Analysis
-
max time kernel
58s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 23:46
Static task
static1
Behavioral task
behavioral1
Sample
ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe
Resource
win10v2004-20230220-en
General
-
Target
ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe
-
Size
659KB
-
MD5
9d9995d9c0bde0a8f979768e144e8b3a
-
SHA1
3383bdae6c823b4bfe76b50be4652165267d5b5e
-
SHA256
ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7
-
SHA512
253f6240af60d7b945188244969c1492a4f5200fcf7ae9edb2cff683f0dbf9cdd6f741e678cbf057072bd99c3d6ff5f4707e755b40d54ce1fce7ff7c1d1c099e
-
SSDEEP
12288:UMrGy90XC6atN/49T/Q2vaWrvcayzp1fyS1oof5KOa/QmOt3vxxTTMR:6ysC6af/42IaIcayzyS1ZAQmONv7Tm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4346.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4346.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5040-189-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-192-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-190-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-194-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-196-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-198-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-200-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-202-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-204-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-206-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-210-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-213-0x00000000026D0000-0x00000000026E0000-memory.dmp family_redline behavioral1/memory/5040-214-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-216-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-218-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-220-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-222-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-224-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-226-0x0000000005140000-0x000000000517F000-memory.dmp family_redline behavioral1/memory/5040-1111-0x00000000026D0000-0x00000000026E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1672 un855974.exe 2376 pro4346.exe 5040 qu8068.exe 4380 si599004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4346.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un855974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un855974.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3740 2376 WerFault.exe 86 1332 5040 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2376 pro4346.exe 2376 pro4346.exe 5040 qu8068.exe 5040 qu8068.exe 4380 si599004.exe 4380 si599004.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2376 pro4346.exe Token: SeDebugPrivilege 5040 qu8068.exe Token: SeDebugPrivilege 4380 si599004.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3364 wrote to memory of 1672 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 85 PID 3364 wrote to memory of 1672 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 85 PID 3364 wrote to memory of 1672 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 85 PID 1672 wrote to memory of 2376 1672 un855974.exe 86 PID 1672 wrote to memory of 2376 1672 un855974.exe 86 PID 1672 wrote to memory of 2376 1672 un855974.exe 86 PID 1672 wrote to memory of 5040 1672 un855974.exe 92 PID 1672 wrote to memory of 5040 1672 un855974.exe 92 PID 1672 wrote to memory of 5040 1672 un855974.exe 92 PID 3364 wrote to memory of 4380 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 96 PID 3364 wrote to memory of 4380 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 96 PID 3364 wrote to memory of 4380 3364 ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe"C:\Users\Admin\AppData\Local\Temp\ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 10804⤵
- Program crash
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 13524⤵
- Program crash
PID:1332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2376 -ip 23761⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5040 -ip 50401⤵PID:2684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5efb02807e0a5766c8e73de36c71a502c
SHA19d01d2f5e7e68360c7069a6e1030f3a4a5d1b5b7
SHA256a29c67bf9eb5d59fc8158f0017aae2f8114f03fb5c1310131c80c0f8d3c6bb86
SHA5127c67b5d14e2e11d13304729f4d18d5af1f0f88ab2cbc921e30751bb0c45902c5daefceb3b1f026970aa143d1118a37ae8c20d8c47a487dc5fe3d0d2af8f97b77
-
Filesize
176KB
MD5efb02807e0a5766c8e73de36c71a502c
SHA19d01d2f5e7e68360c7069a6e1030f3a4a5d1b5b7
SHA256a29c67bf9eb5d59fc8158f0017aae2f8114f03fb5c1310131c80c0f8d3c6bb86
SHA5127c67b5d14e2e11d13304729f4d18d5af1f0f88ab2cbc921e30751bb0c45902c5daefceb3b1f026970aa143d1118a37ae8c20d8c47a487dc5fe3d0d2af8f97b77
-
Filesize
518KB
MD5f6d51eb01ae0b24ab04a5eabdf00941f
SHA1f5e4bb48f7bab2a2108ced17d1ea98ed0dd100d5
SHA256c7b8360b0eff77742ada182c9be9d4a42d3d1e5811384fa3b7068049decc7cb3
SHA512e06dcb168a72038f821d923fad8f8c302f89fff943d7cafe56f88bb6c06b7bda257f8df59aee6464999e9ca6cc2751e4a82b1afdbaaa85eed5ceca76c0ab95cb
-
Filesize
518KB
MD5f6d51eb01ae0b24ab04a5eabdf00941f
SHA1f5e4bb48f7bab2a2108ced17d1ea98ed0dd100d5
SHA256c7b8360b0eff77742ada182c9be9d4a42d3d1e5811384fa3b7068049decc7cb3
SHA512e06dcb168a72038f821d923fad8f8c302f89fff943d7cafe56f88bb6c06b7bda257f8df59aee6464999e9ca6cc2751e4a82b1afdbaaa85eed5ceca76c0ab95cb
-
Filesize
376KB
MD51d6df3e7899a7b1649ce1df3267e2c04
SHA1899e906e0dc41d93dbc0d705c37c2154d45f9aa2
SHA2568d847f7f4e2ecb7eeb6506dc24b8145ac7158edde2743de32716edb8870b76aa
SHA512a606348dfede6f24ad954b31ccb2189d5f8a705eada5b78953bdc6b55f75f62b8cc4736244d294123cd8641aeb3fe922871069137b2918d7e531d37d89b9b102
-
Filesize
376KB
MD51d6df3e7899a7b1649ce1df3267e2c04
SHA1899e906e0dc41d93dbc0d705c37c2154d45f9aa2
SHA2568d847f7f4e2ecb7eeb6506dc24b8145ac7158edde2743de32716edb8870b76aa
SHA512a606348dfede6f24ad954b31ccb2189d5f8a705eada5b78953bdc6b55f75f62b8cc4736244d294123cd8641aeb3fe922871069137b2918d7e531d37d89b9b102
-
Filesize
434KB
MD58405d7effc9e9a07322812c2b246a2ca
SHA15757fb3008841228e43fe857d966bf64f20e3aab
SHA256a989702d6e8c09fcf569e4c672d5c3e3d954fec6557d040f028f79d778a82cd2
SHA512f9e680fa2ea29075548897f6bf81c259b0141ede66dee30ee48c83d3730f14d1fc16020d7934e7352e253c013a661bf7984e56e55f2a4738f8b81543285622c3
-
Filesize
434KB
MD58405d7effc9e9a07322812c2b246a2ca
SHA15757fb3008841228e43fe857d966bf64f20e3aab
SHA256a989702d6e8c09fcf569e4c672d5c3e3d954fec6557d040f028f79d778a82cd2
SHA512f9e680fa2ea29075548897f6bf81c259b0141ede66dee30ee48c83d3730f14d1fc16020d7934e7352e253c013a661bf7984e56e55f2a4738f8b81543285622c3