Analysis
-
max time kernel
55s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe
Resource
win10v2004-20230220-en
General
-
Target
812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe
-
Size
697KB
-
MD5
d11a2f5606467d8d4a0c729b9c04183f
-
SHA1
59997142a3e4ba6d3c5dca48461ba30b09206792
-
SHA256
812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef
-
SHA512
5dac100ad5f13a5d00d6c64cd4c9abcc6cfb43d0698065e4b00b10cb73f06560f7f2404c9ed3a852a94f4505a0a8035b522e3fe4d361b1e384e5bda7eda24427
-
SSDEEP
12288:yMruy90Q6oC4bZA0UkZZqtp/YKksx8lRFQphL6DZGjcAxI9gykqpGSWt:kywXkZ+ZksxGUwGj1I9rvGt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4916.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4916.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2060-195-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-196-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-198-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-200-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-202-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-204-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-206-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-208-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-212-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-210-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-214-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-216-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-218-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-220-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-222-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-224-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-226-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2060-228-0x0000000007740000-0x000000000777F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1196 un498730.exe 3252 pro4916.exe 2060 qu7898.exe 1560 si188767.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4916.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un498730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un498730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2112 3252 WerFault.exe 85 4920 2060 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3252 pro4916.exe 3252 pro4916.exe 2060 qu7898.exe 2060 qu7898.exe 1560 si188767.exe 1560 si188767.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3252 pro4916.exe Token: SeDebugPrivilege 2060 qu7898.exe Token: SeDebugPrivilege 1560 si188767.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 452 wrote to memory of 1196 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 84 PID 452 wrote to memory of 1196 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 84 PID 452 wrote to memory of 1196 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 84 PID 1196 wrote to memory of 3252 1196 un498730.exe 85 PID 1196 wrote to memory of 3252 1196 un498730.exe 85 PID 1196 wrote to memory of 3252 1196 un498730.exe 85 PID 1196 wrote to memory of 2060 1196 un498730.exe 91 PID 1196 wrote to memory of 2060 1196 un498730.exe 91 PID 1196 wrote to memory of 2060 1196 un498730.exe 91 PID 452 wrote to memory of 1560 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 95 PID 452 wrote to memory of 1560 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 95 PID 452 wrote to memory of 1560 452 812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe"C:\Users\Admin\AppData\Local\Temp\812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 10804⤵
- Program crash
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 18724⤵
- Program crash
PID:4920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3252 -ip 32521⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2060 -ip 20601⤵PID:664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b9d4e7a88c5d20beb2809aea4fbdefa3
SHA1c375b5d47df0b49f2f42b151389344feb7027b06
SHA25637720a033f6afe175bf595313b2cd9f86ea79cb8e8006dd4f7bc5708e9f2bc39
SHA5122c75c221b2426ff5e6d96046b909fd870706fe6d5d39c8188f515f578e266bb101015fa43c8db9ea9e5c088f14fcb51e5eec00e14b97a602cd19bf28cf7301c6
-
Filesize
175KB
MD5b9d4e7a88c5d20beb2809aea4fbdefa3
SHA1c375b5d47df0b49f2f42b151389344feb7027b06
SHA25637720a033f6afe175bf595313b2cd9f86ea79cb8e8006dd4f7bc5708e9f2bc39
SHA5122c75c221b2426ff5e6d96046b909fd870706fe6d5d39c8188f515f578e266bb101015fa43c8db9ea9e5c088f14fcb51e5eec00e14b97a602cd19bf28cf7301c6
-
Filesize
555KB
MD56e857894f1ca57d034711fb8d754dfc5
SHA10581eae489f9c997603985bc6fa967d1ef41f76b
SHA256400c6e7bd69925c8bee08e187861cd35d773d7f85d0b62119be907d5b095c76f
SHA51212533f200088fa914675acf56e1f8fd53148f3c9344a72d55d9c59181edd86697799e85f8a491ecbf46248e43a8bc823a72572379e4376de6c5f26e5f550e77c
-
Filesize
555KB
MD56e857894f1ca57d034711fb8d754dfc5
SHA10581eae489f9c997603985bc6fa967d1ef41f76b
SHA256400c6e7bd69925c8bee08e187861cd35d773d7f85d0b62119be907d5b095c76f
SHA51212533f200088fa914675acf56e1f8fd53148f3c9344a72d55d9c59181edd86697799e85f8a491ecbf46248e43a8bc823a72572379e4376de6c5f26e5f550e77c
-
Filesize
347KB
MD562385fb337fc401de83d4665f69ebf02
SHA165d599b99ff9f59a8736488f47cbee2ae6c42fba
SHA25626606e93238012344c9ddd7b59b558d3bf056111c8294932b1f23d817654f97c
SHA512809d57ea96cfb31c200e3ea36cd55249eb73c4fc5d80091e866b79324e2dbfe8891b2165d920941f4980f481f706800c2854cfe24f7fe8bffbc8468d670af118
-
Filesize
347KB
MD562385fb337fc401de83d4665f69ebf02
SHA165d599b99ff9f59a8736488f47cbee2ae6c42fba
SHA25626606e93238012344c9ddd7b59b558d3bf056111c8294932b1f23d817654f97c
SHA512809d57ea96cfb31c200e3ea36cd55249eb73c4fc5d80091e866b79324e2dbfe8891b2165d920941f4980f481f706800c2854cfe24f7fe8bffbc8468d670af118
-
Filesize
406KB
MD5f3eb6e7d0821c85ca23016caa0ae224c
SHA1d91d013d70d18c6973b0ab37f1a2e8f6e56b9a14
SHA2565f58a3deacf400da35b77f3f31d6756cfdceb6a15e83aa9780182a7dcc75b55c
SHA512aef9ac25fff24de6796812520d952cc69c63ba5fd83d22603a8285b3fd87be1a4ec5c2482c19dc6f8e75597c8c06d1d9a3c9a929f280a137b1e33296012f5f61
-
Filesize
406KB
MD5f3eb6e7d0821c85ca23016caa0ae224c
SHA1d91d013d70d18c6973b0ab37f1a2e8f6e56b9a14
SHA2565f58a3deacf400da35b77f3f31d6756cfdceb6a15e83aa9780182a7dcc75b55c
SHA512aef9ac25fff24de6796812520d952cc69c63ba5fd83d22603a8285b3fd87be1a4ec5c2482c19dc6f8e75597c8c06d1d9a3c9a929f280a137b1e33296012f5f61