Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:54
Static task
static1
Behavioral task
behavioral1
Sample
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe
Resource
win10v2004-20230220-en
General
-
Target
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe
-
Size
671KB
-
MD5
2c29d4d448e0fc675ba44824426d6fd8
-
SHA1
6bd01b9934f0f932980b3995edc898593c6562cf
-
SHA256
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548
-
SHA512
104731d4a0a6d456f26360575c9b1671902172effffbdf46f11de4c6fc6589f448c6a3975c57c6b54a690df7bc86f55942bad89fbecba87cf3f07dd76c2958ac
-
SSDEEP
12288:FMrNy90vD0nrEfstO0fgxPgw4GqVM2bHKD3Lqqi1O2st:gyEGltO0f+qVVbqD3GqQOV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4665.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/5060-191-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-192-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-194-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-196-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-198-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-200-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-202-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-204-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-206-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-208-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-210-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-212-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-217-0x00000000061C0000-0x00000000061D0000-memory.dmp family_redline behavioral1/memory/5060-216-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-219-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-221-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-223-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-227-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/5060-225-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un552064.exepro4665.exequ2184.exesi598541.exepid process 1976 un552064.exe 1800 pro4665.exe 5060 qu2184.exe 4320 si598541.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4665.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4665.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un552064.exe62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un552064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un552064.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4868 1800 WerFault.exe pro4665.exe 3504 5060 WerFault.exe qu2184.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4665.exequ2184.exesi598541.exepid process 1800 pro4665.exe 1800 pro4665.exe 5060 qu2184.exe 5060 qu2184.exe 4320 si598541.exe 4320 si598541.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4665.exequ2184.exesi598541.exedescription pid process Token: SeDebugPrivilege 1800 pro4665.exe Token: SeDebugPrivilege 5060 qu2184.exe Token: SeDebugPrivilege 4320 si598541.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exeun552064.exedescription pid process target process PID 1616 wrote to memory of 1976 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 1616 wrote to memory of 1976 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 1616 wrote to memory of 1976 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 1976 wrote to memory of 1800 1976 un552064.exe pro4665.exe PID 1976 wrote to memory of 1800 1976 un552064.exe pro4665.exe PID 1976 wrote to memory of 1800 1976 un552064.exe pro4665.exe PID 1976 wrote to memory of 5060 1976 un552064.exe qu2184.exe PID 1976 wrote to memory of 5060 1976 un552064.exe qu2184.exe PID 1976 wrote to memory of 5060 1976 un552064.exe qu2184.exe PID 1616 wrote to memory of 4320 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe si598541.exe PID 1616 wrote to memory of 4320 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe si598541.exe PID 1616 wrote to memory of 4320 1616 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe si598541.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe"C:\Users\Admin\AppData\Local\Temp\62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 10764⤵
- Program crash
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2184.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 14764⤵
- Program crash
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si598541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si598541.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1800 -ip 18001⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5060 -ip 50601⤵PID:4276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD521678ce43cb797437a9b47987ab1c25f
SHA18b1c47d4cf503eddcf1fd4263d736a2b58815401
SHA2564a8393f063749176046d6dd6d023c0c3cf31f800b5ff417bae5c2831c2d5ace1
SHA512ab7a228c95b8be607fd8fe9168bef470d42cbd4b1950c90da4001b7febe8adeb40887c2beac43e1125ce2d22fd55b0a6b96f35e630a3b671d0c0d287a7f4fc2e
-
Filesize
175KB
MD521678ce43cb797437a9b47987ab1c25f
SHA18b1c47d4cf503eddcf1fd4263d736a2b58815401
SHA2564a8393f063749176046d6dd6d023c0c3cf31f800b5ff417bae5c2831c2d5ace1
SHA512ab7a228c95b8be607fd8fe9168bef470d42cbd4b1950c90da4001b7febe8adeb40887c2beac43e1125ce2d22fd55b0a6b96f35e630a3b671d0c0d287a7f4fc2e
-
Filesize
529KB
MD5043791acf6ab47e36081a547c77037e0
SHA14b3de473a9bc3e4589c79b0e568a9083d9f0779d
SHA2566f2806adf733f0976467c3ed5649ea9a02c083307decee698cf7bc4ebb6baf54
SHA512e25603f94967998ae2bae1c80a7cc1b6fae0fa86a92e6e87281f704af2171076c68a7bc788536264a54b0ec7868d9eb67efe8fa6d58c2ec19a5e96e563bbd5d9
-
Filesize
529KB
MD5043791acf6ab47e36081a547c77037e0
SHA14b3de473a9bc3e4589c79b0e568a9083d9f0779d
SHA2566f2806adf733f0976467c3ed5649ea9a02c083307decee698cf7bc4ebb6baf54
SHA512e25603f94967998ae2bae1c80a7cc1b6fae0fa86a92e6e87281f704af2171076c68a7bc788536264a54b0ec7868d9eb67efe8fa6d58c2ec19a5e96e563bbd5d9
-
Filesize
301KB
MD5b6df7bd5033879c075339d47d8d39d45
SHA11268cd743a5b0e939e62e727d47e559b96346b8f
SHA256c6c48a416130d1d9df059fcfd91463f475fa935ea26848e8a4ecb6aa92dd3803
SHA512bbabfc38b77828f20575e3b63bfe454b4c2b959bc86093cadbb88f5c7377f341bdb80c2ae7a68348660e600f9739776188ef6f0924c895aee3572c91202ba06b
-
Filesize
301KB
MD5b6df7bd5033879c075339d47d8d39d45
SHA11268cd743a5b0e939e62e727d47e559b96346b8f
SHA256c6c48a416130d1d9df059fcfd91463f475fa935ea26848e8a4ecb6aa92dd3803
SHA512bbabfc38b77828f20575e3b63bfe454b4c2b959bc86093cadbb88f5c7377f341bdb80c2ae7a68348660e600f9739776188ef6f0924c895aee3572c91202ba06b
-
Filesize
359KB
MD5df9f28a2e77750c67155a8ee6ab61cf3
SHA1e2fd58dccbb3fbf1724396bb21701ff2a8bbcbc7
SHA25624c6c72a15fa5dc498f37e1fdb933a1bca78f1c837d987cb597ba1e03af3fae2
SHA512d1884c46c1bcb3059bcb4f0a60944f34bbb6d69f66961cbea26bc233e55e6d81cb999bf1e8e6101341bd56ae95100a1dd595c3bc3eeaf4533baf34b8b9a372fe
-
Filesize
359KB
MD5df9f28a2e77750c67155a8ee6ab61cf3
SHA1e2fd58dccbb3fbf1724396bb21701ff2a8bbcbc7
SHA25624c6c72a15fa5dc498f37e1fdb933a1bca78f1c837d987cb597ba1e03af3fae2
SHA512d1884c46c1bcb3059bcb4f0a60944f34bbb6d69f66961cbea26bc233e55e6d81cb999bf1e8e6101341bd56ae95100a1dd595c3bc3eeaf4533baf34b8b9a372fe