Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe
Resource
win10v2004-20230220-en
General
-
Target
f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe
-
Size
673KB
-
MD5
79fe85bbb91086e2e9cee5a09f938a9a
-
SHA1
39588d29d8b30d84412ca24b8bc748c04b917163
-
SHA256
f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd
-
SHA512
aaddd951759c380ba4729ef4fdb61fbef204d12b35400bb0c0bf5bf1abe63608d85f9a749643981ca7600b73301ab7dd7932ffdab48bbfa6ed21683d1787c8eb
-
SSDEEP
12288:6Mrgy90/MJIkC3FG8vqh2OSwdLH3Dnbq0DhVGbuWeKCQEZvlx+A7:GygD18Acd3DhhV+uByOx+A7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4530.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4530.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2888-192-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-193-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-195-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-197-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-199-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-201-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-203-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-205-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-208-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-212-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-215-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-217-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-219-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-221-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-223-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-225-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-227-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-229-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2888-1108-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 8 un190796.exe 3636 pro4530.exe 2888 qu9559.exe 3812 si205391.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4530.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4530.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un190796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un190796.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2128 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4044 3636 WerFault.exe 84 2320 2888 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3636 pro4530.exe 3636 pro4530.exe 2888 qu9559.exe 2888 qu9559.exe 3812 si205391.exe 3812 si205391.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3636 pro4530.exe Token: SeDebugPrivilege 2888 qu9559.exe Token: SeDebugPrivilege 3812 si205391.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 660 wrote to memory of 8 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 83 PID 660 wrote to memory of 8 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 83 PID 660 wrote to memory of 8 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 83 PID 8 wrote to memory of 3636 8 un190796.exe 84 PID 8 wrote to memory of 3636 8 un190796.exe 84 PID 8 wrote to memory of 3636 8 un190796.exe 84 PID 8 wrote to memory of 2888 8 un190796.exe 90 PID 8 wrote to memory of 2888 8 un190796.exe 90 PID 8 wrote to memory of 2888 8 un190796.exe 90 PID 660 wrote to memory of 3812 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 95 PID 660 wrote to memory of 3812 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 95 PID 660 wrote to memory of 3812 660 f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe"C:\Users\Admin\AppData\Local\Temp\f9b8a806fbd29205619eafe44a951b392292a233cbe046288b53a0b9bcbc37bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un190796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un190796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 10884⤵
- Program crash
PID:4044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9559.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 13484⤵
- Program crash
PID:2320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205391.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3636 -ip 36361⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2888 -ip 28881⤵PID:3640
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD516f7a11bdc3b37080477b100f7bf5779
SHA15ff95ecb9faaac8a48288401b8ea7bb22fae41b2
SHA2568cd67af923f55f2ee28411961812b3beee7f31602ec63f4f62dc4fdde327ff95
SHA512335a005052dcfd90bbdb7e94f9a85e0ce316c8c3fb3a17a049481b22d13ddf0fdaa22c1df4a1c164c7991f77aa9487107ff10f646dc86a8282c510e7956020b3
-
Filesize
176KB
MD516f7a11bdc3b37080477b100f7bf5779
SHA15ff95ecb9faaac8a48288401b8ea7bb22fae41b2
SHA2568cd67af923f55f2ee28411961812b3beee7f31602ec63f4f62dc4fdde327ff95
SHA512335a005052dcfd90bbdb7e94f9a85e0ce316c8c3fb3a17a049481b22d13ddf0fdaa22c1df4a1c164c7991f77aa9487107ff10f646dc86a8282c510e7956020b3
-
Filesize
531KB
MD57a7e7faaa107af6e48aae3396992cb64
SHA1487a08630b0da8206d6c5bddaf895f3eade67350
SHA256ef6ec9f6d9da6a9e2660727b42ff3a2fe05975aca9b1c087e07c95e1eb0da70d
SHA512f70cb8fe23d77aef15c474e8b15bc794e3f6ba4ead68b0119108e77aba5c39e5ed9e5269b2944ae1ca3b4730dcce0077c22101fd9164ec6da2bc4caed48cb872
-
Filesize
531KB
MD57a7e7faaa107af6e48aae3396992cb64
SHA1487a08630b0da8206d6c5bddaf895f3eade67350
SHA256ef6ec9f6d9da6a9e2660727b42ff3a2fe05975aca9b1c087e07c95e1eb0da70d
SHA512f70cb8fe23d77aef15c474e8b15bc794e3f6ba4ead68b0119108e77aba5c39e5ed9e5269b2944ae1ca3b4730dcce0077c22101fd9164ec6da2bc4caed48cb872
-
Filesize
260KB
MD5be8f8fd32c6d27c7f0d0711bf57985af
SHA11fc26790ce1bbfcab84b294155930f142889d92a
SHA25684249562e94624f8fba08554d2a3611ae60f0971296d2ee62add24481474e231
SHA5125c4a6dbd88f389f7915305cdb3eea31e1c70bf5ce7bdd1b2220fadbb5804d8f0d07adeb4d19c0322a9ca86469a8b5a7f9ff6ee2f1d8d34b4daf3372c6ee698fc
-
Filesize
260KB
MD5be8f8fd32c6d27c7f0d0711bf57985af
SHA11fc26790ce1bbfcab84b294155930f142889d92a
SHA25684249562e94624f8fba08554d2a3611ae60f0971296d2ee62add24481474e231
SHA5125c4a6dbd88f389f7915305cdb3eea31e1c70bf5ce7bdd1b2220fadbb5804d8f0d07adeb4d19c0322a9ca86469a8b5a7f9ff6ee2f1d8d34b4daf3372c6ee698fc
-
Filesize
319KB
MD5e4a144dfc887ed03e7303f83a6646b64
SHA1aa9891bf55c55d88cea0b13bab56292f6d211efd
SHA256aa697b4c073ee6c311df2b5450be4ad01fee26be02137a3dfe7d648210a982bb
SHA5123f3582910ac1be68645cc2758acc024c944c8d9f8f919c34b1d8461906e517950f73336816c7b4ee51bbfbe5d772f0e19bd5d3375f70896fbb684cdefa291ed0
-
Filesize
319KB
MD5e4a144dfc887ed03e7303f83a6646b64
SHA1aa9891bf55c55d88cea0b13bab56292f6d211efd
SHA256aa697b4c073ee6c311df2b5450be4ad01fee26be02137a3dfe7d648210a982bb
SHA5123f3582910ac1be68645cc2758acc024c944c8d9f8f919c34b1d8461906e517950f73336816c7b4ee51bbfbe5d772f0e19bd5d3375f70896fbb684cdefa291ed0