exe 1424 qu4206.exe 1424 qu4206.exe 2212 si945532.exe 2212 si945532.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0636.exequ4206.exesi945532.exedescription pid process Token: SeDebugPrivilege 3716 pro0636.exe Token: SeDebugPrivilege 1424 qu4206.exe Token: SeDebugPrivilege 2212 si945532.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exeun590154.exedescription pid process target process PID 2196 wrote to memory of 4412 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe un590154.exe PID 2196 wrote to memory of 4412 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe un590154.exe PID 2196 wrote to memory of 4412 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe un590154.exe PID 4412 wrote to memory of 3716 4412 un590154.exe pro0636.exe PID 4412 wrote to memory of 3716 4412 un590154.exe pro0636.exe PID 4412 wrote to memory of 3716 4412 un590154.exe pro0636.exe PID 4412 wrote to memory of 1424 4412 un590154.exe qu4206.exe PID 4412 wrote to memory of 1424 4412 un590154.exe qu4206.exe PID 4412 wrote to memory of 1424 4412 un590154.exe qu4206.exe PID 2196 wrote to memory of 2212 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe si945532.exe PID 2196 wrote to memory of 2212 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe si945532.exe PID 2196 wrote to memory of 2212 2196 9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe si945532.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe"C:\Users\Admin\AppData\Local\Temp\9bdba475537a025150c815811f9801a98336412e3b424110338197719418cee5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590154.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0636.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0636.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 10804⤵
- Program crash
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4206.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 13484⤵
- Program crash
PID:1596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945532.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3716 -ip 37161⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:3412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b93f9e3616f3c4d6aabe180d493d343b
SHA17f1754c7769c1b3ac5be36cd9d8235d828ebe748
SHA2564d38fa53de0164adcb3082093841df8ab734ec4c543d5cc477ca26fbd6e012e0
SHA51219bacd30b085693000be00064733a496cd445a81101a040015a43916bc47f072e89a0454f3fcfa949a7005c62b556460e033e0b7ed0ba878c03d4adfc79dedd9
-
Filesize
175KB
MD5b93f9e3616f3c4d6aabe180d493d343b
SHA17f1754c7769c1b3ac5be36cd9d8235d828ebe748
SHA2564d38fa53de0164adcb3082093841df8ab734ec4c543d5cc477ca26fbd6e012e0
SHA51219bacd30b085693000be00064733a496cd445a81101a040015a43916bc47f072e89a0454f3fcfa949a7005c62b556460e033e0b7ed0ba878c03d4adfc79dedd9
-
Filesize
545KB
MD5b028e30df2ced6261108e543666789cd
SHA1c0b93a143616c8613d2838153f24358f63686b2c
SHA256cf3b3ab2f78dd0fb59ad44aa1ef765e85a10cd6ca5c8e354531137f9492a7382
SHA512c2982f403d39be38f191d8f1bdd703baade30f2016b4965a9514c9d1b10075122d25157745332784474b0adfa7c91b9770d8d1dd56348573a085d1a758d566fd
-
Filesize
545KB
MD5b028e30df2ced6261108e543666789cd
SHA1c0b93a143616c8613d2838153f24358f63686b2c
SHA256cf3b3ab2f78dd0fb59ad44aa1ef765e85a10cd6ca5c8e354531137f9492a7382
SHA512c2982f403d39be38f191d8f1bdd703baade30f2016b4965a9514c9d1b10075122d25157745332784474b0adfa7c91b9770d8d1dd56348573a085d1a758d566fd
-
Filesize
321KB
MD51c70ceb398d87851c96cedf7bfd9f9d1
SHA1c2f7551de431b6361527d8a08f74dc54bc489d40
SHA256e5a377f50d48618d1cd94bbe6bf75c429401b93888511e3aab189cf321890a27
SHA5122fb3555521ccdceebcbd8ca08ba655f0e121f4b021000234ac6ad81ca67fe8fbdbba278aacdc2ea67c9cea8217cb64f553873cd2b6e3e1d1bf6d24f30f3bcfe1
-
Filesize
321KB
MD51c70ceb398d87851c96cedf7bfd9f9d1
SHA1c2f7551de431b6361527d8a08f74dc54bc489d40
SHA256e5a377f50d48618d1cd94bbe6bf75c429401b93888511e3aab189cf321890a27
SHA5122fb3555521ccdceebcbd8ca08ba655f0e121f4b021000234ac6ad81ca67fe8fbdbba278aacdc2ea67c9cea8217cb64f553873cd2b6e3e1d1bf6d24f30f3bcfe1
-
Filesize
380KB
MD5339d80008e77a9fe4e0587d099958680
SHA13127515c81fdb1c870232b547ea2b398f97b4406
SHA2562d63c059dd7d8ac10adda19678f32aac4463cbb1212724e2e7a08e51c3ac764c
SHA51290a75a13ef188aa7fc8599363aad415acf1d6b25ac129ae45af7df51149229c6fd652ead083d88afe291558c7e2a5cc68450c49ca7c9ee4aea74717a72abb766
-
Filesize
380KB
MD5339d80008e77a9fe4e0587d099958680
SHA13127515c81fdb1c870232b547ea2b398f97b4406
SHA2562d63c059dd7d8ac10adda19678f32aac4463cbb1212724e2e7a08e51c3ac764c
SHA51290a75a13ef188aa7fc8599363aad415acf1d6b25ac129ae45af7df51149229c6fd652ead083d88afe291558c7e2a5cc68450c49ca7c9ee4aea74717a72abb766