Analysis
-
max time kernel
77s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe
Resource
win10v2004-20230220-en
General
-
Target
78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe
-
Size
658KB
-
MD5
1d7a7962f6a2f725e92f1313721477f0
-
SHA1
d72bef04603df37727a8bac1168a753192d4051d
-
SHA256
78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a
-
SHA512
5c91b10437068b174fed4b56e1d1e625206517cf4d0e0f54e748d0b28507f7515a6081736894b17746a3c39e30576c73184838a3b4148326492f3bc0174adc4a
-
SSDEEP
12288:7Mrsy90J9Tug+pEMMhxC2h4LfEvDYDPobp53cppwAjh+UtU3+:Ty69ivcxC2h4LWgAApZF+EUO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4036.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4036.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4064-191-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-194-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-196-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-198-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-200-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-202-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-204-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-206-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-209-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-214-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-216-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-218-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-220-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-222-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-224-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-226-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4064-228-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1768 un369310.exe 5068 pro4036.exe 4064 qu5962.exe 4560 si024984.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4036.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4036.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un369310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un369310.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 976 5068 WerFault.exe 85 1256 4064 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 pro4036.exe 5068 pro4036.exe 4064 qu5962.exe 4064 qu5962.exe 4560 si024984.exe 4560 si024984.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5068 pro4036.exe Token: SeDebugPrivilege 4064 qu5962.exe Token: SeDebugPrivilege 4560 si024984.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1768 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 84 PID 4112 wrote to memory of 1768 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 84 PID 4112 wrote to memory of 1768 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 84 PID 1768 wrote to memory of 5068 1768 un369310.exe 85 PID 1768 wrote to memory of 5068 1768 un369310.exe 85 PID 1768 wrote to memory of 5068 1768 un369310.exe 85 PID 1768 wrote to memory of 4064 1768 un369310.exe 89 PID 1768 wrote to memory of 4064 1768 un369310.exe 89 PID 1768 wrote to memory of 4064 1768 un369310.exe 89 PID 4112 wrote to memory of 4560 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 94 PID 4112 wrote to memory of 4560 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 94 PID 4112 wrote to memory of 4560 4112 78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe"C:\Users\Admin\AppData\Local\Temp\78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10844⤵
- Program crash
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 20804⤵
- Program crash
PID:1256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5068 -ip 50681⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4064 -ip 40641⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD565a7981530ae51aeec67dffccc79a3fa
SHA116f4d5c712f9669928a41ecaf26b9bf020a1a361
SHA256132ae5923f7abcd2044c1b3183ba711e6468a72ca1f44be563846eded7de821e
SHA5120b17204231f3f8203e9e3d8ad05b84c855e2b5deefdea00038ed035e3c554e5877d228da9fde0b93a02b338c0958cd2c5d3a98226b90f1c7bbfe420eecd76cce
-
Filesize
176KB
MD565a7981530ae51aeec67dffccc79a3fa
SHA116f4d5c712f9669928a41ecaf26b9bf020a1a361
SHA256132ae5923f7abcd2044c1b3183ba711e6468a72ca1f44be563846eded7de821e
SHA5120b17204231f3f8203e9e3d8ad05b84c855e2b5deefdea00038ed035e3c554e5877d228da9fde0b93a02b338c0958cd2c5d3a98226b90f1c7bbfe420eecd76cce
-
Filesize
516KB
MD527c4959e36b7ed3462810c9f71b25514
SHA1b260342abc7660a10b433b2fba27a46a04b5b0fa
SHA25684c0b78c0379bb2e079be3ff793a7a92e7a7874490b3b4e0fbebc1f5fe07847f
SHA5122029f0b9a03ec029686b06a27ed0fc35e08ec59b05b2024f8beff1c260ad71cbf2a345a64c736658f27d61e2a4f36f7966420685be4710e24da87cabcfae6e97
-
Filesize
516KB
MD527c4959e36b7ed3462810c9f71b25514
SHA1b260342abc7660a10b433b2fba27a46a04b5b0fa
SHA25684c0b78c0379bb2e079be3ff793a7a92e7a7874490b3b4e0fbebc1f5fe07847f
SHA5122029f0b9a03ec029686b06a27ed0fc35e08ec59b05b2024f8beff1c260ad71cbf2a345a64c736658f27d61e2a4f36f7966420685be4710e24da87cabcfae6e97
-
Filesize
283KB
MD5658e8e00a97ad7a1a109082429c44b12
SHA19d4a2e99de2f67f950b065663599bf2ddd95d4f8
SHA256828f6cde6835585e520e55cbc3f60398d7dcc92b93295277fd9cd7c90d697015
SHA51269bab207b4dd64defde605664f1d3f6f347832b151c21af08670d6b121e4897f67587f885dcd7d89585c2ec2371e452effbbc8efc36ca06fcc2c78ac05d1c859
-
Filesize
283KB
MD5658e8e00a97ad7a1a109082429c44b12
SHA19d4a2e99de2f67f950b065663599bf2ddd95d4f8
SHA256828f6cde6835585e520e55cbc3f60398d7dcc92b93295277fd9cd7c90d697015
SHA51269bab207b4dd64defde605664f1d3f6f347832b151c21af08670d6b121e4897f67587f885dcd7d89585c2ec2371e452effbbc8efc36ca06fcc2c78ac05d1c859
-
Filesize
342KB
MD5a600060a5246cfb74b7f64ef6c77e8f7
SHA1a0f94b1b14968ed611baad953340691de901cdd3
SHA256044da26562d9dc30a5527f3616e97f4176c6167eeab6e050638c1344a7cbcf2a
SHA5120107b8874c1e63d4ce9bd145e99ea1477337c9c1e5c5c4dca675b5dd6e25dfd73f5850c91d2b1f8766bb38bb19f569aa1ef069b1e57e5f9392e214a4ac473586
-
Filesize
342KB
MD5a600060a5246cfb74b7f64ef6c77e8f7
SHA1a0f94b1b14968ed611baad953340691de901cdd3
SHA256044da26562d9dc30a5527f3616e97f4176c6167eeab6e050638c1344a7cbcf2a
SHA5120107b8874c1e63d4ce9bd145e99ea1477337c9c1e5c5c4dca675b5dd6e25dfd73f5850c91d2b1f8766bb38bb19f569aa1ef069b1e57e5f9392e214a4ac473586