Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:47
Static task
static1
Behavioral task
behavioral1
Sample
b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe
Resource
win10v2004-20230220-en
General
-
Target
b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe
-
Size
697KB
-
MD5
39a46897b4d88b982c886ac7307a5bcb
-
SHA1
c4fdd6f6df0bfb76848868d7f3de1c77e65c2f0b
-
SHA256
b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476
-
SHA512
7e45aa31e96f975a918efdae5eca6e4f07fdd977dce061564ec2138d5afa89f886f0a211e34328a0a6af870cb578d12cabe554caa0a4e7bf2464fd417c1f8398
-
SSDEEP
12288:tMr7y90Lj/MSIrU0mK2FFC+iG1Hv8tWzNkdIjL6L3GjuAxI9gsFE+IL:KyAj/MmK4bNlv8a3KGjDI9raL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro9472.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9472.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4464-191-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-194-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-192-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-196-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-198-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-200-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-202-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-205-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-208-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-212-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-214-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-216-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-218-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-220-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-222-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-224-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-226-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4464-228-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un528202.exepro9472.exequ4957.exesi540655.exepid process 4796 un528202.exe 3920 pro9472.exe 4464 qu4957.exe 3120 si540655.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9472.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9472.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exeun528202.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un528202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un528202.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3584 3920 WerFault.exe pro9472.exe 2672 4464 WerFault.exe qu4957.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9472.exequ4957.exesi540655.exepid process 3920 pro9472.exe 3920 pro9472.exe 4464 qu4957.exe 4464 qu4957.exe 3120 si540655.exe 3120 si540655.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9472.exequ4957.exesi540655.exedescription pid process Token: SeDebugPrivilege 3920 pro9472.exe Token: SeDebugPrivilege 4464 qu4957.exe Token: SeDebugPrivilege 3120 si540655.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exeun528202.exedescription pid process target process PID 1016 wrote to memory of 4796 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe un528202.exe PID 1016 wrote to memory of 4796 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe un528202.exe PID 1016 wrote to memory of 4796 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe un528202.exe PID 4796 wrote to memory of 3920 4796 un528202.exe pro9472.exe PID 4796 wrote to memory of 3920 4796 un528202.exe pro9472.exe PID 4796 wrote to memory of 3920 4796 un528202.exe pro9472.exe PID 4796 wrote to memory of 4464 4796 un528202.exe qu4957.exe PID 4796 wrote to memory of 4464 4796 un528202.exe qu4957.exe PID 4796 wrote to memory of 4464 4796 un528202.exe qu4957.exe PID 1016 wrote to memory of 3120 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe si540655.exe PID 1016 wrote to memory of 3120 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe si540655.exe PID 1016 wrote to memory of 3120 1016 b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe si540655.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe"C:\Users\Admin\AppData\Local\Temp\b3d6794b902ef92e471ec7da72585c71478d68ca22e36ebb31143c2b98cd4476.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9472.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9472.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 10804⤵
- Program crash
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4957.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13284⤵
- Program crash
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540655.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540655.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3920 -ip 39201⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4464 -ip 44641⤵PID:2264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b0280569ebd40b92a335c4cc139277ab
SHA1a2fbe9ab5c94fd30a55f1f92ec4231a6684a1c74
SHA25690757a18da7626adb65a1c7c06cf6a70e56b138efc430ccea25a2b2ba8e15243
SHA512a5b20dae4f11f5ca41fd020f4315e5fc4f81b959b5a62882204a241cffa959c5183e144c019c93b511d26b8fa0403b8748a967c622af30f381ee277b5153f433
-
Filesize
175KB
MD5b0280569ebd40b92a335c4cc139277ab
SHA1a2fbe9ab5c94fd30a55f1f92ec4231a6684a1c74
SHA25690757a18da7626adb65a1c7c06cf6a70e56b138efc430ccea25a2b2ba8e15243
SHA512a5b20dae4f11f5ca41fd020f4315e5fc4f81b959b5a62882204a241cffa959c5183e144c019c93b511d26b8fa0403b8748a967c622af30f381ee277b5153f433
-
Filesize
555KB
MD5a03d205827fd8363f0b3ba876a8d9930
SHA10069d115990af61875226a5da8f5c90a41c438e7
SHA256969cc2e3299cb635b68d7e52c877342ef8acd13ec08218cfab476a9519be9ee2
SHA51229ee9e70a1c0bfd181072ad6c51cc3c80e374d2b4000cce79b3630f7bca5da89c06568f223b43196aa3a122cb727919b90eb9bfb166b67abe538abf9e396e8dd
-
Filesize
555KB
MD5a03d205827fd8363f0b3ba876a8d9930
SHA10069d115990af61875226a5da8f5c90a41c438e7
SHA256969cc2e3299cb635b68d7e52c877342ef8acd13ec08218cfab476a9519be9ee2
SHA51229ee9e70a1c0bfd181072ad6c51cc3c80e374d2b4000cce79b3630f7bca5da89c06568f223b43196aa3a122cb727919b90eb9bfb166b67abe538abf9e396e8dd
-
Filesize
347KB
MD5a7e673e7c427b8c78c7d1c715a9e0107
SHA1d2137131d00d07eafe1e3fae9ced6d870bba8079
SHA256eb0951547100be36c6468016201266b92d2c57670dc217954a3549de42825b2a
SHA51277219fc48bb6e3d5b603556e21507e861b55a29a374da9330b31cf6c33a5bcdec5607980ba97058544d6912592c96b59fa0929d09d0752c324b506aca031a5f7
-
Filesize
347KB
MD5a7e673e7c427b8c78c7d1c715a9e0107
SHA1d2137131d00d07eafe1e3fae9ced6d870bba8079
SHA256eb0951547100be36c6468016201266b92d2c57670dc217954a3549de42825b2a
SHA51277219fc48bb6e3d5b603556e21507e861b55a29a374da9330b31cf6c33a5bcdec5607980ba97058544d6912592c96b59fa0929d09d0752c324b506aca031a5f7
-
Filesize
406KB
MD5217eeae2d7c414fc038c6d9860f46a11
SHA120fdb02dd4e442ce9948dbe0b33f7b24eacfb5c3
SHA2562b9dcd003495981467384910b205b77f19df703c7502f2aa095605f786b47bbb
SHA512fb9477ebc6a58395d5797503528d06b0e171fde6c4fef3770a95be83a6d39bed251047c0d5138c389c85e91289eeaa7c711aa4f8908ab18fdd77e712ae25159a
-
Filesize
406KB
MD5217eeae2d7c414fc038c6d9860f46a11
SHA120fdb02dd4e442ce9948dbe0b33f7b24eacfb5c3
SHA2562b9dcd003495981467384910b205b77f19df703c7502f2aa095605f786b47bbb
SHA512fb9477ebc6a58395d5797503528d06b0e171fde6c4fef3770a95be83a6d39bed251047c0d5138c389c85e91289eeaa7c711aa4f8908ab18fdd77e712ae25159a