Analysis
-
max time kernel
76s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:45
Static task
static1
Behavioral task
behavioral1
Sample
139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe
Resource
win10v2004-20230220-en
General
-
Target
139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe
-
Size
697KB
-
MD5
8323a8a66cf02e185e83aa1605aa7184
-
SHA1
95aacbbcb06ecdaab2e3b55952ad51297f24688a
-
SHA256
139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2
-
SHA512
4093ce7948db190526005dc64a6fe8364889d185f9dddb03255b06a2b51b967b15f724284603422cef9b9ba2d49da4be4dd020cdaea37771fbbfdda11bdfe3e3
-
SSDEEP
12288:KMrxy90LV+2szMFTopf8X/YWlLucjnJSKh+L6ZqGjUAxI9gTv4F:7yNzEopfolLucjJSmktGjtI9Mw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro1527.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1527.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-196-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-203-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-206-0x0000000007190000-0x00000000071A0000-memory.dmp family_redline behavioral1/memory/2032-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2032-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un258616.exepro1527.exequ2292.exesi547515.exepid process 708 un258616.exe 1544 pro1527.exe 2032 qu2292.exe 3184 si547515.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1527.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1527.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un258616.exe139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un258616.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un258616.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2196 1544 WerFault.exe pro1527.exe 2684 2032 WerFault.exe qu2292.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1527.exequ2292.exesi547515.exepid process 1544 pro1527.exe 1544 pro1527.exe 2032 qu2292.exe 2032 qu2292.exe 3184 si547515.exe 3184 si547515.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1527.exequ2292.exesi547515.exedescription pid process Token: SeDebugPrivilege 1544 pro1527.exe Token: SeDebugPrivilege 2032 qu2292.exe Token: SeDebugPrivilege 3184 si547515.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exeun258616.exedescription pid process target process PID 2704 wrote to memory of 708 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe un258616.exe PID 2704 wrote to memory of 708 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe un258616.exe PID 2704 wrote to memory of 708 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe un258616.exe PID 708 wrote to memory of 1544 708 un258616.exe pro1527.exe PID 708 wrote to memory of 1544 708 un258616.exe pro1527.exe PID 708 wrote to memory of 1544 708 un258616.exe pro1527.exe PID 708 wrote to memory of 2032 708 un258616.exe qu2292.exe PID 708 wrote to memory of 2032 708 un258616.exe qu2292.exe PID 708 wrote to memory of 2032 708 un258616.exe qu2292.exe PID 2704 wrote to memory of 3184 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe si547515.exe PID 2704 wrote to memory of 3184 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe si547515.exe PID 2704 wrote to memory of 3184 2704 139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe si547515.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe"C:\Users\Admin\AppData\Local\Temp\139e7ddffabd1ca03c8e2977555657b2e8a44e73bdf11c1ea3bd12e3ee6282f2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un258616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un258616.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1527.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 10844⤵
- Program crash
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2292.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 11484⤵
- Program crash
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si547515.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si547515.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1544 -ip 15441⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2032 -ip 20321⤵PID:5084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b47ae95cb79f78981a4b3ae2ce0fb713
SHA19411d4670eda51e38cb5160fd7ff7aaa818b7284
SHA256db78bafec7fcdb40992b1909c8a388ff0e2ca0b5bf756d9fdf6d7a8ea156bb91
SHA512cf57a15c2d26a790a9227fee207485c88c46c55db6f747718f8ddba99cda98493ca1972a509852bbba0bf240cdd225e5609a53290e775923ab26c40df84f52f1
-
Filesize
175KB
MD5b47ae95cb79f78981a4b3ae2ce0fb713
SHA19411d4670eda51e38cb5160fd7ff7aaa818b7284
SHA256db78bafec7fcdb40992b1909c8a388ff0e2ca0b5bf756d9fdf6d7a8ea156bb91
SHA512cf57a15c2d26a790a9227fee207485c88c46c55db6f747718f8ddba99cda98493ca1972a509852bbba0bf240cdd225e5609a53290e775923ab26c40df84f52f1
-
Filesize
556KB
MD55cd031f8ede78293c0280f56aec2ba25
SHA19b5ea5b87418e5a658daa0cc5aa9b4841a7853f1
SHA25614ed20e92a654572f688e5c395b5064a328e5f8d09b34105ec29c63950d79520
SHA512baf9e1c4e459eabf8ad04c66bb45c62ab2a08fe834b46aad782ed89b183130f0241faab6873c660f01dfba354c77ccaa779c51ee07438dbd4020d91f7ecb0970
-
Filesize
556KB
MD55cd031f8ede78293c0280f56aec2ba25
SHA19b5ea5b87418e5a658daa0cc5aa9b4841a7853f1
SHA25614ed20e92a654572f688e5c395b5064a328e5f8d09b34105ec29c63950d79520
SHA512baf9e1c4e459eabf8ad04c66bb45c62ab2a08fe834b46aad782ed89b183130f0241faab6873c660f01dfba354c77ccaa779c51ee07438dbd4020d91f7ecb0970
-
Filesize
347KB
MD5eb6e45a191d58ab613318b209fb7e9f7
SHA177ef01546a1ee8efff27c1f2c38bf7d970f010c0
SHA256ced065a945947305ffd20d8c0d5f13707f6dda8ea30b284ea7a69349b38a8b35
SHA512777317e933b99e6c6c4f851c01fb8074523cd9031e23dc310ce538a49114783703305c640f670450a875fd4ced673fa1bc98e142adf34fb5d6a05db5b27f726a
-
Filesize
347KB
MD5eb6e45a191d58ab613318b209fb7e9f7
SHA177ef01546a1ee8efff27c1f2c38bf7d970f010c0
SHA256ced065a945947305ffd20d8c0d5f13707f6dda8ea30b284ea7a69349b38a8b35
SHA512777317e933b99e6c6c4f851c01fb8074523cd9031e23dc310ce538a49114783703305c640f670450a875fd4ced673fa1bc98e142adf34fb5d6a05db5b27f726a
-
Filesize
406KB
MD5e2b4fd5da37cf239b4a3a200a78e22a3
SHA165a09bd6e14947185c8ad2e186d34822e2727269
SHA256878d80e83fc38f273796a80f2a0a6c7b519d8b00fb0447af301ccfe6da7c1070
SHA51229336d5f44e25f1717d0fb640ed508738fd9fbcc6da47a22200f116cdbf3c55b7b335d8c828ffd262c49e3b5fc842a058f804f633a3212322efabe35f9989c42
-
Filesize
406KB
MD5e2b4fd5da37cf239b4a3a200a78e22a3
SHA165a09bd6e14947185c8ad2e186d34822e2727269
SHA256878d80e83fc38f273796a80f2a0a6c7b519d8b00fb0447af301ccfe6da7c1070
SHA51229336d5f44e25f1717d0fb640ed508738fd9fbcc6da47a22200f116cdbf3c55b7b335d8c828ffd262c49e3b5fc842a058f804f633a3212322efabe35f9989c42