Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe
Resource
win10v2004-20230220-en
General
-
Target
4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe
-
Size
695KB
-
MD5
f0c14f880e5163a0d6b2a1cc38b6d696
-
SHA1
eae8839384783d09db8df8b78c4cf05a6ea0f083
-
SHA256
4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4
-
SHA512
146891fbcfd0f30b23d5ff08ed6adbac259f6cd90d86cebb2ca7fc2f9dea83e3e36534b84a8e0e5354944836a06c305e14f46b60b35de761ab5bcefda3dd1b65
-
SSDEEP
12288:TMr7y90ObM2X8gSwZlTZZTX/aUraDzEqeVvqXhdn2JdOVe4mZLI48jebGA3da:oyzbM2X8ulTZYUrOwlMhNNmJPRU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5518.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5518.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3984-192-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-198-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-202-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-206-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-208-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-212-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3984-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4120 un767283.exe 2744 pro5518.exe 3984 qu5155.exe 1636 si044524.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5518.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un767283.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un767283.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 384 2744 WerFault.exe 84 424 3984 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2744 pro5518.exe 2744 pro5518.exe 3984 qu5155.exe 3984 qu5155.exe 1636 si044524.exe 1636 si044524.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 pro5518.exe Token: SeDebugPrivilege 3984 qu5155.exe Token: SeDebugPrivilege 1636 si044524.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4120 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 83 PID 1504 wrote to memory of 4120 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 83 PID 1504 wrote to memory of 4120 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 83 PID 4120 wrote to memory of 2744 4120 un767283.exe 84 PID 4120 wrote to memory of 2744 4120 un767283.exe 84 PID 4120 wrote to memory of 2744 4120 un767283.exe 84 PID 4120 wrote to memory of 3984 4120 un767283.exe 90 PID 4120 wrote to memory of 3984 4120 un767283.exe 90 PID 4120 wrote to memory of 3984 4120 un767283.exe 90 PID 1504 wrote to memory of 1636 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 94 PID 1504 wrote to memory of 1636 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 94 PID 1504 wrote to memory of 1636 1504 4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe"C:\Users\Admin\AppData\Local\Temp\4404ddaf155699426612cf5e0c7368708e36c3f84d6f42e2976c81fd095c6fc4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un767283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un767283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5518.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 10804⤵
- Program crash
PID:384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 13404⤵
- Program crash
PID:424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044524.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044524.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2744 -ip 27441⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3984 -ip 39841⤵PID:436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dfb45ebb13654d6ef23a27d27248db9b
SHA1a2b6abc79cf1df28bacc6e7b40b1601d6fc786c8
SHA25652ef3811c17d1ab956087e390c1324dedb7f1a16e7901552080344d0ceda42ec
SHA51250db1f6c8cfcd2a48ceed445391ec57a350db6f9b96a28efb1d5b8f4a57eb674cd8c3adc412b366ba4d0c4b823acaf008687b5c812273db3d645b1d27030eeb5
-
Filesize
175KB
MD5dfb45ebb13654d6ef23a27d27248db9b
SHA1a2b6abc79cf1df28bacc6e7b40b1601d6fc786c8
SHA25652ef3811c17d1ab956087e390c1324dedb7f1a16e7901552080344d0ceda42ec
SHA51250db1f6c8cfcd2a48ceed445391ec57a350db6f9b96a28efb1d5b8f4a57eb674cd8c3adc412b366ba4d0c4b823acaf008687b5c812273db3d645b1d27030eeb5
-
Filesize
553KB
MD51049c6055f7d399d4ceeb20b6a1101f0
SHA1d60c952d376cbc2ae671d9a86cd4cdd325493a68
SHA2563717797afd66afaa55424f7fa581c4f6f500799663b3f787c11959809256bd6d
SHA512de7cbe6627a4e6477dcd16223159c7e27dc41d4b830c988f0a602e1961e01be3f864bd6694ce44304ba549f2bbf535313756992086ff3ed4bb71b9762d10363f
-
Filesize
553KB
MD51049c6055f7d399d4ceeb20b6a1101f0
SHA1d60c952d376cbc2ae671d9a86cd4cdd325493a68
SHA2563717797afd66afaa55424f7fa581c4f6f500799663b3f787c11959809256bd6d
SHA512de7cbe6627a4e6477dcd16223159c7e27dc41d4b830c988f0a602e1961e01be3f864bd6694ce44304ba549f2bbf535313756992086ff3ed4bb71b9762d10363f
-
Filesize
347KB
MD59aeb1a546ff7118baef02b11df6d77e5
SHA1cdf1622e194b3a1341d166184735d1b975970713
SHA25689f3ed5d2d92168755b6697612368f932505d04c1730a942e6934d6599aeaf67
SHA512b83f8d3b942985918452183fb1c52e2757d2dc8727eff2a34ff95fd37c287af53665d834fb5ad1510a5d8e62ca56b33c7068954787ef9843f6d6fd58104e6c9b
-
Filesize
347KB
MD59aeb1a546ff7118baef02b11df6d77e5
SHA1cdf1622e194b3a1341d166184735d1b975970713
SHA25689f3ed5d2d92168755b6697612368f932505d04c1730a942e6934d6599aeaf67
SHA512b83f8d3b942985918452183fb1c52e2757d2dc8727eff2a34ff95fd37c287af53665d834fb5ad1510a5d8e62ca56b33c7068954787ef9843f6d6fd58104e6c9b
-
Filesize
405KB
MD58c081462f2efea118a36906dcb1148bd
SHA10852e36e0b36e7bbefb04905509b59d48cecdfbc
SHA2563adff72829294cb00c170e7c1fc3e8a82f52999218b6da9e7b688e5562fc1e34
SHA5124570f086580ae1c50bfe5b23422ea317e2eeb04db886902d0f6d149132c0deaf6fa71e0923126b1ef7dcf77dd702011299210f331475fe7cb7474d415939f071
-
Filesize
405KB
MD58c081462f2efea118a36906dcb1148bd
SHA10852e36e0b36e7bbefb04905509b59d48cecdfbc
SHA2563adff72829294cb00c170e7c1fc3e8a82f52999218b6da9e7b688e5562fc1e34
SHA5124570f086580ae1c50bfe5b23422ea317e2eeb04db886902d0f6d149132c0deaf6fa71e0923126b1ef7dcf77dd702011299210f331475fe7cb7474d415939f071