Analysis
-
max time kernel
109s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe
Resource
win10v2004-20230221-en
General
-
Target
3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe
-
Size
673KB
-
MD5
0799ed4daeb1ce0a944836bc949ab523
-
SHA1
ae3073d6282e950cf943861f4a2ff7b34523265f
-
SHA256
3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d
-
SHA512
11e8feecafd3f084eb034abbd0826a639dedf55ecf3bb7ae013414481bc0582f6e37d1ff0c5a882e7a982b16b2e3ad6204d084ca2c694ce34c5a75ddd28649fc
-
SSDEEP
12288:TMrYy90DQ59gn2iZhGe6KNR37UH0yCiZbuWao8kWBk:Dy+QHg2iZhB3uCiduJGWC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4540-191-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-192-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-194-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-196-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-200-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-204-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-206-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-208-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-210-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-212-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-214-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-216-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-218-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-220-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-222-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-224-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-226-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline behavioral1/memory/4540-228-0x00000000024F0000-0x000000000252F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4220 un114790.exe 1052 pro4102.exe 4540 qu6883.exe 4024 si020019.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4102.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un114790.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un114790.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3372 1052 WerFault.exe 87 2400 4540 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1052 pro4102.exe 1052 pro4102.exe 4540 qu6883.exe 4540 qu6883.exe 4024 si020019.exe 4024 si020019.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1052 pro4102.exe Token: SeDebugPrivilege 4540 qu6883.exe Token: SeDebugPrivilege 4024 si020019.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4220 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 86 PID 4224 wrote to memory of 4220 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 86 PID 4224 wrote to memory of 4220 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 86 PID 4220 wrote to memory of 1052 4220 un114790.exe 87 PID 4220 wrote to memory of 1052 4220 un114790.exe 87 PID 4220 wrote to memory of 1052 4220 un114790.exe 87 PID 4220 wrote to memory of 4540 4220 un114790.exe 93 PID 4220 wrote to memory of 4540 4220 un114790.exe 93 PID 4220 wrote to memory of 4540 4220 un114790.exe 93 PID 4224 wrote to memory of 4024 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 97 PID 4224 wrote to memory of 4024 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 97 PID 4224 wrote to memory of 4024 4224 3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe"C:\Users\Admin\AppData\Local\Temp\3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 10844⤵
- Program crash
PID:3372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 13484⤵
- Program crash
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1052 -ip 10521⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4540 -ip 45401⤵PID:4280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD546ddaf6b51fab20041b6a93e0139a96a
SHA1d81aaea546e192b1a0316b7de0b5cbc9250840e0
SHA256343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f
SHA512ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a
-
Filesize
176KB
MD546ddaf6b51fab20041b6a93e0139a96a
SHA1d81aaea546e192b1a0316b7de0b5cbc9250840e0
SHA256343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f
SHA512ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a
-
Filesize
531KB
MD5b0fa36ed8afa4018b9607fd9c5e011a6
SHA1bd137871b4fdfa36958d18a959d7499713561f52
SHA256262c18f9c7a4ac99e7cec29df18816dc28e43ba3cab7eb97a956bd5f81b5744d
SHA5121d08931e39513c777bd0d7267a2293422da63266d4ddd7751152f622733dfee3b42875e0d04b1b078187068076a310fae7b305e0eab8a4b89fa73cc734d8c93b
-
Filesize
531KB
MD5b0fa36ed8afa4018b9607fd9c5e011a6
SHA1bd137871b4fdfa36958d18a959d7499713561f52
SHA256262c18f9c7a4ac99e7cec29df18816dc28e43ba3cab7eb97a956bd5f81b5744d
SHA5121d08931e39513c777bd0d7267a2293422da63266d4ddd7751152f622733dfee3b42875e0d04b1b078187068076a310fae7b305e0eab8a4b89fa73cc734d8c93b
-
Filesize
260KB
MD516e2403f7e0bc07cc007f369516ab948
SHA1e388a3fcdf52e7ee257fa630311dc4890baec064
SHA2561dc7241c548658cdc2f20c3fbfae7ce1fc45b9105b482e9bd8c1ec65b144441f
SHA5128124d81ce4b370423b64c83465786e56dc2f2270c0d2709a8f3e1f043e0ebe52707dd5a6fdfbaec4deff9a65c5cc8a1e5f65b35c89d9526a8f6dd94ad09b9e5a
-
Filesize
260KB
MD516e2403f7e0bc07cc007f369516ab948
SHA1e388a3fcdf52e7ee257fa630311dc4890baec064
SHA2561dc7241c548658cdc2f20c3fbfae7ce1fc45b9105b482e9bd8c1ec65b144441f
SHA5128124d81ce4b370423b64c83465786e56dc2f2270c0d2709a8f3e1f043e0ebe52707dd5a6fdfbaec4deff9a65c5cc8a1e5f65b35c89d9526a8f6dd94ad09b9e5a
-
Filesize
319KB
MD5a61eaa5782da55eff175bda3a0ed14c6
SHA16aecd8cda4ba0db1eeb7604f8be794b554a704c4
SHA2569ca05b5e93784948cbd397d9e75e4d1d3974ac63768411ce7f24eb351201621e
SHA5121bb88dcae6597760c10f1d0a24438a8cee43094b049b03a0a4386be7d0679551070e0562b7f36090b45473d9ddc0647a9ca9aba4e8a353b3e9ab894d699a4731
-
Filesize
319KB
MD5a61eaa5782da55eff175bda3a0ed14c6
SHA16aecd8cda4ba0db1eeb7604f8be794b554a704c4
SHA2569ca05b5e93784948cbd397d9e75e4d1d3974ac63768411ce7f24eb351201621e
SHA5121bb88dcae6597760c10f1d0a24438a8cee43094b049b03a0a4386be7d0679551070e0562b7f36090b45473d9ddc0647a9ca9aba4e8a353b3e9ab894d699a4731