Analysis
-
max time kernel
84s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe
Resource
win10v2004-20230220-en
General
-
Target
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe
-
Size
673KB
-
MD5
27759028fa5043281fd931f40d064e4b
-
SHA1
dde27b366be795b23952e039b6e6d494dddc762e
-
SHA256
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde
-
SHA512
eee77c499616af97f3670126e9db64c1ac661f80695ab60bca52a950f687a920809915a1e1e61cfae3a9a689c25462655d6808ca4e213330f02e7fcb644e9beb
-
SSDEEP
12288:LMriy90R7WN32Up/iKyE0MsLu3Da0UDN6buWah3SnfCxErj4w:FyS7WN3f/itED53D+DNyuNDxEvH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4861.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/804-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-222-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-226-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-228-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/804-1111-0x0000000004AF0000-0x0000000004B00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2032 un832115.exe 404 pro4861.exe 804 qu5013.exe 4596 si285004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4861.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4861.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un832115.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un832115.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4508 404 WerFault.exe 85 1684 804 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 404 pro4861.exe 404 pro4861.exe 804 qu5013.exe 804 qu5013.exe 4596 si285004.exe 4596 si285004.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 404 pro4861.exe Token: SeDebugPrivilege 804 qu5013.exe Token: SeDebugPrivilege 4596 si285004.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2032 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 84 PID 1804 wrote to memory of 2032 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 84 PID 1804 wrote to memory of 2032 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 84 PID 2032 wrote to memory of 404 2032 un832115.exe 85 PID 2032 wrote to memory of 404 2032 un832115.exe 85 PID 2032 wrote to memory of 404 2032 un832115.exe 85 PID 2032 wrote to memory of 804 2032 un832115.exe 91 PID 2032 wrote to memory of 804 2032 un832115.exe 91 PID 2032 wrote to memory of 804 2032 un832115.exe 91 PID 1804 wrote to memory of 4596 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 95 PID 1804 wrote to memory of 4596 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 95 PID 1804 wrote to memory of 4596 1804 076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe"C:\Users\Admin\AppData\Local\Temp\076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832115.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 10844⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5013.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 19404⤵
- Program crash
PID:1684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285004.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 404 -ip 4041⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 804 -ip 8041⤵PID:2596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f42f2f96a4094dcf29b88a2743b2ed81
SHA1438931eccaf24e0e6d6f646c846d7efed0420df9
SHA2565ff447c28f9a6f94a20cac407e2f8a683002a84eb81b1c0bdbd00096ba7a7982
SHA51214df0486856256ca1b26cd7a36e38ec0cdfb1ad7ccabbd43492f8c81052006d281d16f916281ed84d154c499fce40f8286326aa863a39532bac6556c5a1849dd
-
Filesize
175KB
MD5f42f2f96a4094dcf29b88a2743b2ed81
SHA1438931eccaf24e0e6d6f646c846d7efed0420df9
SHA2565ff447c28f9a6f94a20cac407e2f8a683002a84eb81b1c0bdbd00096ba7a7982
SHA51214df0486856256ca1b26cd7a36e38ec0cdfb1ad7ccabbd43492f8c81052006d281d16f916281ed84d154c499fce40f8286326aa863a39532bac6556c5a1849dd
-
Filesize
531KB
MD5554958f46da8bb840ef8ed45f974ae56
SHA18b253a90b0950898a3b58aaf85bd263c33342629
SHA2568cf698e81a03126c14699c3a89cec627802625f98cda45f7519227efc4193b24
SHA51254d5afa09b61eeb0efcf1e8cebe928ca0e59510c63f00e47d1ddbe470292c59bd26d86a59712211396cd3d691f19b495950dc32ab72dee46ea42bf27e7d2bc21
-
Filesize
531KB
MD5554958f46da8bb840ef8ed45f974ae56
SHA18b253a90b0950898a3b58aaf85bd263c33342629
SHA2568cf698e81a03126c14699c3a89cec627802625f98cda45f7519227efc4193b24
SHA51254d5afa09b61eeb0efcf1e8cebe928ca0e59510c63f00e47d1ddbe470292c59bd26d86a59712211396cd3d691f19b495950dc32ab72dee46ea42bf27e7d2bc21
-
Filesize
260KB
MD5fbe3131249d6499f6295164c2243d01f
SHA113cd08597b5fa70271c4eaa945ab834de5edf2cf
SHA2562f8e82e3c831942e331116060bb2e0c2e229e30e68cc5d28783e282f72734236
SHA512bd93361999162f94e8f869aefc90b19887ab32dcd370634eec661db029236d63a938ae2b2bf105c841fd43585810a0b3209c5b3cf51770af208012df675edb38
-
Filesize
260KB
MD5fbe3131249d6499f6295164c2243d01f
SHA113cd08597b5fa70271c4eaa945ab834de5edf2cf
SHA2562f8e82e3c831942e331116060bb2e0c2e229e30e68cc5d28783e282f72734236
SHA512bd93361999162f94e8f869aefc90b19887ab32dcd370634eec661db029236d63a938ae2b2bf105c841fd43585810a0b3209c5b3cf51770af208012df675edb38
-
Filesize
319KB
MD51a4528af2c956c59d5b1225005bb8b87
SHA17c884000f69c87dd11d678ff3595b3985620ccdc
SHA256f47c6e7bdfca658309ed72001c1075885e66c59a4e8e14de9970a6f91788d3be
SHA51210ff606fbde3d11af4ce200be04cc884c92d2f85a8f1412c1a284f6766549f2e089baa5ed9cb537036fa501efee0780455de843e1c07d48e628b33ac6fda7386
-
Filesize
319KB
MD51a4528af2c956c59d5b1225005bb8b87
SHA17c884000f69c87dd11d678ff3595b3985620ccdc
SHA256f47c6e7bdfca658309ed72001c1075885e66c59a4e8e14de9970a6f91788d3be
SHA51210ff606fbde3d11af4ce200be04cc884c92d2f85a8f1412c1a284f6766549f2e089baa5ed9cb537036fa501efee0780455de843e1c07d48e628b33ac6fda7386