Analysis
-
max time kernel
109s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe
Resource
win10v2004-20230220-en
General
-
Target
f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe
-
Size
673KB
-
MD5
a44a997bb1a50a1782e04723761ac94b
-
SHA1
364bafd144f10e2a64c9852b3c5ba4d5f4270840
-
SHA256
f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8
-
SHA512
501a8f5d0f7a726b59279782f8e87a30139c7fe27f5a4f4a9a0a2179c894f36595b48235cdce7fdc6674659bb7413727884c9c29bc6b9aca9cf07fa980068bb1
-
SSDEEP
12288:xMr6y90uS1TQIEeY+k/nM0E7OXcJr80jWcMROK1N68DG/OPA+8SyuCpTIeNhPH:zyU16JN5BwjM0UZA+hbCZB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7288.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7288.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1624-191-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-192-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-194-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-196-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-198-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-200-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-202-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-204-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-206-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-208-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-210-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-212-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-214-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-217-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-221-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-224-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-226-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-228-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1624-1110-0x00000000021F0000-0x0000000002200000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2308 un132880.exe 5016 pro7288.exe 1624 qu5996.exe 5052 si056968.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7288.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un132880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un132880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3868 5016 WerFault.exe 85 2548 1624 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5016 pro7288.exe 5016 pro7288.exe 1624 qu5996.exe 1624 qu5996.exe 5052 si056968.exe 5052 si056968.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5016 pro7288.exe Token: SeDebugPrivilege 1624 qu5996.exe Token: SeDebugPrivilege 5052 si056968.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4088 wrote to memory of 2308 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 84 PID 4088 wrote to memory of 2308 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 84 PID 4088 wrote to memory of 2308 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 84 PID 2308 wrote to memory of 5016 2308 un132880.exe 85 PID 2308 wrote to memory of 5016 2308 un132880.exe 85 PID 2308 wrote to memory of 5016 2308 un132880.exe 85 PID 2308 wrote to memory of 1624 2308 un132880.exe 94 PID 2308 wrote to memory of 1624 2308 un132880.exe 94 PID 2308 wrote to memory of 1624 2308 un132880.exe 94 PID 4088 wrote to memory of 5052 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 99 PID 4088 wrote to memory of 5052 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 99 PID 4088 wrote to memory of 5052 4088 f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe"C:\Users\Admin\AppData\Local\Temp\f0566da13693562876f139484589519fe6f581fcf24f44e2ad8ce6a87663ceb8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132880.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132880.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7288.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 10804⤵
- Program crash
PID:3868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5996.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 13524⤵
- Program crash
PID:2548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056968.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056968.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5016 -ip 50161⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1624 -ip 16241⤵PID:2588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD594b9978b5b7bc7d3ba1a3639f87732d3
SHA160501c96a0f921f169d226274367dd8717f89776
SHA2562b39caa589ac572c929421a974876a9985a93eb1f71698109e88566ec9278c3b
SHA512e74f1ec5149923a13a98d6aebd278f26f64c29ac719a6813e9b04d69e1b0bbac57c341411892ba21d1b5f3df96a494739893172bdf0039f1bb13473633d3ab61
-
Filesize
175KB
MD594b9978b5b7bc7d3ba1a3639f87732d3
SHA160501c96a0f921f169d226274367dd8717f89776
SHA2562b39caa589ac572c929421a974876a9985a93eb1f71698109e88566ec9278c3b
SHA512e74f1ec5149923a13a98d6aebd278f26f64c29ac719a6813e9b04d69e1b0bbac57c341411892ba21d1b5f3df96a494739893172bdf0039f1bb13473633d3ab61
-
Filesize
530KB
MD5a407610f150b997d726c32d737357254
SHA17fe398793b95a6b9f43585ce71ec945ba8466dbf
SHA256e95bec3cf0f6937d6ead199dcc4a3b536405a2544723236982d2b6038dfee1d2
SHA512a2348ade05f9d2be18e26df9daedee7a4f0b2f304f9e305aae1c8addb02da0e481a579301849844ad21d649b1bff1373346c15a856df212aefac98516f87e1f6
-
Filesize
530KB
MD5a407610f150b997d726c32d737357254
SHA17fe398793b95a6b9f43585ce71ec945ba8466dbf
SHA256e95bec3cf0f6937d6ead199dcc4a3b536405a2544723236982d2b6038dfee1d2
SHA512a2348ade05f9d2be18e26df9daedee7a4f0b2f304f9e305aae1c8addb02da0e481a579301849844ad21d649b1bff1373346c15a856df212aefac98516f87e1f6
-
Filesize
259KB
MD5b444bc80bc90f394f191b1aa1d04e68a
SHA1be18ee9641ed4c324b2c24bae7cd4ecac0b24c88
SHA2564573152b1bccb4d302a97b7103d24118da4b3d690fd2af9c561ae61528562fa8
SHA5128b9fe500a11ab19532a140e91462eed4d4a31159e71197316d472c8d740b165a178190333394baf244505d96dea2e2f97c557ab95377dac8e39987c856895c45
-
Filesize
259KB
MD5b444bc80bc90f394f191b1aa1d04e68a
SHA1be18ee9641ed4c324b2c24bae7cd4ecac0b24c88
SHA2564573152b1bccb4d302a97b7103d24118da4b3d690fd2af9c561ae61528562fa8
SHA5128b9fe500a11ab19532a140e91462eed4d4a31159e71197316d472c8d740b165a178190333394baf244505d96dea2e2f97c557ab95377dac8e39987c856895c45
-
Filesize
318KB
MD595b37eb08a038e29aa226e18151e31ba
SHA17d9bf2f73596de273982e436ee5fa714c1c759fe
SHA2565d6307de961008c36e49b879d53f57a23a7cc71210d82789595874395f5caca3
SHA5120c17ac83f0883bcf0593ab02754b9fc9b3f5dbb61a8b9396660918bff78dc2b6b4dd0edcc1769ebf03609506ffca2cb495c426065deb8722ea1532dbb3f77179
-
Filesize
318KB
MD595b37eb08a038e29aa226e18151e31ba
SHA17d9bf2f73596de273982e436ee5fa714c1c759fe
SHA2565d6307de961008c36e49b879d53f57a23a7cc71210d82789595874395f5caca3
SHA5120c17ac83f0883bcf0593ab02754b9fc9b3f5dbb61a8b9396660918bff78dc2b6b4dd0edcc1769ebf03609506ffca2cb495c426065deb8722ea1532dbb3f77179