Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:10
Static task
static1
Behavioral task
behavioral1
Sample
3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe
Resource
win10v2004-20230220-en
General
-
Target
3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe
-
Size
672KB
-
MD5
f22fb5de03403c045006c0d56ae050b5
-
SHA1
346e2f503019e7daf9f9a5840f46920d27633af5
-
SHA256
3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb
-
SHA512
2857907112c730360bbec634fdb780dc0490f7c1416d5c1f59b988f7541ce2fe23695d099de886472b9077f8b50937dd52cba96d368ec30e57358e0485e4e2ce
-
SSDEEP
12288:GMriy90NCCcvUSaom4hmBmN/XNsKRomEQ+Y+IwcpvJqbFZk:oyz13F1sooBhiVcbFK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9965.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1176-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-194-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-192-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-196-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-206-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-208-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-210-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-212-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-214-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-216-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-218-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-220-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-222-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-224-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-226-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1176-228-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un864771.exepro9965.exequ2573.exesi003009.exepid process 928 un864771.exe 1980 pro9965.exe 1176 qu2573.exe 1516 si003009.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9965.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exeun864771.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un864771.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un864771.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2272 1980 WerFault.exe pro9965.exe 3528 1176 WerFault.exe qu2573.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9965.exequ2573.exesi003009.exepid process 1980 pro9965.exe 1980 pro9965.exe 1176 qu2573.exe 1176 qu2573.exe 1516 si003009.exe 1516 si003009.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9965.exequ2573.exesi003009.exedescription pid process Token: SeDebugPrivilege 1980 pro9965.exe Token: SeDebugPrivilege 1176 qu2573.exe Token: SeDebugPrivilege 1516 si003009.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exeun864771.exedescription pid process target process PID 3772 wrote to memory of 928 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe un864771.exe PID 3772 wrote to memory of 928 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe un864771.exe PID 3772 wrote to memory of 928 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe un864771.exe PID 928 wrote to memory of 1980 928 un864771.exe pro9965.exe PID 928 wrote to memory of 1980 928 un864771.exe pro9965.exe PID 928 wrote to memory of 1980 928 un864771.exe pro9965.exe PID 928 wrote to memory of 1176 928 un864771.exe qu2573.exe PID 928 wrote to memory of 1176 928 un864771.exe qu2573.exe PID 928 wrote to memory of 1176 928 un864771.exe qu2573.exe PID 3772 wrote to memory of 1516 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe si003009.exe PID 3772 wrote to memory of 1516 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe si003009.exe PID 3772 wrote to memory of 1516 3772 3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe si003009.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe"C:\Users\Admin\AppData\Local\Temp\3f6c8596465d748bf6da7af9281735899b1241019a4e6babfc3362d848979fbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864771.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 10844⤵
- Program crash
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2573.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 17924⤵
- Program crash
PID:3528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si003009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si003009.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1980 -ip 19801⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1176 -ip 11761⤵PID:2416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51d9b3e6244d47b0e217535ca018aa62a
SHA1f2a7b6a102362d816917410c950600ec6e8db5ab
SHA256831830652fc9616663df1c32515b9dac07312d52f8cc7ccff5e07757435f8589
SHA5129846ba3e671544b9282dd676d4daea317fe808d346de8a64579d770c737c2bafd06983e316ae4dad8cbb303e356668fd442687df4940c90f0d0fc376e4ae7fd2
-
Filesize
175KB
MD51d9b3e6244d47b0e217535ca018aa62a
SHA1f2a7b6a102362d816917410c950600ec6e8db5ab
SHA256831830652fc9616663df1c32515b9dac07312d52f8cc7ccff5e07757435f8589
SHA5129846ba3e671544b9282dd676d4daea317fe808d346de8a64579d770c737c2bafd06983e316ae4dad8cbb303e356668fd442687df4940c90f0d0fc376e4ae7fd2
-
Filesize
530KB
MD51237d686f24cfe3d73c122d102597843
SHA1d37c238036d038d11b7e545d35e61961dd4e327c
SHA25694e4e93734121cb23e26964b4b9d13d799959e1632db24239cd02bb533549fbe
SHA51277b9ca256c59295095179acc7d33516b699a7884e5e951c91e965bbc71c86cd455da92d0b76bfd8f9407d99ca1a2416261efeaa0913dd02a8e2d1eb802250d74
-
Filesize
530KB
MD51237d686f24cfe3d73c122d102597843
SHA1d37c238036d038d11b7e545d35e61961dd4e327c
SHA25694e4e93734121cb23e26964b4b9d13d799959e1632db24239cd02bb533549fbe
SHA51277b9ca256c59295095179acc7d33516b699a7884e5e951c91e965bbc71c86cd455da92d0b76bfd8f9407d99ca1a2416261efeaa0913dd02a8e2d1eb802250d74
-
Filesize
259KB
MD5b8101718f534fd13a7b857f565d60182
SHA160c335e55b412ac040a1a016e4f83253ceaab118
SHA2563f7ca2e18266aa3fd8cf6e8e3aa79850e20fa30b4fcfb7507519af42a60c769f
SHA5123489270cb569dfcc55f58ba23cc9ea20b716a2916880ff07d2387dc12336b6aba4b8c6961a461da142f3086d5ac25b6fef6e08fb515b73e575262945ca65a205
-
Filesize
259KB
MD5b8101718f534fd13a7b857f565d60182
SHA160c335e55b412ac040a1a016e4f83253ceaab118
SHA2563f7ca2e18266aa3fd8cf6e8e3aa79850e20fa30b4fcfb7507519af42a60c769f
SHA5123489270cb569dfcc55f58ba23cc9ea20b716a2916880ff07d2387dc12336b6aba4b8c6961a461da142f3086d5ac25b6fef6e08fb515b73e575262945ca65a205
-
Filesize
318KB
MD5d40c7d8bbf38c401a370200a9ab4bfbe
SHA1fdcfd4489b11e6b5261542eb6bf3021d2b00ec15
SHA2564085141f078ef52e2eae666686e71dd6a1d459156061702acd9edefc73566366
SHA5122525da36605398bb103438ed563f34fc9839826e3c4a86abcc96bd7aaa823bed0ce0e3fbb6d7483b7a22c36e639c73b20e8229bc8e208e22e73270c0dfcfefb5
-
Filesize
318KB
MD5d40c7d8bbf38c401a370200a9ab4bfbe
SHA1fdcfd4489b11e6b5261542eb6bf3021d2b00ec15
SHA2564085141f078ef52e2eae666686e71dd6a1d459156061702acd9edefc73566366
SHA5122525da36605398bb103438ed563f34fc9839826e3c4a86abcc96bd7aaa823bed0ce0e3fbb6d7483b7a22c36e639c73b20e8229bc8e208e22e73270c0dfcfefb5