Analysis
-
max time kernel
59s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe
Resource
win10v2004-20230220-en
General
-
Target
d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe
-
Size
672KB
-
MD5
712b61ca5cab93280cbc4c2a5a291a8b
-
SHA1
a55f76df7d94ddb435891e77905291e3f75de921
-
SHA256
d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34
-
SHA512
b4e6ae5b54f772dc6bf81424978698ce9a493e433bad89f1c2c14a6d32099bd31887d4d0a12f25db383b3b9a52510a6d042265637467c9e245de2d71b8b24980
-
SSDEEP
12288:LMruy908kS5svH6fEjx+HbtgGiBHDQLpcgE6l1R9omaW+YcpeapT0ea:NyCS5eH6fEutgGhtQ6oZ/Reea
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2781.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2781.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4236-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-204-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-206-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-208-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-210-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-212-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4236-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4344 un432081.exe 4884 pro2781.exe 4236 qu2559.exe 4824 si044736.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2781.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un432081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un432081.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2236 4884 WerFault.exe 85 2264 4236 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4884 pro2781.exe 4884 pro2781.exe 4236 qu2559.exe 4236 qu2559.exe 4824 si044736.exe 4824 si044736.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4884 pro2781.exe Token: SeDebugPrivilege 4236 qu2559.exe Token: SeDebugPrivilege 4824 si044736.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4344 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 84 PID 1752 wrote to memory of 4344 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 84 PID 1752 wrote to memory of 4344 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 84 PID 4344 wrote to memory of 4884 4344 un432081.exe 85 PID 4344 wrote to memory of 4884 4344 un432081.exe 85 PID 4344 wrote to memory of 4884 4344 un432081.exe 85 PID 4344 wrote to memory of 4236 4344 un432081.exe 91 PID 4344 wrote to memory of 4236 4344 un432081.exe 91 PID 4344 wrote to memory of 4236 4344 un432081.exe 91 PID 1752 wrote to memory of 4824 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 95 PID 1752 wrote to memory of 4824 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 95 PID 1752 wrote to memory of 4824 1752 d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe"C:\Users\Admin\AppData\Local\Temp\d922aa6949d0d7d66f14057b3f4802221577c3e62f6504f76d24a8e16582ba34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un432081.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un432081.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2781.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2781.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 10764⤵
- Program crash
PID:2236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2559.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13404⤵
- Program crash
PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044736.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4884 -ip 48841⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4236 -ip 42361⤵PID:4992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f778d58be40e87599296d78180579ce5
SHA1df7f503c94dbb6bbd69bab8a46defb6fc004f50f
SHA256ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4
SHA512ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55
-
Filesize
175KB
MD5f778d58be40e87599296d78180579ce5
SHA1df7f503c94dbb6bbd69bab8a46defb6fc004f50f
SHA256ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4
SHA512ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55
-
Filesize
530KB
MD577334d534cf6731de46f573086088283
SHA1d84b6a73394968af2d7f092051212d1d2bb49e00
SHA256e62f2010f24c8f5d49bcb1c9c53a2bef3fa0bfb8b1add4ac73f9c9206b9cb0a0
SHA51255bb48c0b4915c445dda9a8cfdac1e6dd60f0b088fd54024e58626b2487a68eff8b62dfc2f6d44e4b91524e0c45db4667da3ffc4919c12d81c63f01a372f299c
-
Filesize
530KB
MD577334d534cf6731de46f573086088283
SHA1d84b6a73394968af2d7f092051212d1d2bb49e00
SHA256e62f2010f24c8f5d49bcb1c9c53a2bef3fa0bfb8b1add4ac73f9c9206b9cb0a0
SHA51255bb48c0b4915c445dda9a8cfdac1e6dd60f0b088fd54024e58626b2487a68eff8b62dfc2f6d44e4b91524e0c45db4667da3ffc4919c12d81c63f01a372f299c
-
Filesize
259KB
MD50c0e958ded38948d200add4e1e8c2544
SHA1e78afd6ffa44521ced22779a6af39560ecce66b9
SHA2568b6eff4b135a8fec5d52a880b22d5c3b43a798687506efd28c5d08a170521872
SHA512af7fe0520f948d54181075e9fa9738c7f33ecefb8799edb1d84868beff66b62ebec4e62f05bf145cd9553e6318e3090a9b6de45030196ad7e01fd4e8d6be0dfa
-
Filesize
259KB
MD50c0e958ded38948d200add4e1e8c2544
SHA1e78afd6ffa44521ced22779a6af39560ecce66b9
SHA2568b6eff4b135a8fec5d52a880b22d5c3b43a798687506efd28c5d08a170521872
SHA512af7fe0520f948d54181075e9fa9738c7f33ecefb8799edb1d84868beff66b62ebec4e62f05bf145cd9553e6318e3090a9b6de45030196ad7e01fd4e8d6be0dfa
-
Filesize
318KB
MD581495e78a214873195492933ace0d313
SHA1cd8f9fa59467233a61d45c6e7713e1e40ecede71
SHA2568b37f7e319393e0247c08883c87336eaafe4e66e11b1a40588adeafc7b45fd68
SHA512c3a858a29c28961d8e8cca16a97cc07f452afdaa93ca734ada9b1db786b203fba4bcb4fe44d3fee0d1bc5d7d136afd1339bb505a92332945e352b056054506fe
-
Filesize
318KB
MD581495e78a214873195492933ace0d313
SHA1cd8f9fa59467233a61d45c6e7713e1e40ecede71
SHA2568b37f7e319393e0247c08883c87336eaafe4e66e11b1a40588adeafc7b45fd68
SHA512c3a858a29c28961d8e8cca16a97cc07f452afdaa93ca734ada9b1db786b203fba4bcb4fe44d3fee0d1bc5d7d136afd1339bb505a92332945e352b056054506fe