Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 21:30
Static task
static1
Behavioral task
behavioral1
Sample
dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe
Resource
win10v2004-20230220-en
General
-
Target
dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe
-
Size
662KB
-
MD5
da3765bc1889c61fd7b989bc9736b928
-
SHA1
50977fdf5cb596e91626519b5e8b1673c0cbe348
-
SHA256
dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a
-
SHA512
1067ea8140b168ef8efabad2935e1cb13808810205cf06042415573a89d31450ec90459df7a7abf70cf219bc99892036101165ca5d8cab55e318219605c1ed95
-
SSDEEP
12288:hMryy90b7+kr3F1rN2hpKvWOys4piMkqro80yM8FNfoKXa/EmShhomxDQ:ryM+krDrN23Kvz4piGrz0yM83xvmShXm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3300.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3300.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3264-191-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-192-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-194-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-196-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-198-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-200-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-202-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-204-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-208-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-211-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-213-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-215-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-217-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-219-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-221-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-223-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-225-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/3264-227-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1392 un405318.exe 1936 pro3300.exe 3264 qu9555.exe 660 si879927.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3300.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un405318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un405318.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4444 1936 WerFault.exe 86 4636 3264 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 pro3300.exe 1936 pro3300.exe 3264 qu9555.exe 3264 qu9555.exe 660 si879927.exe 660 si879927.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 pro3300.exe Token: SeDebugPrivilege 3264 qu9555.exe Token: SeDebugPrivilege 660 si879927.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1392 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 85 PID 3712 wrote to memory of 1392 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 85 PID 3712 wrote to memory of 1392 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 85 PID 1392 wrote to memory of 1936 1392 un405318.exe 86 PID 1392 wrote to memory of 1936 1392 un405318.exe 86 PID 1392 wrote to memory of 1936 1392 un405318.exe 86 PID 1392 wrote to memory of 3264 1392 un405318.exe 92 PID 1392 wrote to memory of 3264 1392 un405318.exe 92 PID 1392 wrote to memory of 3264 1392 un405318.exe 92 PID 3712 wrote to memory of 660 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 96 PID 3712 wrote to memory of 660 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 96 PID 3712 wrote to memory of 660 3712 dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe"C:\Users\Admin\AppData\Local\Temp\dfe36d65a73dbf36b23b32a6aadab3f8b7ca4bcabb131c380bb6453605517a6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405318.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3300.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 10844⤵
- Program crash
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9555.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 13364⤵
- Program crash
PID:4636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si879927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si879927.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1936 -ip 19361⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3264 -ip 32641⤵PID:4832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD54359c25da5e0bab975949038521fb5d9
SHA121811a757224e9a8b8908b6e5d772e4706effff3
SHA256ac00bef6668a9067a1827cc4d4756e323b14964c4f5fc92e717b0f02d5bc5126
SHA5123f817964fcda6178addcfdbf55a1f0fa5620aece1805ade3c599a99d341428854e4bb634ba73e8ef1c90de1efb4d2793a61b5fe23541643a574c01d454941fcb
-
Filesize
176KB
MD54359c25da5e0bab975949038521fb5d9
SHA121811a757224e9a8b8908b6e5d772e4706effff3
SHA256ac00bef6668a9067a1827cc4d4756e323b14964c4f5fc92e717b0f02d5bc5126
SHA5123f817964fcda6178addcfdbf55a1f0fa5620aece1805ade3c599a99d341428854e4bb634ba73e8ef1c90de1efb4d2793a61b5fe23541643a574c01d454941fcb
-
Filesize
520KB
MD5364a02f384ada5b98bc972c93ba800de
SHA1032a9e6623e027e13aab222124a57b5de5f7c84e
SHA25699b05f394c48f547922974bc4bfbe126f0eea4fe60e477493647adeea41cee0a
SHA5124cf2be997d8b7e798d236a58fa047451c6df587e92becd8a2d0ed7bb12a3ec21056627669af20c5ec502459d2ed591e83710015e7663ccc42499a120d725c880
-
Filesize
520KB
MD5364a02f384ada5b98bc972c93ba800de
SHA1032a9e6623e027e13aab222124a57b5de5f7c84e
SHA25699b05f394c48f547922974bc4bfbe126f0eea4fe60e477493647adeea41cee0a
SHA5124cf2be997d8b7e798d236a58fa047451c6df587e92becd8a2d0ed7bb12a3ec21056627669af20c5ec502459d2ed591e83710015e7663ccc42499a120d725c880
-
Filesize
295KB
MD5d53209d4cb5f1624c36820e268baa4a5
SHA164b7896f34681eb703e28f98b01e65a594cedbe8
SHA2568bded4d09a9c24eeaadcc2c872d460f45578401bd38d788dc2b9f0678863203d
SHA5128ab28b5065f2f25b52989f69abffc10f36f98f07d7a8b5482dd52acd7cfd88d1ecdca4bb93f76489f8446dde84bdd3bd3e8da08589a575b40920128bc8df97b5
-
Filesize
295KB
MD5d53209d4cb5f1624c36820e268baa4a5
SHA164b7896f34681eb703e28f98b01e65a594cedbe8
SHA2568bded4d09a9c24eeaadcc2c872d460f45578401bd38d788dc2b9f0678863203d
SHA5128ab28b5065f2f25b52989f69abffc10f36f98f07d7a8b5482dd52acd7cfd88d1ecdca4bb93f76489f8446dde84bdd3bd3e8da08589a575b40920128bc8df97b5
-
Filesize
434KB
MD51720b0f1732f64df4a6242df16c28bf5
SHA1c33bfece582e006c1fd542785f68a407c5b5a8d3
SHA2563364122544e25d283d8beadcf8085ad7f97516cffeeae7644a98a4399ca21a87
SHA5128e9b0f13075f5189ffd6d9d20077ebaa835dc153e8d60f2e4a398ab0dde9d00d447cffabb4ef1caecf6f1f82f57365bae93492a585deb1d0b2d1970be40ba31c
-
Filesize
434KB
MD51720b0f1732f64df4a6242df16c28bf5
SHA1c33bfece582e006c1fd542785f68a407c5b5a8d3
SHA2563364122544e25d283d8beadcf8085ad7f97516cffeeae7644a98a4399ca21a87
SHA5128e9b0f13075f5189ffd6d9d20077ebaa835dc153e8d60f2e4a398ab0dde9d00d447cffabb4ef1caecf6f1f82f57365bae93492a585deb1d0b2d1970be40ba31c