Analysis
-
max time kernel
59s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 21:51
Static task
static1
Behavioral task
behavioral1
Sample
5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe
Resource
win10v2004-20230220-en
General
-
Target
5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe
-
Size
671KB
-
MD5
dfbac784a928bd8146076b1291096686
-
SHA1
37fdaac51603ca852db72cd370046e45552c2b2c
-
SHA256
5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead
-
SHA512
d17cd0cfbf9ffacaea9296d1d13a946a8cbe1b796814b686d1ed77615219a18d66e462bf22cfab7ded1f9463c4b107022a8ec67140015638f6c39c0c098e970b
-
SSDEEP
12288:SMriy90OPffflfNk0ViT0fgx9i1M2/rGn3LqIMbeVd6q:syLfhm0ViT0f/z/an3GIUeVdN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6793.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6793.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5092-191-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-192-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-194-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-196-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-198-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-200-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-202-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-204-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-206-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-208-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-213-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-218-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-216-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-220-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-222-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-224-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-226-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline behavioral1/memory/5092-228-0x00000000060A0000-0x00000000060DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un097005.exepro6793.exequ9279.exesi379764.exepid process 532 un097005.exe 3276 pro6793.exe 5092 qu9279.exe 1864 si379764.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6793.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6793.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exeun097005.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un097005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un097005.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2100 3276 WerFault.exe pro6793.exe 1944 5092 WerFault.exe qu9279.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6793.exequ9279.exesi379764.exepid process 3276 pro6793.exe 3276 pro6793.exe 5092 qu9279.exe 5092 qu9279.exe 1864 si379764.exe 1864 si379764.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6793.exequ9279.exesi379764.exedescription pid process Token: SeDebugPrivilege 3276 pro6793.exe Token: SeDebugPrivilege 5092 qu9279.exe Token: SeDebugPrivilege 1864 si379764.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exeun097005.exedescription pid process target process PID 3340 wrote to memory of 532 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe un097005.exe PID 3340 wrote to memory of 532 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe un097005.exe PID 3340 wrote to memory of 532 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe un097005.exe PID 532 wrote to memory of 3276 532 un097005.exe pro6793.exe PID 532 wrote to memory of 3276 532 un097005.exe pro6793.exe PID 532 wrote to memory of 3276 532 un097005.exe pro6793.exe PID 532 wrote to memory of 5092 532 un097005.exe qu9279.exe PID 532 wrote to memory of 5092 532 un097005.exe qu9279.exe PID 532 wrote to memory of 5092 532 un097005.exe qu9279.exe PID 3340 wrote to memory of 1864 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe si379764.exe PID 3340 wrote to memory of 1864 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe si379764.exe PID 3340 wrote to memory of 1864 3340 5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe si379764.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe"C:\Users\Admin\AppData\Local\Temp\5998124021b02bfa3ba67005831a3604e467a96af1bd1a574efc50bd071edead.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097005.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6793.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 10844⤵
- Program crash
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9279.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 15804⤵
- Program crash
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379764.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379764.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3276 -ip 32761⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5092 -ip 50921⤵PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5959ac543f3cfccc3c1af5bd59b2e85e1
SHA1d57875ebaa8e54d6dcdb61c2e2bae51a4ff4198d
SHA256bd8c23e92f370416532c186ab7ee3923d9902201f0ecbe158d6b900df1e0f919
SHA51226ea76b112af4eac31d74f72c943dc3e19e7d7f72fa92f00b704f7e1c941c0ace77be00c63d5681ce45db7c52ae565c913cbdc569b78293c954db94dc69cfb84
-
Filesize
175KB
MD5959ac543f3cfccc3c1af5bd59b2e85e1
SHA1d57875ebaa8e54d6dcdb61c2e2bae51a4ff4198d
SHA256bd8c23e92f370416532c186ab7ee3923d9902201f0ecbe158d6b900df1e0f919
SHA51226ea76b112af4eac31d74f72c943dc3e19e7d7f72fa92f00b704f7e1c941c0ace77be00c63d5681ce45db7c52ae565c913cbdc569b78293c954db94dc69cfb84
-
Filesize
529KB
MD598f129d9ddb88c06927eb38302a0d97c
SHA14354d020ca5378d788f7ab50e5a2a95e224c2bc1
SHA2563ae0a2ac9bf92d4fa6eaf82a06433d33fde647a8f32ef929da9815cb8d3782d5
SHA51242dedd950e913803592503bb194b4699095a14485024519c4ebc22e8baefdf5803b7ed50739165e9c77bf64659da172558f77cfd9a1abfda0a67aac51d8a8a0c
-
Filesize
529KB
MD598f129d9ddb88c06927eb38302a0d97c
SHA14354d020ca5378d788f7ab50e5a2a95e224c2bc1
SHA2563ae0a2ac9bf92d4fa6eaf82a06433d33fde647a8f32ef929da9815cb8d3782d5
SHA51242dedd950e913803592503bb194b4699095a14485024519c4ebc22e8baefdf5803b7ed50739165e9c77bf64659da172558f77cfd9a1abfda0a67aac51d8a8a0c
-
Filesize
301KB
MD593d33996027526dd045ce7f66abd621f
SHA16af4dbbf8296a552f09f8c96a5ffd426e4db4923
SHA25675d5f421e046451678c0083eeb512a49390c5891b524cb1705eecb3b09d0e3cf
SHA512c8e63bb9217161c5e497e6b1ec2c5f86ca311c14ff2e43c2d9269d57e3e3a09d70b938dd3b4eb0bd9217624e13b12f7865bfa3f74cbd3fd9dc186fe6e4acef0f
-
Filesize
301KB
MD593d33996027526dd045ce7f66abd621f
SHA16af4dbbf8296a552f09f8c96a5ffd426e4db4923
SHA25675d5f421e046451678c0083eeb512a49390c5891b524cb1705eecb3b09d0e3cf
SHA512c8e63bb9217161c5e497e6b1ec2c5f86ca311c14ff2e43c2d9269d57e3e3a09d70b938dd3b4eb0bd9217624e13b12f7865bfa3f74cbd3fd9dc186fe6e4acef0f
-
Filesize
359KB
MD580b62e2dd662d70439253b420bc10c23
SHA12817c08d9ae20ca9a396d176d1e42cdffafaadf9
SHA256e92a5210608f0f5ac5e3ecbff7eb3cb54cc5073e896b1c617e4d4c9f2d71dc3d
SHA51266ed7646d5bf283eb983b8fe0cf8601947c25ceabea7a5b67ed03f0cb7067cd4d53abd2c0849eb9b8ad5f1c2a6e74e0ab4fd87a19a17bccbd0e296e569c60eb3
-
Filesize
359KB
MD580b62e2dd662d70439253b420bc10c23
SHA12817c08d9ae20ca9a396d176d1e42cdffafaadf9
SHA256e92a5210608f0f5ac5e3ecbff7eb3cb54cc5073e896b1c617e4d4c9f2d71dc3d
SHA51266ed7646d5bf283eb983b8fe0cf8601947c25ceabea7a5b67ed03f0cb7067cd4d53abd2c0849eb9b8ad5f1c2a6e74e0ab4fd87a19a17bccbd0e296e569c60eb3