Analysis
-
max time kernel
96s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 17:47
Static task
static1
Behavioral task
behavioral1
Sample
447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe
Resource
win10v2004-20230220-en
General
-
Target
447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe
-
Size
672KB
-
MD5
3ded35a401e1c17fdddab1c883735247
-
SHA1
9575cec0642e8de1f3a6b45f36480e4ba15bb8ee
-
SHA256
447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773
-
SHA512
57061a7a28addf8313bdb0ab000934cccbf078891a6060e437997be0d75461bfa842bf3cbe056a95a1a760136aed8f78a9fc7d980a53e22d34fb4a8dedd0aa32
-
SSDEEP
12288:xMrIy90OVqqU4uQP/IzeBYv7Ke+/1fomRz+Y6HIypphZFTxva:dyDqHQPkVzy/1foJr51ha
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3561.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3561.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/988-195-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-196-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-198-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-200-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-202-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-204-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-206-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-208-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-210-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-212-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-214-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-216-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-218-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-220-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-222-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-224-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/988-226-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un739493.exepro3561.exequ9044.exesi571473.exepid process 2248 un739493.exe 4508 pro3561.exe 988 qu9044.exe 1300 si571473.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3561.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3561.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exeun739493.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un739493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un739493.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4316 4508 WerFault.exe pro3561.exe 3812 988 WerFault.exe qu9044.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3561.exequ9044.exesi571473.exepid process 4508 pro3561.exe 4508 pro3561.exe 988 qu9044.exe 988 qu9044.exe 1300 si571473.exe 1300 si571473.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3561.exequ9044.exesi571473.exedescription pid process Token: SeDebugPrivilege 4508 pro3561.exe Token: SeDebugPrivilege 988 qu9044.exe Token: SeDebugPrivilege 1300 si571473.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exeun739493.exedescription pid process target process PID 2076 wrote to memory of 2248 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe un739493.exe PID 2076 wrote to memory of 2248 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe un739493.exe PID 2076 wrote to memory of 2248 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe un739493.exe PID 2248 wrote to memory of 4508 2248 un739493.exe pro3561.exe PID 2248 wrote to memory of 4508 2248 un739493.exe pro3561.exe PID 2248 wrote to memory of 4508 2248 un739493.exe pro3561.exe PID 2248 wrote to memory of 988 2248 un739493.exe qu9044.exe PID 2248 wrote to memory of 988 2248 un739493.exe qu9044.exe PID 2248 wrote to memory of 988 2248 un739493.exe qu9044.exe PID 2076 wrote to memory of 1300 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe si571473.exe PID 2076 wrote to memory of 1300 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe si571473.exe PID 2076 wrote to memory of 1300 2076 447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe si571473.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe"C:\Users\Admin\AppData\Local\Temp\447d2df9f363a520e21bd1f08d106e4c1a90fc34b0ae9e142d1fb16660816773.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739493.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3561.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 10804⤵
- Program crash
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9044.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 19644⤵
- Program crash
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si571473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si571473.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4508 -ip 45081⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 988 -ip 9881⤵PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4675ce41dbccd6ea12cd29f8e777886
SHA194dfb977e1d9a6229be995addf009ed7f0e63c58
SHA256e0bfdd28b5e81f4a2435deacc7304357249ac9ae86e4b4ca79e126fb7357af69
SHA512aeafec548ec46a19d2e4519a21cd0f4f59de2343ec3835896177a4f79e59a71c509f8270809b83c19efb0853b4a1363b741c0621aeb317fd7921017c91970825
-
Filesize
175KB
MD5d4675ce41dbccd6ea12cd29f8e777886
SHA194dfb977e1d9a6229be995addf009ed7f0e63c58
SHA256e0bfdd28b5e81f4a2435deacc7304357249ac9ae86e4b4ca79e126fb7357af69
SHA512aeafec548ec46a19d2e4519a21cd0f4f59de2343ec3835896177a4f79e59a71c509f8270809b83c19efb0853b4a1363b741c0621aeb317fd7921017c91970825
-
Filesize
530KB
MD589df66211494a07290d6eca75ee53dcb
SHA1a8253bbe40e7dcc5548e14272919faa52e99ebc4
SHA2567efe0a473e2920b9d7d2e74902b4bf382ea4ef7ae9544b84b79f4685a4a46651
SHA512a46123b04e563898a6c50015df71c4aeebde53722af0f4a28383400bb41cfa94155514905b585efc74d46e4fe60cf1ec1c71b24d4e34fca47fb53d820abdc2d3
-
Filesize
530KB
MD589df66211494a07290d6eca75ee53dcb
SHA1a8253bbe40e7dcc5548e14272919faa52e99ebc4
SHA2567efe0a473e2920b9d7d2e74902b4bf382ea4ef7ae9544b84b79f4685a4a46651
SHA512a46123b04e563898a6c50015df71c4aeebde53722af0f4a28383400bb41cfa94155514905b585efc74d46e4fe60cf1ec1c71b24d4e34fca47fb53d820abdc2d3
-
Filesize
259KB
MD5e3de8d6cab43c9dc2fcd71cf1f09d412
SHA140f1d56307603fe77f5b2415ed786c6517d2d4f1
SHA2561685c031cdfaefbeb645732674aab0ee35994c466dc7e2c48599c55965d32c7d
SHA512c78b531f29a4535954d10fb12d1b2693d7c96295a082950b8483ec5a038089b9c7ad71d93e292ee2224cdb47ef9f0a74b9b16fe74ba7cf15e368afd67af157f1
-
Filesize
259KB
MD5e3de8d6cab43c9dc2fcd71cf1f09d412
SHA140f1d56307603fe77f5b2415ed786c6517d2d4f1
SHA2561685c031cdfaefbeb645732674aab0ee35994c466dc7e2c48599c55965d32c7d
SHA512c78b531f29a4535954d10fb12d1b2693d7c96295a082950b8483ec5a038089b9c7ad71d93e292ee2224cdb47ef9f0a74b9b16fe74ba7cf15e368afd67af157f1
-
Filesize
318KB
MD5f5b027861325e8e7679293e3b6631f8c
SHA1eef4589a4bba086edfc8e2cec1a764ee75e71f9f
SHA256bba08fe16bbf292bf12d2c844479b8dda476b8ce45202ed52ba5a97e2871498b
SHA512799a3d2195cafc80a6a0cab5f372d57010d3e436204eddf651ba7b2be82c3ae39aef553685273239a76a0e9f2dfa601d299b1d2807c822890869f151208dd76f
-
Filesize
318KB
MD5f5b027861325e8e7679293e3b6631f8c
SHA1eef4589a4bba086edfc8e2cec1a764ee75e71f9f
SHA256bba08fe16bbf292bf12d2c844479b8dda476b8ce45202ed52ba5a97e2871498b
SHA512799a3d2195cafc80a6a0cab5f372d57010d3e436204eddf651ba7b2be82c3ae39aef553685273239a76a0e9f2dfa601d299b1d2807c822890869f151208dd76f