Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe
Resource
win10v2004-20230220-en
General
-
Target
622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe
-
Size
697KB
-
MD5
4ea3317f70089323d48ff7964a1ac51b
-
SHA1
c7a8a789f4592aa059523ff1782ce44df7f039c6
-
SHA256
622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a
-
SHA512
b2577364578e29d0bd96d3da88193cabf9ca4150908a758d5466f8c2e9cfd94a5d763d34f32cea9463fccb7556f5f2e15bb640db5352baab9f22e1a54def74f2
-
SSDEEP
12288:rMrBy90ckSy2+x1Y/3tw9aIKPnDYdgD2mrDB1L6xQGjYAxI9gFDHP7KX:+y5y2+LY/tw9QPDV7bHGjpI9qvKX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro6896.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6896.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6896.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6896.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2088-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-193-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-200-0x00000000071E0000-0x00000000071F0000-memory.dmp family_redline behavioral1/memory/2088-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2088-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un002806.exepro6896.exequ7316.exesi771680.exepid process 628 un002806.exe 1028 pro6896.exe 2088 qu7316.exe 236 si771680.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6896.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6896.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6896.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un002806.exe622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un002806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un002806.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3616 1028 WerFault.exe pro6896.exe 768 2088 WerFault.exe qu7316.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6896.exequ7316.exesi771680.exepid process 1028 pro6896.exe 1028 pro6896.exe 2088 qu7316.exe 2088 qu7316.exe 236 si771680.exe 236 si771680.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6896.exequ7316.exesi771680.exedescription pid process Token: SeDebugPrivilege 1028 pro6896.exe Token: SeDebugPrivilege 2088 qu7316.exe Token: SeDebugPrivilege 236 si771680.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exeun002806.exedescription pid process target process PID 4272 wrote to memory of 628 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe un002806.exe PID 4272 wrote to memory of 628 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe un002806.exe PID 4272 wrote to memory of 628 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe un002806.exe PID 628 wrote to memory of 1028 628 un002806.exe pro6896.exe PID 628 wrote to memory of 1028 628 un002806.exe pro6896.exe PID 628 wrote to memory of 1028 628 un002806.exe pro6896.exe PID 628 wrote to memory of 2088 628 un002806.exe qu7316.exe PID 628 wrote to memory of 2088 628 un002806.exe qu7316.exe PID 628 wrote to memory of 2088 628 un002806.exe qu7316.exe PID 4272 wrote to memory of 236 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe si771680.exe PID 4272 wrote to memory of 236 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe si771680.exe PID 4272 wrote to memory of 236 4272 622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe si771680.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe"C:\Users\Admin\AppData\Local\Temp\622fd5de4da0db62714f748b448e882de7364aae6ebade66921eafc6e5d60e5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002806.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6896.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 10804⤵
- Program crash
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7316.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7316.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 13644⤵
- Program crash
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si771680.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si771680.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1028 -ip 10281⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2088 -ip 20881⤵PID:2188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5596e714b07722409412b2b9e207bdf49
SHA1dead4c3d0c18aa4144361023697e6192b46a781b
SHA2566744610a5bdc8a960fd11a6899cfb5d485eb3c827ed2814c7f412510a4fc55b9
SHA512f042dd8a3f407e1118d8163b5beef8a6acbebd7a6c35b29f1d675b038e117282f38deb4f76a8d01c6a998381bc28c471849d03e93a2c6113ec5e4908f0842f4d
-
Filesize
175KB
MD5596e714b07722409412b2b9e207bdf49
SHA1dead4c3d0c18aa4144361023697e6192b46a781b
SHA2566744610a5bdc8a960fd11a6899cfb5d485eb3c827ed2814c7f412510a4fc55b9
SHA512f042dd8a3f407e1118d8163b5beef8a6acbebd7a6c35b29f1d675b038e117282f38deb4f76a8d01c6a998381bc28c471849d03e93a2c6113ec5e4908f0842f4d
-
Filesize
555KB
MD58611fb9760fc865656912b96c7d28ed1
SHA1d99e2a8ed834ed0265e9816f7a54641296b304f2
SHA256a51dd2eba47ac8f95b800bf8ae64207d3201e7273680266baaabb0bbab3eff17
SHA512012f5a04034c4d24477b82a51b93813153a78af1061f228d881983ce28a093f69c46061175455069d0056dc4d4fddf82b84a31dd27e053ed4ebcd5bb2ac52f35
-
Filesize
555KB
MD58611fb9760fc865656912b96c7d28ed1
SHA1d99e2a8ed834ed0265e9816f7a54641296b304f2
SHA256a51dd2eba47ac8f95b800bf8ae64207d3201e7273680266baaabb0bbab3eff17
SHA512012f5a04034c4d24477b82a51b93813153a78af1061f228d881983ce28a093f69c46061175455069d0056dc4d4fddf82b84a31dd27e053ed4ebcd5bb2ac52f35
-
Filesize
347KB
MD5929a2da48942aee1ffcee86a4937cd1b
SHA1d02151c6db2e9163d80590c0205d15c6c8c16943
SHA25697c649767629f927492f7ae46df311581bdae7b770583cbad0c79981210bbb04
SHA51258a2d3c50c3f5ebc5cb884e36ced8083b5d0b7983b561755a9e547ec0249686460918e88b3e6793082621375f1fef6fe2a0462dcd11b7ce60c903b824dc6bd78
-
Filesize
347KB
MD5929a2da48942aee1ffcee86a4937cd1b
SHA1d02151c6db2e9163d80590c0205d15c6c8c16943
SHA25697c649767629f927492f7ae46df311581bdae7b770583cbad0c79981210bbb04
SHA51258a2d3c50c3f5ebc5cb884e36ced8083b5d0b7983b561755a9e547ec0249686460918e88b3e6793082621375f1fef6fe2a0462dcd11b7ce60c903b824dc6bd78
-
Filesize
406KB
MD5649d3f989746e63925c8b2d5f33a68c6
SHA172ad34524b4f64c0b94280f64d7d60ce7c6ec52e
SHA2568e3c3a350fedb613ede8ce3ca9d4de5e99419ab80f4c77e1d6c50676f1a1e229
SHA512b5c6d3de5859f29b10a4d21a479e9f9b3b23b719ee845bfbef051a307d02c16d7da32cb75cff46efc76c59fda677fd7c4a2a3d321cd9264702aae61cd3908739
-
Filesize
406KB
MD5649d3f989746e63925c8b2d5f33a68c6
SHA172ad34524b4f64c0b94280f64d7d60ce7c6ec52e
SHA2568e3c3a350fedb613ede8ce3ca9d4de5e99419ab80f4c77e1d6c50676f1a1e229
SHA512b5c6d3de5859f29b10a4d21a479e9f9b3b23b719ee845bfbef051a307d02c16d7da32cb75cff46efc76c59fda677fd7c4a2a3d321cd9264702aae61cd3908739