Analysis
-
max time kernel
99s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe
Resource
win10v2004-20230220-en
General
-
Target
a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe
-
Size
697KB
-
MD5
2b1b6875a87a164a885722db9b9f1058
-
SHA1
5900e92cf9cbdd0c531cb256de0b29d8dbf21b77
-
SHA256
a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24
-
SHA512
26e172a7d48e81797cb303c93904c7109e8f9eb59aee56ff422137ed9a5747fa6ad268a63f09a59bf9adf2d0b64b7f920bd5e3d22cb163a0313891ba4a120082
-
SSDEEP
12288:fMrFy900QURNc3JZsvzv9F5XXLxAuIYRhRwEk5ob2Vrot:uyLLNc3J0b7xX/tNHC+t
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9417.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9417.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/5020-187-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-188-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-190-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-192-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-194-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-197-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-201-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-203-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-205-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-207-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-209-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-213-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-211-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-215-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-217-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-219-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-221-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/5020-223-0x0000000007700000-0x000000000773F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4272 un783779.exe 880 pro9417.exe 5020 qu1962.exe 1256 si746546.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9417.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un783779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un783779.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2336 880 WerFault.exe 85 2620 5020 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 880 pro9417.exe 880 pro9417.exe 5020 qu1962.exe 5020 qu1962.exe 1256 si746546.exe 1256 si746546.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 880 pro9417.exe Token: SeDebugPrivilege 5020 qu1962.exe Token: SeDebugPrivilege 1256 si746546.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4272 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 84 PID 1448 wrote to memory of 4272 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 84 PID 1448 wrote to memory of 4272 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 84 PID 4272 wrote to memory of 880 4272 un783779.exe 85 PID 4272 wrote to memory of 880 4272 un783779.exe 85 PID 4272 wrote to memory of 880 4272 un783779.exe 85 PID 4272 wrote to memory of 5020 4272 un783779.exe 91 PID 4272 wrote to memory of 5020 4272 un783779.exe 91 PID 4272 wrote to memory of 5020 4272 un783779.exe 91 PID 1448 wrote to memory of 1256 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 95 PID 1448 wrote to memory of 1256 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 95 PID 1448 wrote to memory of 1256 1448 a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe"C:\Users\Admin\AppData\Local\Temp\a18d6029404c50128e9acbace031a19127c8c2ae9f188c108ba8a94df6900e24.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un783779.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un783779.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9417.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 10804⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 15484⤵
- Program crash
PID:2620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si746546.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si746546.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 880 -ip 8801⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5020 -ip 50201⤵PID:3748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51e763ebd221580f547c9f6d31663476d
SHA1ca4ae7f3075d244992af04df25a33f8a5809838d
SHA256b829af88b7a4278b8a23672b8234d4b631bc5268ee132deb0e4fe0135dbd41a1
SHA5122d0b1af3df0ed2fe42539da3e7d534eae7746d892ce94fc9c2b3b2e09943a470f5614899910b04729d320c1788c5d65cef299ed9fd39a238e5f026c83ce79a3c
-
Filesize
175KB
MD51e763ebd221580f547c9f6d31663476d
SHA1ca4ae7f3075d244992af04df25a33f8a5809838d
SHA256b829af88b7a4278b8a23672b8234d4b631bc5268ee132deb0e4fe0135dbd41a1
SHA5122d0b1af3df0ed2fe42539da3e7d534eae7746d892ce94fc9c2b3b2e09943a470f5614899910b04729d320c1788c5d65cef299ed9fd39a238e5f026c83ce79a3c
-
Filesize
555KB
MD5aba676d8660a9ac69ca44205a7ffacd3
SHA12e42c70d16b50ffbcfd92763d0853007e25d9805
SHA256d0611706dbf5c7fdaf92e2e41e7a7d46c4d75f333860a257fabcfe58926b19d5
SHA512386ef48c911e99ed36ac5f367a0ea937558323c9efba5e9c6710bb0ee491fde133b07f4b20ca1906c31d125a4810558c91dab364d44c30e500e14cc545501307
-
Filesize
555KB
MD5aba676d8660a9ac69ca44205a7ffacd3
SHA12e42c70d16b50ffbcfd92763d0853007e25d9805
SHA256d0611706dbf5c7fdaf92e2e41e7a7d46c4d75f333860a257fabcfe58926b19d5
SHA512386ef48c911e99ed36ac5f367a0ea937558323c9efba5e9c6710bb0ee491fde133b07f4b20ca1906c31d125a4810558c91dab364d44c30e500e14cc545501307
-
Filesize
348KB
MD5ff6474011f7f21ddb1c9c114e1e3a5ba
SHA1f055ea22ccc29d2b819541cc41780014c7020981
SHA256067265aa1525e93f559ddc27c7a1ee748d251427fb3e7c362d91a7073fbe0f74
SHA5120c7e245960ef64a4f9749ee231962fa38782618050cfa20632769eb8c1b35662e0f230be77107edfbe5b44335a806263211617e20b98ddb093d5f5c8af0f08c2
-
Filesize
348KB
MD5ff6474011f7f21ddb1c9c114e1e3a5ba
SHA1f055ea22ccc29d2b819541cc41780014c7020981
SHA256067265aa1525e93f559ddc27c7a1ee748d251427fb3e7c362d91a7073fbe0f74
SHA5120c7e245960ef64a4f9749ee231962fa38782618050cfa20632769eb8c1b35662e0f230be77107edfbe5b44335a806263211617e20b98ddb093d5f5c8af0f08c2
-
Filesize
406KB
MD5afaf42668bc801cd9ffbdfd5d3ed192f
SHA12da391e7ec3ba219d9018bb0035eb06b9d9909b0
SHA2566145a18f269e0a3c3269bcf93f3a95840a91b4a2237d927418c835ff1c172d95
SHA512f9ba92b4ab0b38562d0dbc96cc9dcc425fdeaa3ae1d7769c9a7ade2660f90a0769a30a38bf7f3ab7d6a3b15e026e67645519c92baf082cf54ea1d3fab6b32a6e
-
Filesize
406KB
MD5afaf42668bc801cd9ffbdfd5d3ed192f
SHA12da391e7ec3ba219d9018bb0035eb06b9d9909b0
SHA2566145a18f269e0a3c3269bcf93f3a95840a91b4a2237d927418c835ff1c172d95
SHA512f9ba92b4ab0b38562d0dbc96cc9dcc425fdeaa3ae1d7769c9a7ade2660f90a0769a30a38bf7f3ab7d6a3b15e026e67645519c92baf082cf54ea1d3fab6b32a6e