Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:00
Static task
static1
Behavioral task
behavioral1
Sample
979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe
Resource
win10v2004-20230220-en
General
-
Target
979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe
-
Size
697KB
-
MD5
397a42e5c3a05f90c1dd22f03f333b34
-
SHA1
cb326ea441355713dc9fe97001431560724179b2
-
SHA256
979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617
-
SHA512
6a7d1827b6219f80181861c9802b4999dd36a402a372c64ce9dee1e9cd571465a80c8e208abbe1bfc994ed2a41ba12e17a70697b5eab2304941d65b5526fe9eb
-
SSDEEP
12288:zMrry90j3x/kahN/V5q7zTyt8B/YKxyqZBSL6w/GjDAxI9gYjilgO:Yy23lDt5qutGxXmPGjgI9fOv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro4677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4677.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3120-194-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-195-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-197-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-199-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-201-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-203-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-205-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-207-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-209-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-211-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-213-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-215-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-217-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-219-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-221-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-223-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-225-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/3120-227-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un763474.exepro4677.exequ4621.exesi325133.exepid process 4696 un763474.exe 4264 pro4677.exe 3120 qu4621.exe 2312 si325133.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4677.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4677.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exeun763474.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un763474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un763474.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4976 4264 WerFault.exe pro4677.exe 4620 3120 WerFault.exe qu4621.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4677.exequ4621.exesi325133.exepid process 4264 pro4677.exe 4264 pro4677.exe 3120 qu4621.exe 3120 qu4621.exe 2312 si325133.exe 2312 si325133.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4677.exequ4621.exesi325133.exedescription pid process Token: SeDebugPrivilege 4264 pro4677.exe Token: SeDebugPrivilege 3120 qu4621.exe Token: SeDebugPrivilege 2312 si325133.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exeun763474.exedescription pid process target process PID 4456 wrote to memory of 4696 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe un763474.exe PID 4456 wrote to memory of 4696 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe un763474.exe PID 4456 wrote to memory of 4696 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe un763474.exe PID 4696 wrote to memory of 4264 4696 un763474.exe pro4677.exe PID 4696 wrote to memory of 4264 4696 un763474.exe pro4677.exe PID 4696 wrote to memory of 4264 4696 un763474.exe pro4677.exe PID 4696 wrote to memory of 3120 4696 un763474.exe qu4621.exe PID 4696 wrote to memory of 3120 4696 un763474.exe qu4621.exe PID 4696 wrote to memory of 3120 4696 un763474.exe qu4621.exe PID 4456 wrote to memory of 2312 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe si325133.exe PID 4456 wrote to memory of 2312 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe si325133.exe PID 4456 wrote to memory of 2312 4456 979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe si325133.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe"C:\Users\Admin\AppData\Local\Temp\979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10844⤵
- Program crash
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 13524⤵
- Program crash
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4264 -ip 42641⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3120 -ip 31201⤵PID:2612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD563154c854b9d41590d169acc4dce9250
SHA1243b237e8e51c3d192ba82d7d32b669f864808bc
SHA2569442b87e8091cf09749bdce771e9fcacae90a4a597faa2e2fafa0e6032d3ef92
SHA51230c1cd36a569f3c61d1f09f128eba05c5aceec2bb3d43bd6cf28a606824a2c35b04eedcc6ac5d9d0f6847169ab1a21c3337971a505bfc132be44ef8514fa7eb5
-
Filesize
175KB
MD563154c854b9d41590d169acc4dce9250
SHA1243b237e8e51c3d192ba82d7d32b669f864808bc
SHA2569442b87e8091cf09749bdce771e9fcacae90a4a597faa2e2fafa0e6032d3ef92
SHA51230c1cd36a569f3c61d1f09f128eba05c5aceec2bb3d43bd6cf28a606824a2c35b04eedcc6ac5d9d0f6847169ab1a21c3337971a505bfc132be44ef8514fa7eb5
-
Filesize
555KB
MD5864bdda444d4f9de46e27e44411526b4
SHA141be5abc1048142a3041cd50fbe5cacde4904a81
SHA2562983f76178c36895be7adb6c79082bfa9ae9d2fa2e269a82c16220eb277e6180
SHA5129023293ef2c4c1a1d13f02e2c5b45211edfe2814a17f8eca0801c3a2dc19286592326e8e35c7d219268cd81634ac1a7bb5ff4238e75e7ceeacf1f9417c255b6a
-
Filesize
555KB
MD5864bdda444d4f9de46e27e44411526b4
SHA141be5abc1048142a3041cd50fbe5cacde4904a81
SHA2562983f76178c36895be7adb6c79082bfa9ae9d2fa2e269a82c16220eb277e6180
SHA5129023293ef2c4c1a1d13f02e2c5b45211edfe2814a17f8eca0801c3a2dc19286592326e8e35c7d219268cd81634ac1a7bb5ff4238e75e7ceeacf1f9417c255b6a
-
Filesize
347KB
MD5a1d6431d68bd065cfd1de26bd2d8230d
SHA1f3b3e0edce926bf872ad2971664083e263794da1
SHA256d68ebd54b238a38298332b58bf1b7d8a683e7e065db67010781713279c844155
SHA5127bf5196963b731add03cd0785ee687be5df2100a1cc2cfc6edf1dffa1e01f2c3f1dd5adb73b52488c23c94e1691d408cd41fc2cd6f069b74e49182fb2ed554e6
-
Filesize
347KB
MD5a1d6431d68bd065cfd1de26bd2d8230d
SHA1f3b3e0edce926bf872ad2971664083e263794da1
SHA256d68ebd54b238a38298332b58bf1b7d8a683e7e065db67010781713279c844155
SHA5127bf5196963b731add03cd0785ee687be5df2100a1cc2cfc6edf1dffa1e01f2c3f1dd5adb73b52488c23c94e1691d408cd41fc2cd6f069b74e49182fb2ed554e6
-
Filesize
406KB
MD5bd000ea4033929aa73f583146eeb9522
SHA19d873f4c3f197bd2b7aea5e8de7c6428bf1750eb
SHA25626769d98f8005914c5cec39d130c6c952ac9897653a0d64d19a67d5d089ac56e
SHA512d9f7821043ad63f253d7a7e3b9b0f9fcd2017954d9fc9b910d7ffc4c86499e7434ea935daa59f465e58f71c6913884656bfcdb09e58b1b7d60d3898af094100e
-
Filesize
406KB
MD5bd000ea4033929aa73f583146eeb9522
SHA19d873f4c3f197bd2b7aea5e8de7c6428bf1750eb
SHA25626769d98f8005914c5cec39d130c6c952ac9897653a0d64d19a67d5d089ac56e
SHA512d9f7821043ad63f253d7a7e3b9b0f9fcd2017954d9fc9b910d7ffc4c86499e7434ea935daa59f465e58f71c6913884656bfcdb09e58b1b7d60d3898af094100e