Analysis
-
max time kernel
138s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe
Resource
win10v2004-20230220-en
General
-
Target
e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe
-
Size
673KB
-
MD5
fa0fdee85b903f91092e9b23b47b7af0
-
SHA1
f9c10726069537c6084e4e2a5354229a30b8510d
-
SHA256
e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4
-
SHA512
cdc1d55fb0b73bcc415e8054bfd3713560b686c0b6687c84e7a7e91d7ae26045b225fd516ee37b7ebf29895a5c466a407f24abba3af87d9b4b416b1fc7f73471
-
SSDEEP
12288:hMroy90+xOdSqxmly1Yy+w8LJdod0H2v1buW3dBFnYq:xy1xOgqklAr+wy2vZuYpnYq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7903.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7903.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1752-190-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-193-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-191-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-195-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-197-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-199-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-201-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-203-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-205-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-207-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-209-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-211-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-213-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-215-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-217-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-219-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-221-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-223-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/1752-1112-0x0000000002630000-0x0000000002640000-memory.dmp family_redline behavioral1/memory/1752-1111-0x0000000002630000-0x0000000002640000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1480 un157183.exe 380 pro7903.exe 1752 qu1598.exe 2388 si860436.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7903.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un157183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un157183.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2540 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4244 380 WerFault.exe 86 3224 1752 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 380 pro7903.exe 380 pro7903.exe 1752 qu1598.exe 1752 qu1598.exe 2388 si860436.exe 2388 si860436.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 380 pro7903.exe Token: SeDebugPrivilege 1752 qu1598.exe Token: SeDebugPrivilege 2388 si860436.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1480 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 85 PID 4480 wrote to memory of 1480 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 85 PID 4480 wrote to memory of 1480 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 85 PID 1480 wrote to memory of 380 1480 un157183.exe 86 PID 1480 wrote to memory of 380 1480 un157183.exe 86 PID 1480 wrote to memory of 380 1480 un157183.exe 86 PID 1480 wrote to memory of 1752 1480 un157183.exe 92 PID 1480 wrote to memory of 1752 1480 un157183.exe 92 PID 1480 wrote to memory of 1752 1480 un157183.exe 92 PID 4480 wrote to memory of 2388 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 96 PID 4480 wrote to memory of 2388 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 96 PID 4480 wrote to memory of 2388 4480 e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe"C:\Users\Admin\AppData\Local\Temp\e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 10804⤵
- Program crash
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 15404⤵
- Program crash
PID:3224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 380 -ip 3801⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1752 -ip 17521⤵PID:2256
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50d4d61139872101176a45947fee79341
SHA1849db89d8de90f58386ab16ca2aabb0201528904
SHA25672bd3d41e334a257c4e850ae403bfda1880fe1b7754ad4006409d7bb925b30f6
SHA5121f23b2d50949f5aa2156321092237be661ea454301c390e002f432fd3c1591e641b7bb4a77fff2a1ae8fc03a5e55dabfbc1d154e9e0f629e038895676f08a048
-
Filesize
176KB
MD50d4d61139872101176a45947fee79341
SHA1849db89d8de90f58386ab16ca2aabb0201528904
SHA25672bd3d41e334a257c4e850ae403bfda1880fe1b7754ad4006409d7bb925b30f6
SHA5121f23b2d50949f5aa2156321092237be661ea454301c390e002f432fd3c1591e641b7bb4a77fff2a1ae8fc03a5e55dabfbc1d154e9e0f629e038895676f08a048
-
Filesize
531KB
MD50ef8b0aabb95afe15d405bbb0d3e45ed
SHA19eb898d283c2b2f31d8ba30641eaf244a72e9074
SHA25659b8ecbfe4f74e97a4c9140a462fc871c7463174a9b6b66a3f7e4c9caddffa8d
SHA512427c9dcb569fa4808e5086573ff48d9547d3250f87259ea209ee23c9e017281edbf205a1587b9bf93a925062cc1c278605ca4e4316820980c84e7a13eb1c7e4e
-
Filesize
531KB
MD50ef8b0aabb95afe15d405bbb0d3e45ed
SHA19eb898d283c2b2f31d8ba30641eaf244a72e9074
SHA25659b8ecbfe4f74e97a4c9140a462fc871c7463174a9b6b66a3f7e4c9caddffa8d
SHA512427c9dcb569fa4808e5086573ff48d9547d3250f87259ea209ee23c9e017281edbf205a1587b9bf93a925062cc1c278605ca4e4316820980c84e7a13eb1c7e4e
-
Filesize
260KB
MD5c72453831ba10412d066ec44e0bd99a4
SHA1d789ceeba7f1e09dc2612b41d3e60a0c7fdea206
SHA256d0a43365b2bb9a79253d5db7ce431444b3b6080fc7958b1e1cbf772baabd1af0
SHA5129550a823dd088e49279bf863a3ec615e62dc3332231ad81dd8b2cdb437c777038f42f8c551a4703aa352048f9eaf113051a4ac5679c43f60a5ab29b733f8feb5
-
Filesize
260KB
MD5c72453831ba10412d066ec44e0bd99a4
SHA1d789ceeba7f1e09dc2612b41d3e60a0c7fdea206
SHA256d0a43365b2bb9a79253d5db7ce431444b3b6080fc7958b1e1cbf772baabd1af0
SHA5129550a823dd088e49279bf863a3ec615e62dc3332231ad81dd8b2cdb437c777038f42f8c551a4703aa352048f9eaf113051a4ac5679c43f60a5ab29b733f8feb5
-
Filesize
319KB
MD5bdfde190d629a122887baafb6e502882
SHA13117e6c9318df8ffc275e27a0743031810f1c257
SHA256e6ecacde47c13d54b20e87022e7b2f8e29207d9a1199e3b45b349d04251fd02f
SHA5123c27ade4bc0e1ab38e823e2f4e2de181704fb3ec6ba2215d8a76970919e4a3aa29a7542649900d7f466b520a759061ea4c067a446225c448b6f6b43f0a667b04
-
Filesize
319KB
MD5bdfde190d629a122887baafb6e502882
SHA13117e6c9318df8ffc275e27a0743031810f1c257
SHA256e6ecacde47c13d54b20e87022e7b2f8e29207d9a1199e3b45b349d04251fd02f
SHA5123c27ade4bc0e1ab38e823e2f4e2de181704fb3ec6ba2215d8a76970919e4a3aa29a7542649900d7f466b520a759061ea4c067a446225c448b6f6b43f0a667b04