Analysis
-
max time kernel
59s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:43
Static task
static1
Behavioral task
behavioral1
Sample
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe
Resource
win10v2004-20230220-en
General
-
Target
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe
-
Size
697KB
-
MD5
04b31462db6b78ad20675f29f2af7ef5
-
SHA1
0c0b0a37e1291b2a93e77e2653a04f2c3462aac5
-
SHA256
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262
-
SHA512
bed099d097ab5f888c70e8ad25f6c35c41af15ee1ac63b9c1866fa1a852a3b399f77aba0ad512e693ba1a6a96d408ee858bc1267683a2aaa5d98705c102ffd40
-
SSDEEP
12288:oMrdy90ySwc0A9dBC3dtZsiZZhrp/YDx8WLkZ9LL6scGjqAxI9gja0bxAB4:1yvwBC3/aiZH4x5kvOGjnI9adSB4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro7003.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7003.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-192-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-191-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-194-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-196-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-198-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-200-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-202-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-204-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-206-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-209-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-213-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-216-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-218-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-220-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-222-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-224-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-226-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-228-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/2780-1109-0x0000000007180000-0x0000000007190000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un460634.exepro7003.exequ4046.exesi952110.exepid process 552 un460634.exe 3648 pro7003.exe 2780 qu4046.exe 4064 si952110.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7003.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7003.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un460634.exedc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460634.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un460634.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 756 3648 WerFault.exe pro7003.exe 4248 2780 WerFault.exe qu4046.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7003.exequ4046.exesi952110.exepid process 3648 pro7003.exe 3648 pro7003.exe 2780 qu4046.exe 2780 qu4046.exe 4064 si952110.exe 4064 si952110.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7003.exequ4046.exesi952110.exedescription pid process Token: SeDebugPrivilege 3648 pro7003.exe Token: SeDebugPrivilege 2780 qu4046.exe Token: SeDebugPrivilege 4064 si952110.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exeun460634.exedescription pid process target process PID 2296 wrote to memory of 552 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe un460634.exe PID 2296 wrote to memory of 552 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe un460634.exe PID 2296 wrote to memory of 552 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe un460634.exe PID 552 wrote to memory of 3648 552 un460634.exe pro7003.exe PID 552 wrote to memory of 3648 552 un460634.exe pro7003.exe PID 552 wrote to memory of 3648 552 un460634.exe pro7003.exe PID 552 wrote to memory of 2780 552 un460634.exe qu4046.exe PID 552 wrote to memory of 2780 552 un460634.exe qu4046.exe PID 552 wrote to memory of 2780 552 un460634.exe qu4046.exe PID 2296 wrote to memory of 4064 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe si952110.exe PID 2296 wrote to memory of 4064 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe si952110.exe PID 2296 wrote to memory of 4064 2296 dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe si952110.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe"C:\Users\Admin\AppData\Local\Temp\dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 10804⤵
- Program crash
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 15524⤵
- Program crash
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3648 -ip 36481⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2780 -ip 27801⤵PID:3592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51866a12101e68d6de04b25aca847c59a
SHA16a9526453ef19fe4dd4470b56687f337d6ed2bcc
SHA2565d2a0326900bdac0f67d4177d0ec0e4986c64c0ca559bc2ac308be678989aa71
SHA51271ed5258a8d87448d7ddbee19a84527280731a94a72af4f030c82959bb6cca3d43862130b26920a4fc5a14dadc64b7654b5af57b0ec716470438d2bb867df9da
-
Filesize
175KB
MD51866a12101e68d6de04b25aca847c59a
SHA16a9526453ef19fe4dd4470b56687f337d6ed2bcc
SHA2565d2a0326900bdac0f67d4177d0ec0e4986c64c0ca559bc2ac308be678989aa71
SHA51271ed5258a8d87448d7ddbee19a84527280731a94a72af4f030c82959bb6cca3d43862130b26920a4fc5a14dadc64b7654b5af57b0ec716470438d2bb867df9da
-
Filesize
555KB
MD5cc5248def23c410ca50e855cc058675a
SHA12e25ef90ad7749e1035c2ccee614e97418fa0c26
SHA2561e79697513510be03e0b14f6b06d294d9dc36db59f699640fd6f47509e17647f
SHA5126f8c9c9983165a74cae0a737d4e9dce12f67ad526742e5554cda29b9f2ee925ad43100a005cfba4f108fd1bd152591d1d430d7aecad22b89ac36dc9a957b8156
-
Filesize
555KB
MD5cc5248def23c410ca50e855cc058675a
SHA12e25ef90ad7749e1035c2ccee614e97418fa0c26
SHA2561e79697513510be03e0b14f6b06d294d9dc36db59f699640fd6f47509e17647f
SHA5126f8c9c9983165a74cae0a737d4e9dce12f67ad526742e5554cda29b9f2ee925ad43100a005cfba4f108fd1bd152591d1d430d7aecad22b89ac36dc9a957b8156
-
Filesize
347KB
MD50929d283b1eaa276d6ba6ee200a5ea7f
SHA16afc904cd3028889d38a93bf931e174d13b97c8e
SHA256523739e76afe077622fe9ee396277103bf0e64b4512bae5539e57951e07f84c9
SHA512e5c17b5ee8e05d870283066e7a9586d0cf7f1504af224eedabe39b99b99cbec5bf528b71fc151da1b3fb7d7ecc7e54a7175ae347e4b4cca571f0c7a39d00c0d4
-
Filesize
347KB
MD50929d283b1eaa276d6ba6ee200a5ea7f
SHA16afc904cd3028889d38a93bf931e174d13b97c8e
SHA256523739e76afe077622fe9ee396277103bf0e64b4512bae5539e57951e07f84c9
SHA512e5c17b5ee8e05d870283066e7a9586d0cf7f1504af224eedabe39b99b99cbec5bf528b71fc151da1b3fb7d7ecc7e54a7175ae347e4b4cca571f0c7a39d00c0d4
-
Filesize
406KB
MD5e6800bc6149513e36bb3e1425f65ff6a
SHA160c4525c6c57420cff9fa33ac93c3d5ddad54385
SHA2562288cf447c53867db76023ef6e45c9e545d37cfdb3fc4fe90b78ac755adec20f
SHA5126b8462f0107750d1f7d42fb8dfb3d6f32c2060259a56d815f15b70c28ceae721598e34d21d64ff69016e8d2a74ce6c98da87855cdd13477c9c3c414a389dea67
-
Filesize
406KB
MD5e6800bc6149513e36bb3e1425f65ff6a
SHA160c4525c6c57420cff9fa33ac93c3d5ddad54385
SHA2562288cf447c53867db76023ef6e45c9e545d37cfdb3fc4fe90b78ac755adec20f
SHA5126b8462f0107750d1f7d42fb8dfb3d6f32c2060259a56d815f15b70c28ceae721598e34d21d64ff69016e8d2a74ce6c98da87855cdd13477c9c3c414a389dea67