Analysis
-
max time kernel
61s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:44
Static task
static1
Behavioral task
behavioral1
Sample
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe
Resource
win10v2004-20230220-en
General
-
Target
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe
-
Size
686KB
-
MD5
853d11ba9669b817fee51d64fc3f2287
-
SHA1
3b10d4bce1c5260f12bb7d60d5cc30a125d4799f
-
SHA256
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8
-
SHA512
c9184ac193d5c36dadc17e22427b4f8bd7571e8aba61b4f141261498ae47bfd5ef37ca9c79537a3ed52906226714f4099fd343628ccbb749962b242d076e7c00
-
SSDEEP
12288:jMrvy90PiIRl+sHGX6yjC30R5qdKFMRREUKnuXt/7A:UyzIJHGRjC050WOREZuXl7A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7200.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/5048-198-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-199-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-201-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-203-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-205-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-207-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-209-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-211-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-213-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-215-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-217-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-219-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-221-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-223-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-225-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-227-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-229-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/5048-231-0x0000000007830000-0x000000000786F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3284 un953697.exe 2948 pro7200.exe 5048 qu9568.exe 3840 si338977.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7200.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un953697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un953697.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3604 2948 WerFault.exe 85 4044 5048 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2948 pro7200.exe 2948 pro7200.exe 5048 qu9568.exe 5048 qu9568.exe 3840 si338977.exe 3840 si338977.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2948 pro7200.exe Token: SeDebugPrivilege 5048 qu9568.exe Token: SeDebugPrivilege 3840 si338977.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3284 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 84 PID 3148 wrote to memory of 3284 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 84 PID 3148 wrote to memory of 3284 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 84 PID 3284 wrote to memory of 2948 3284 un953697.exe 85 PID 3284 wrote to memory of 2948 3284 un953697.exe 85 PID 3284 wrote to memory of 2948 3284 un953697.exe 85 PID 3284 wrote to memory of 5048 3284 un953697.exe 91 PID 3284 wrote to memory of 5048 3284 un953697.exe 91 PID 3284 wrote to memory of 5048 3284 un953697.exe 91 PID 3148 wrote to memory of 3840 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 96 PID 3148 wrote to memory of 3840 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 96 PID 3148 wrote to memory of 3840 3148 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe"C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 11004⤵
- Program crash
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 13524⤵
- Program crash
PID:4044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2948 -ip 29481⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5048 -ip 50481⤵PID:2656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59987a52e56a7ef0e1f0dedfb9475249c
SHA1d7595a023ea93a44cd17306944fe406dc3e95b93
SHA2565083ae30cf82c720e01ab3e0bf9ddaf7be05f16bd6ffa0eeb1b50fe5626c15f5
SHA5123e1c0f0b3137d25a48e8d9422554a3a41cd5fa61548283c0810f70b8d8f1b4f4ccfd23290964f34c1426b01d56a790cc1880aa9e59b54db2a1213e32d864a42d
-
Filesize
175KB
MD59987a52e56a7ef0e1f0dedfb9475249c
SHA1d7595a023ea93a44cd17306944fe406dc3e95b93
SHA2565083ae30cf82c720e01ab3e0bf9ddaf7be05f16bd6ffa0eeb1b50fe5626c15f5
SHA5123e1c0f0b3137d25a48e8d9422554a3a41cd5fa61548283c0810f70b8d8f1b4f4ccfd23290964f34c1426b01d56a790cc1880aa9e59b54db2a1213e32d864a42d
-
Filesize
545KB
MD5eb94dc1c5f4a530c0914bc31621e4a99
SHA119888fa757451d1e2832ba252a3a93c993851f22
SHA256b261dc7bbc328053f216c22b859cfe8ce73f04d8b27707c315eee12ea424e32e
SHA512c8b614da815358c807fd60308213c584c933418aa03648671918ba112ce9551b14f9a567e6b58f9e7ca113f544f1cf55c52004c2c2ec0564cf51f7b185b95fa1
-
Filesize
545KB
MD5eb94dc1c5f4a530c0914bc31621e4a99
SHA119888fa757451d1e2832ba252a3a93c993851f22
SHA256b261dc7bbc328053f216c22b859cfe8ce73f04d8b27707c315eee12ea424e32e
SHA512c8b614da815358c807fd60308213c584c933418aa03648671918ba112ce9551b14f9a567e6b58f9e7ca113f544f1cf55c52004c2c2ec0564cf51f7b185b95fa1
-
Filesize
321KB
MD52009eaf3d589b5cc00e030555a9ef4e7
SHA1036750a9b52e32d3aed5f3f0fd0a2b03d3e3d471
SHA25683d1b1ee1990772e19cd001401ca731927b34fa724e24f5a606e9c4da2ada513
SHA51296ce39c6929e194f6bd196eed25f313ca6a652a0fcff39e99dbc010e0f53cea777e982779365b5e8e5b94bfba3f93f06a7653274164b6faf2404b233480bb429
-
Filesize
321KB
MD52009eaf3d589b5cc00e030555a9ef4e7
SHA1036750a9b52e32d3aed5f3f0fd0a2b03d3e3d471
SHA25683d1b1ee1990772e19cd001401ca731927b34fa724e24f5a606e9c4da2ada513
SHA51296ce39c6929e194f6bd196eed25f313ca6a652a0fcff39e99dbc010e0f53cea777e982779365b5e8e5b94bfba3f93f06a7653274164b6faf2404b233480bb429
-
Filesize
380KB
MD5b29f093898a4814600d5258782d91db2
SHA1661aae1232aaf987e39b8a603e2e5f715168af3b
SHA2567e910e74e1f857627d8cde1d2244793882c1a29dbbbe3528c355dfe569841b81
SHA5128cb848170ea09df9bebe958488ba85aec86d8f63fbecee94bea2db0c5bca86c5f3ddec966f1150ca9d2a9544b2fcb031ef1e94683217958f7a4039042e9ba800
-
Filesize
380KB
MD5b29f093898a4814600d5258782d91db2
SHA1661aae1232aaf987e39b8a603e2e5f715168af3b
SHA2567e910e74e1f857627d8cde1d2244793882c1a29dbbbe3528c355dfe569841b81
SHA5128cb848170ea09df9bebe958488ba85aec86d8f63fbecee94bea2db0c5bca86c5f3ddec966f1150ca9d2a9544b2fcb031ef1e94683217958f7a4039042e9ba800