Analysis
-
max time kernel
105s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:56
Static task
static1
Behavioral task
behavioral1
Sample
e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe
Resource
win10v2004-20230220-en
General
-
Target
e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe
-
Size
698KB
-
MD5
11d68b0cc0fb38109e24b221a74c1583
-
SHA1
d2c0d2b25e5d56dd14a403c3ab98e95eafb8bb54
-
SHA256
e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67
-
SHA512
ab496ee54f84f06d62f133bc2aed69eeb443949cd4605f78d5492ce411488fb35e3ef2390a3cda65ad89dd9cafa4c916b2e94990aff94229e067e185fc61d298
-
SSDEEP
12288:oMrYy90iHwr4ZtlWgypZZqp/Yj3Vj0q7tklqL6fyGjgAxI9g0SU7cdODV:wy3QbgypZsm3Vj0q7tFnGjxI9Zr7cMR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro8581.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8581.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4160-193-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-196-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-198-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-200-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-202-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-204-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-206-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-208-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-210-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-212-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-214-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-216-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-218-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-220-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-226-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-223-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-228-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4160-1110-0x0000000004E50000-0x0000000004E60000-memory.dmp family_redline behavioral1/memory/4160-1111-0x0000000004E50000-0x0000000004E60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un676112.exepro8581.exequ4834.exesi377632.exepid process 4932 un676112.exe 2024 pro8581.exe 4160 qu4834.exe 3720 si377632.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8581.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8581.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exeun676112.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un676112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un676112.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1968 2024 WerFault.exe pro8581.exe 4492 4160 WerFault.exe qu4834.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8581.exequ4834.exesi377632.exepid process 2024 pro8581.exe 2024 pro8581.exe 4160 qu4834.exe 4160 qu4834.exe 3720 si377632.exe 3720 si377632.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8581.exequ4834.exesi377632.exedescription pid process Token: SeDebugPrivilege 2024 pro8581.exe Token: SeDebugPrivilege 4160 qu4834.exe Token: SeDebugPrivilege 3720 si377632.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exeun676112.exedescription pid process target process PID 4184 wrote to memory of 4932 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe un676112.exe PID 4184 wrote to memory of 4932 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe un676112.exe PID 4184 wrote to memory of 4932 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe un676112.exe PID 4932 wrote to memory of 2024 4932 un676112.exe pro8581.exe PID 4932 wrote to memory of 2024 4932 un676112.exe pro8581.exe PID 4932 wrote to memory of 2024 4932 un676112.exe pro8581.exe PID 4932 wrote to memory of 4160 4932 un676112.exe qu4834.exe PID 4932 wrote to memory of 4160 4932 un676112.exe qu4834.exe PID 4932 wrote to memory of 4160 4932 un676112.exe qu4834.exe PID 4184 wrote to memory of 3720 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe si377632.exe PID 4184 wrote to memory of 3720 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe si377632.exe PID 4184 wrote to memory of 3720 4184 e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe si377632.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe"C:\Users\Admin\AppData\Local\Temp\e33068f44ee80a25fca85c6f14b2b166ce68b112cf17f22fbf0a12cfba3d4c67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676112.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676112.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8581.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8581.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10964⤵
- Program crash
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4834.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 20924⤵
- Program crash
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si377632.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si377632.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2024 -ip 20241⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4160 -ip 41601⤵PID:1072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52c1313ba3c09513cfbc3db62011388bc
SHA11820c7b958d6e15f7060482788de14aa3ee735a3
SHA25614cdbac79fc21aceded5f77a66eb1fc661503283ea535f6e7dcc69a35fb2651d
SHA512b0b0f91c1d20dd8aa83972b89f3afe994b6c8b8c0eb836a2280403c0e6ceb28b13b5200e98fb7265a4b492c25f7caeac0815a3175865bede7adec96d11da2d7a
-
Filesize
175KB
MD52c1313ba3c09513cfbc3db62011388bc
SHA11820c7b958d6e15f7060482788de14aa3ee735a3
SHA25614cdbac79fc21aceded5f77a66eb1fc661503283ea535f6e7dcc69a35fb2651d
SHA512b0b0f91c1d20dd8aa83972b89f3afe994b6c8b8c0eb836a2280403c0e6ceb28b13b5200e98fb7265a4b492c25f7caeac0815a3175865bede7adec96d11da2d7a
-
Filesize
556KB
MD5554c77f79c6df05e4cbed38f75e7f2f3
SHA1c10e3c52b9ff34626db92f9d8f5cf519e2f8bd64
SHA256f49ae2a3df11f46fe134e59829d584f3c8821594d9af798401e5d8e7d9c5b34e
SHA5127e7eee680c59bdc9f71a488145103a57ee5e0366b269ac7c4cf79c97a2808970e8379c2f0d0b829d13878a8b3cfe2670e88c070c419a34b5105149c215881edc
-
Filesize
556KB
MD5554c77f79c6df05e4cbed38f75e7f2f3
SHA1c10e3c52b9ff34626db92f9d8f5cf519e2f8bd64
SHA256f49ae2a3df11f46fe134e59829d584f3c8821594d9af798401e5d8e7d9c5b34e
SHA5127e7eee680c59bdc9f71a488145103a57ee5e0366b269ac7c4cf79c97a2808970e8379c2f0d0b829d13878a8b3cfe2670e88c070c419a34b5105149c215881edc
-
Filesize
347KB
MD5a195e21d804a25a057da18bfb256108d
SHA14e1c3255b504cd1c5834234c71b4c87fef1fe173
SHA256ea14f45cda4e5e5a79f322860929729335b402d61f074c055823d9ec4808bfd6
SHA5129446f9ae52e7dbc1182a1a47fdf667976bd175bcc99fc28afcbaab93d8c5aac07cf0da2dea778668c247e214ae51a3ad81768ca65a7dc82b2f3740ec30249dad
-
Filesize
347KB
MD5a195e21d804a25a057da18bfb256108d
SHA14e1c3255b504cd1c5834234c71b4c87fef1fe173
SHA256ea14f45cda4e5e5a79f322860929729335b402d61f074c055823d9ec4808bfd6
SHA5129446f9ae52e7dbc1182a1a47fdf667976bd175bcc99fc28afcbaab93d8c5aac07cf0da2dea778668c247e214ae51a3ad81768ca65a7dc82b2f3740ec30249dad
-
Filesize
406KB
MD529b737ccb05d16b95401bee7a4a4bc94
SHA10f29ce623b625d47d46fdf8c453b57a63020ab8a
SHA256b656f741167e7e1d0a84cbea7c3763bcd041bbc43e0e3bc2ebb180847a15f146
SHA512009fa951ee7cc178324d4e4ce2056cb7d61ab3d9c27f26e4337c1dff42dc89f2454f70551f65231dde5fc48ee0252191a2fa9ca8ddf6bcdef726209ae3c5bf8c
-
Filesize
406KB
MD529b737ccb05d16b95401bee7a4a4bc94
SHA10f29ce623b625d47d46fdf8c453b57a63020ab8a
SHA256b656f741167e7e1d0a84cbea7c3763bcd041bbc43e0e3bc2ebb180847a15f146
SHA512009fa951ee7cc178324d4e4ce2056cb7d61ab3d9c27f26e4337c1dff42dc89f2454f70551f65231dde5fc48ee0252191a2fa9ca8ddf6bcdef726209ae3c5bf8c