Analysis
-
max time kernel
72s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe
Resource
win10v2004-20230220-en
General
-
Target
660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe
-
Size
672KB
-
MD5
84d5c9d6f0bd7ffdb3526d7186fa0544
-
SHA1
a939c624251a28bd424bf89c694c32a7950d1bf4
-
SHA256
660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615
-
SHA512
dc27a3a682a6d7acf1e22e03a02e1101353d56313b40552c5424e4c8a267244ecab91269c2ebc7cc8d105b51f7271a7ba950328cc880b4a1785c9f9f50718c71
-
SSDEEP
12288:vMrPy90xge5brBXvrXBXZ7K/39lvRuomJg+YXbXFp/2wN9KVr+u:4ycndDRdY3YoAMh3N0Cu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9515.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9515.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3300-191-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-192-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-194-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-196-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-198-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-200-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-202-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-204-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-206-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-208-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-210-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-212-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-214-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-216-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-218-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-220-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-222-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline behavioral1/memory/3300-224-0x0000000002390000-0x00000000023CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1776 un260421.exe 4768 pro9515.exe 3300 qu2308.exe 3700 si073789.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9515.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9515.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un260421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un260421.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4944 4768 WerFault.exe 83 4360 3300 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4768 pro9515.exe 4768 pro9515.exe 3300 qu2308.exe 3300 qu2308.exe 3700 si073789.exe 3700 si073789.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4768 pro9515.exe Token: SeDebugPrivilege 3300 qu2308.exe Token: SeDebugPrivilege 3700 si073789.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4184 wrote to memory of 1776 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 82 PID 4184 wrote to memory of 1776 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 82 PID 4184 wrote to memory of 1776 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 82 PID 1776 wrote to memory of 4768 1776 un260421.exe 83 PID 1776 wrote to memory of 4768 1776 un260421.exe 83 PID 1776 wrote to memory of 4768 1776 un260421.exe 83 PID 1776 wrote to memory of 3300 1776 un260421.exe 88 PID 1776 wrote to memory of 3300 1776 un260421.exe 88 PID 1776 wrote to memory of 3300 1776 un260421.exe 88 PID 4184 wrote to memory of 3700 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 92 PID 4184 wrote to memory of 3700 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 92 PID 4184 wrote to memory of 3700 4184 660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe"C:\Users\Admin\AppData\Local\Temp\660fc22cf8ca6ce33193da3cccc3aa62c6fc41ccfffb540a96ccf22ef4d14615.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260421.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9515.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10844⤵
- Program crash
PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2308.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2308.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 13364⤵
- Program crash
PID:4360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073789.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073789.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4768 -ip 47681⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3300 -ip 33001⤵PID:1896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59e135adc7b46c885a6201db76b1e2d15
SHA1e0e8f6a14e1a2b973f4784bc94611c58cec68b2a
SHA256ec15aa7fd5f81d387f76cd4531a33c8c3959346b99f32b7375e5a258376f0174
SHA5128486f13f7cd09ca611d30d470378af6b399f9f62972e9409cdfe6e1100848aaaa765c00eb9a4d098640e6be845e579537fd8a8d52751140a3f124642d92a629e
-
Filesize
175KB
MD59e135adc7b46c885a6201db76b1e2d15
SHA1e0e8f6a14e1a2b973f4784bc94611c58cec68b2a
SHA256ec15aa7fd5f81d387f76cd4531a33c8c3959346b99f32b7375e5a258376f0174
SHA5128486f13f7cd09ca611d30d470378af6b399f9f62972e9409cdfe6e1100848aaaa765c00eb9a4d098640e6be845e579537fd8a8d52751140a3f124642d92a629e
-
Filesize
530KB
MD5dae2b1d6f964c7f325ed2b9969b47840
SHA1e45b9eb958f37a90e5cb969d6da7583e0e237b33
SHA256db7bfdbb4c0356f57350758ef0b246f6901827f7a295c5da3e7a8ae8d1d9fa18
SHA512f24e61e6bdb7d644d8d97dff4ad73f8e70f39d5bb5c1106945535c71df9ebe60d1d310f573f847cdad2a473933c627925b4fd5fa99cfaab80c73bf1b3432d16f
-
Filesize
530KB
MD5dae2b1d6f964c7f325ed2b9969b47840
SHA1e45b9eb958f37a90e5cb969d6da7583e0e237b33
SHA256db7bfdbb4c0356f57350758ef0b246f6901827f7a295c5da3e7a8ae8d1d9fa18
SHA512f24e61e6bdb7d644d8d97dff4ad73f8e70f39d5bb5c1106945535c71df9ebe60d1d310f573f847cdad2a473933c627925b4fd5fa99cfaab80c73bf1b3432d16f
-
Filesize
259KB
MD5d2c898c2d3eab74fc76fcd709843360f
SHA1c54eaadc8f75465a0faee9fad0de3b377f140d2a
SHA2566c3a19f6303ecfb6a6d804fcde09f9dce66da7fd32c733289efd8667049f9cdb
SHA51227f04a33c378a111d9e7e6f87e1d8834c0704dbc7630684c88c2ee7ea127205ebd1d45ee32c6a45ef4ccda1953f9f63b47810c6b39031242d322e4f989163521
-
Filesize
259KB
MD5d2c898c2d3eab74fc76fcd709843360f
SHA1c54eaadc8f75465a0faee9fad0de3b377f140d2a
SHA2566c3a19f6303ecfb6a6d804fcde09f9dce66da7fd32c733289efd8667049f9cdb
SHA51227f04a33c378a111d9e7e6f87e1d8834c0704dbc7630684c88c2ee7ea127205ebd1d45ee32c6a45ef4ccda1953f9f63b47810c6b39031242d322e4f989163521
-
Filesize
318KB
MD5e0ff7cbe6842e06d8c5c51b3f0c55740
SHA126c1e730433fc4d684af7a440ac3e6e125cd3b9b
SHA256829216fc9b08ad21af0bcd78c55c7886b564befe9c500b1ca4a6c0ab069b6739
SHA5120a603be6d063d9902a39662ea00df2d029e4ab8887e663921bca917d2a3a4b1e0469ac4e6b9b7813c354b30c811aec6eb50019f921fb233000bda7fa3eef86ea
-
Filesize
318KB
MD5e0ff7cbe6842e06d8c5c51b3f0c55740
SHA126c1e730433fc4d684af7a440ac3e6e125cd3b9b
SHA256829216fc9b08ad21af0bcd78c55c7886b564befe9c500b1ca4a6c0ab069b6739
SHA5120a603be6d063d9902a39662ea00df2d029e4ab8887e663921bca917d2a3a4b1e0469ac4e6b9b7813c354b30c811aec6eb50019f921fb233000bda7fa3eef86ea