Analysis
-
max time kernel
101s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:25
Static task
static1
Behavioral task
behavioral1
Sample
0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe
Resource
win10v2004-20230221-en
General
-
Target
0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe
-
Size
672KB
-
MD5
68ed83ac8172ff52c1401262bb11a14b
-
SHA1
87bfeccb388dfb0c0ab2af712d5a45359ffaaf5d
-
SHA256
0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac
-
SHA512
61d97877691bcc62c2fdc89ef9f04a2475b6db7c12280073daa7540941bbfc8e787edf9909d677de9d058bb62b0a67058bf2c365fa47eb6849b056c4937d54c2
-
SSDEEP
12288:rMrHy90sUtPwomPLFkYwtqBDiFMeBCP76BpJ1gI7jYom/p+YUBfhpMg3pmMjsy:kyowLFkBtwQMrTGpJ1gYYo5FTFAMjn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7799.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7799.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-192-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-223-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-225-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1664-1108-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un121581.exepro7799.exequ2161.exesi756032.exepid process 1972 un121581.exe 3452 pro7799.exe 1664 qu2161.exe 3544 si756032.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7799.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7799.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7799.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exeun121581.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un121581.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un121581.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1512 3452 WerFault.exe pro7799.exe 4280 1664 WerFault.exe qu2161.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7799.exequ2161.exesi756032.exepid process 3452 pro7799.exe 3452 pro7799.exe 1664 qu2161.exe 1664 qu2161.exe 3544 si756032.exe 3544 si756032.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7799.exequ2161.exesi756032.exedescription pid process Token: SeDebugPrivilege 3452 pro7799.exe Token: SeDebugPrivilege 1664 qu2161.exe Token: SeDebugPrivilege 3544 si756032.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exeun121581.exedescription pid process target process PID 4672 wrote to memory of 1972 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe un121581.exe PID 4672 wrote to memory of 1972 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe un121581.exe PID 4672 wrote to memory of 1972 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe un121581.exe PID 1972 wrote to memory of 3452 1972 un121581.exe pro7799.exe PID 1972 wrote to memory of 3452 1972 un121581.exe pro7799.exe PID 1972 wrote to memory of 3452 1972 un121581.exe pro7799.exe PID 1972 wrote to memory of 1664 1972 un121581.exe qu2161.exe PID 1972 wrote to memory of 1664 1972 un121581.exe qu2161.exe PID 1972 wrote to memory of 1664 1972 un121581.exe qu2161.exe PID 4672 wrote to memory of 3544 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe si756032.exe PID 4672 wrote to memory of 3544 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe si756032.exe PID 4672 wrote to memory of 3544 4672 0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe si756032.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe"C:\Users\Admin\AppData\Local\Temp\0918bf535bde77cdf7c409c12fbd6e542c2078173ee4233bf655d34fcb917eac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121581.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121581.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7799.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 10804⤵
- Program crash
PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2161.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 13484⤵
- Program crash
PID:4280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si756032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si756032.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3452 -ip 34521⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1664 -ip 16641⤵PID:2824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efbf7da03d06329828ccf65bdc4489cd
SHA117efa0a4b0a5c6afffd49b87f7c15c4490d842d4
SHA256495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d
SHA51298509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d
-
Filesize
175KB
MD5efbf7da03d06329828ccf65bdc4489cd
SHA117efa0a4b0a5c6afffd49b87f7c15c4490d842d4
SHA256495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d
SHA51298509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d
-
Filesize
530KB
MD59cd7ed00fcd56d256eb965d589e3ced4
SHA1b7821baf11f2ffc6af8a709f0f9a358cf8011e40
SHA256f2016145b3e98b66dde39ce95f8e9cdd0e3f1abec5a9390a4e3c3788e2ca5b0e
SHA512b1b0a19b3da33b1fd3f455a0f4cae9387dc9f044c5fc878159adf3ff1cfb23390f85b3ac068548f25d41e337bee240f02729232ce3cd4b3e2e40db4fdf477316
-
Filesize
530KB
MD59cd7ed00fcd56d256eb965d589e3ced4
SHA1b7821baf11f2ffc6af8a709f0f9a358cf8011e40
SHA256f2016145b3e98b66dde39ce95f8e9cdd0e3f1abec5a9390a4e3c3788e2ca5b0e
SHA512b1b0a19b3da33b1fd3f455a0f4cae9387dc9f044c5fc878159adf3ff1cfb23390f85b3ac068548f25d41e337bee240f02729232ce3cd4b3e2e40db4fdf477316
-
Filesize
259KB
MD57a99b607c0ea65f4e4fa905913ca631f
SHA1a8f79864f927f0b718c19349c49d1eee9272627e
SHA2561fa11d6d7b964e8bf7607f53fccbdeaf87baf84e462ef3b9c430215468a7f74e
SHA512b091dde3e02be58eea45cca882eaea2687188aa70bd0fd99102333c321036eb8374dded8bcd56e1dfab0a6a99eae64215837d0f7aa3fc17a0b501add298ed7c7
-
Filesize
259KB
MD57a99b607c0ea65f4e4fa905913ca631f
SHA1a8f79864f927f0b718c19349c49d1eee9272627e
SHA2561fa11d6d7b964e8bf7607f53fccbdeaf87baf84e462ef3b9c430215468a7f74e
SHA512b091dde3e02be58eea45cca882eaea2687188aa70bd0fd99102333c321036eb8374dded8bcd56e1dfab0a6a99eae64215837d0f7aa3fc17a0b501add298ed7c7
-
Filesize
318KB
MD5ef2323546231c811b3c9c31295c527c7
SHA1dc95c31d80de12eb8f5bcc4faddc6b109031ae7f
SHA2565676d165ed8cf3482263b1e2acb17e95ffdd9459620d9208672fae7508df5f81
SHA512d772f0a492ba3c8657362f10e59d2b4958f526da377e8146a40c1bc645663201279d6f3d1c3ac6f4e787813ff4c6a178eb8ddbf75c39f95dcdd7f325aa224acf
-
Filesize
318KB
MD5ef2323546231c811b3c9c31295c527c7
SHA1dc95c31d80de12eb8f5bcc4faddc6b109031ae7f
SHA2565676d165ed8cf3482263b1e2acb17e95ffdd9459620d9208672fae7508df5f81
SHA512d772f0a492ba3c8657362f10e59d2b4958f526da377e8146a40c1bc645663201279d6f3d1c3ac6f4e787813ff4c6a178eb8ddbf75c39f95dcdd7f325aa224acf