Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe
Resource
win10v2004-20230220-en
General
-
Target
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe
-
Size
694KB
-
MD5
11458beebd7f384b76ea8e630c0e4f1a
-
SHA1
111763ccb0c12299bea9ee2a55b3f1b0a21e8b54
-
SHA256
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f
-
SHA512
c6c295aea0ff175d4304d2a06d99509ab8f3a8f8de2a1c34196ec629b83cca314d02df54f45310f5dab5099b9bf3684d4eec8e893bb170460c9fa69975d3a5c6
-
SSDEEP
12288:LMrBy90V1/8KsxxApeeH5+oPP8jfE1aDzyOUpRuutZVqdnZDInUBVcTEPT:Kyw7sjApew5nHCfE1O+YurQn5gacTEr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8713.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8713.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4992-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-213-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-226-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-228-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4992-1111-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1960 un525419.exe 372 pro8713.exe 4992 qu2613.exe 4036 si640982.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8713.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un525419.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un525419.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 524 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5060 372 WerFault.exe 85 3792 4992 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 372 pro8713.exe 372 pro8713.exe 4992 qu2613.exe 4992 qu2613.exe 4036 si640982.exe 4036 si640982.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 372 pro8713.exe Token: SeDebugPrivilege 4992 qu2613.exe Token: SeDebugPrivilege 4036 si640982.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1960 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 84 PID 1696 wrote to memory of 1960 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 84 PID 1696 wrote to memory of 1960 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 84 PID 1960 wrote to memory of 372 1960 un525419.exe 85 PID 1960 wrote to memory of 372 1960 un525419.exe 85 PID 1960 wrote to memory of 372 1960 un525419.exe 85 PID 1960 wrote to memory of 4992 1960 un525419.exe 91 PID 1960 wrote to memory of 4992 1960 un525419.exe 91 PID 1960 wrote to memory of 4992 1960 un525419.exe 91 PID 1696 wrote to memory of 4036 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 95 PID 1696 wrote to memory of 4036 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 95 PID 1696 wrote to memory of 4036 1696 a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe"C:\Users\Admin\AppData\Local\Temp\a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525419.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8713.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 11044⤵
- Program crash
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2613.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 13444⤵
- Program crash
PID:3792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si640982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si640982.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 372 -ip 3721⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4992 -ip 49921⤵PID:4784
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cd18aa7fee8d45d5aa8dd627a3082133
SHA1b1f2ed17bb62ad4cbad835d8eb8aaa0a85470f96
SHA256cefed7d5a90c8f15ba585f0bbfc55fb6a27df96739745ab2b99ecf75f77fd4da
SHA512b8f0981ca71c0b74be407357fcc3a9ed837bafd835119c7dbc653c0c53ebe31148623b19f3291e1382c5348e9ef40958d92b440beb96d02556b38b3bb407577c
-
Filesize
175KB
MD5cd18aa7fee8d45d5aa8dd627a3082133
SHA1b1f2ed17bb62ad4cbad835d8eb8aaa0a85470f96
SHA256cefed7d5a90c8f15ba585f0bbfc55fb6a27df96739745ab2b99ecf75f77fd4da
SHA512b8f0981ca71c0b74be407357fcc3a9ed837bafd835119c7dbc653c0c53ebe31148623b19f3291e1382c5348e9ef40958d92b440beb96d02556b38b3bb407577c
-
Filesize
553KB
MD59ef2cdd7a336c2cf9b9b336c30481ca8
SHA1c3568704fcf99fbf2fc08ee0ce31d2629cc10b98
SHA25684fa97d0544b2ffc80135224a31db91e45325df42e07056e04d0171f63c3dd86
SHA512f67ca3493f7f32d3670aa45400ec86988f685cd9193483686c7b3a829dddee576bfc6f036fa595d5447f34ca606328065f85324b04e24823f315742d355e9af2
-
Filesize
553KB
MD59ef2cdd7a336c2cf9b9b336c30481ca8
SHA1c3568704fcf99fbf2fc08ee0ce31d2629cc10b98
SHA25684fa97d0544b2ffc80135224a31db91e45325df42e07056e04d0171f63c3dd86
SHA512f67ca3493f7f32d3670aa45400ec86988f685cd9193483686c7b3a829dddee576bfc6f036fa595d5447f34ca606328065f85324b04e24823f315742d355e9af2
-
Filesize
347KB
MD598e8ff54b6a3fe8401c72bb6b6708c32
SHA1130e09cad88e4d8de73298118b75b1b135c7c89b
SHA2568b610c78951d20be428925dfc5bdf72993f54d85e4f689015bdd7ed2f3c58be1
SHA5122a8957d50a02b207aeb1917c10f9d145098dfbd8292cfb72f75cfe3c48dbfff43e69f37250960c8aacf17b59948d6fed53e829dd439456a591fa054622186035
-
Filesize
347KB
MD598e8ff54b6a3fe8401c72bb6b6708c32
SHA1130e09cad88e4d8de73298118b75b1b135c7c89b
SHA2568b610c78951d20be428925dfc5bdf72993f54d85e4f689015bdd7ed2f3c58be1
SHA5122a8957d50a02b207aeb1917c10f9d145098dfbd8292cfb72f75cfe3c48dbfff43e69f37250960c8aacf17b59948d6fed53e829dd439456a591fa054622186035
-
Filesize
405KB
MD5902c5f4ebe43ed423b2793b98934bb9d
SHA1a11546597f4204aa7926e4316117583ea43b6db3
SHA2564f336afb20976860cca662066ef8e398e941ca529d0f298da703158cd939cf2d
SHA512b3dfdecc958a83bbfee6baa728c8d7e63f4123feb13b97583002e8856ff3fef23c3d0370a3000b372d8aa2a34afafef9efad8401fcebcf5d453c332426c7f7ca
-
Filesize
405KB
MD5902c5f4ebe43ed423b2793b98934bb9d
SHA1a11546597f4204aa7926e4316117583ea43b6db3
SHA2564f336afb20976860cca662066ef8e398e941ca529d0f298da703158cd939cf2d
SHA512b3dfdecc958a83bbfee6baa728c8d7e63f4123feb13b97583002e8856ff3fef23c3d0370a3000b372d8aa2a34afafef9efad8401fcebcf5d453c332426c7f7ca