Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe
Resource
win10v2004-20230220-en
General
-
Target
943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe
-
Size
659KB
-
MD5
191571cca6c81a8bd1bc94a6e16e459c
-
SHA1
a83d2e01314beeacc884ec554175570e45aa8a00
-
SHA256
943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea
-
SHA512
19870ac3c246b9800d2f52bfbfef7ad09a9b57bb8cef0aab10d528b6fce3786362b3d41bddf21f9a9bbbbf4f1a2a26ce5282200a39ecc7ed2150b249d6e5ca91
-
SSDEEP
12288:kMr+y90pc4v4bpDWsGyanMQXTE+A1GlReLNT6tZbc3I1Hn5eaV5j:ay2B0JVvQI69bc3IZUaTj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8809.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8809.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8809.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8809.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8809.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8809.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1200-190-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-192-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-195-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-214-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-216-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-218-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-220-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1200-226-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4184 un735021.exe 1252 pro8809.exe 1200 qu3404.exe 1016 si453665.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8809.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8809.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un735021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un735021.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3664 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3680 1252 WerFault.exe 87 4796 1200 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1252 pro8809.exe 1252 pro8809.exe 1200 qu3404.exe 1200 qu3404.exe 1016 si453665.exe 1016 si453665.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1252 pro8809.exe Token: SeDebugPrivilege 1200 qu3404.exe Token: SeDebugPrivilege 1016 si453665.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4184 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 86 PID 1828 wrote to memory of 4184 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 86 PID 1828 wrote to memory of 4184 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 86 PID 4184 wrote to memory of 1252 4184 un735021.exe 87 PID 4184 wrote to memory of 1252 4184 un735021.exe 87 PID 4184 wrote to memory of 1252 4184 un735021.exe 87 PID 4184 wrote to memory of 1200 4184 un735021.exe 93 PID 4184 wrote to memory of 1200 4184 un735021.exe 93 PID 4184 wrote to memory of 1200 4184 un735021.exe 93 PID 1828 wrote to memory of 1016 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 97 PID 1828 wrote to memory of 1016 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 97 PID 1828 wrote to memory of 1016 1828 943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe"C:\Users\Admin\AppData\Local\Temp\943ff848b710db53d3a27ddcff3957c27867950f25bbaaa7eca1449c2f3362ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735021.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8809.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8809.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 10604⤵
- Program crash
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3404.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 13484⤵
- Program crash
PID:4796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si453665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si453665.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1252 -ip 12521⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1200 -ip 12001⤵PID:3764
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55e830ab92524263bfec035f2cddd313b
SHA1c2741fe4f4f00e2b577dd93ab3e38e73172e779a
SHA2565028e2f01baace339c285553c8e79254aafd8081a6def0b4bb708055b80ae087
SHA5120d3e55b3ffc3e1d33bfdca0a2c78dd752fbe4a9351fe667c432cf3113accf6ff2cf7d24ded48048e7c29af74e42ce8448e0c0f3e3b08d02dfe4e52ff5eb1bcd5
-
Filesize
175KB
MD55e830ab92524263bfec035f2cddd313b
SHA1c2741fe4f4f00e2b577dd93ab3e38e73172e779a
SHA2565028e2f01baace339c285553c8e79254aafd8081a6def0b4bb708055b80ae087
SHA5120d3e55b3ffc3e1d33bfdca0a2c78dd752fbe4a9351fe667c432cf3113accf6ff2cf7d24ded48048e7c29af74e42ce8448e0c0f3e3b08d02dfe4e52ff5eb1bcd5
-
Filesize
517KB
MD5ad35ab0f76abc2c3dabe726cc7c971b2
SHA12f43d53ee54815c2cc7882ee907e3ff7ce35098b
SHA2565c8ca42dd8348211d9f1f9b1f7b8d55ccea07ba3e2c6a516dc1a236f22e67c93
SHA5124edb52aa4de90abe562fb139b6c7e0f39d68dbcda6dcf54eef3883873864f219ea8c1baef6e71a223d6fc05bcf36e90e2ccf41ef4d67d670b1ffbaf34b976e4a
-
Filesize
517KB
MD5ad35ab0f76abc2c3dabe726cc7c971b2
SHA12f43d53ee54815c2cc7882ee907e3ff7ce35098b
SHA2565c8ca42dd8348211d9f1f9b1f7b8d55ccea07ba3e2c6a516dc1a236f22e67c93
SHA5124edb52aa4de90abe562fb139b6c7e0f39d68dbcda6dcf54eef3883873864f219ea8c1baef6e71a223d6fc05bcf36e90e2ccf41ef4d67d670b1ffbaf34b976e4a
-
Filesize
296KB
MD5b7debe2c64bdba6e0eb5bcab05494f28
SHA19dd5c0f0c6fdc47f2539fb3d9ed2e5de4280c8ca
SHA2564e9e5f60e311315f3a0a13deaa5573305d7fae85604d44c22aa17c7223430eed
SHA51212ad1c8b4f28437834fbd33f00874310969539ec7cd03bd69f7ad5928f10639b8c363d96e328549801f84a0b08670afcc821eeaf3d7ebc56ee72af6f684af556
-
Filesize
296KB
MD5b7debe2c64bdba6e0eb5bcab05494f28
SHA19dd5c0f0c6fdc47f2539fb3d9ed2e5de4280c8ca
SHA2564e9e5f60e311315f3a0a13deaa5573305d7fae85604d44c22aa17c7223430eed
SHA51212ad1c8b4f28437834fbd33f00874310969539ec7cd03bd69f7ad5928f10639b8c363d96e328549801f84a0b08670afcc821eeaf3d7ebc56ee72af6f684af556
-
Filesize
355KB
MD5c6a93f5eeb2c011ef3dffe1baea46b2b
SHA1baae4249bac97e5f9b4dee178298354df2631a78
SHA256782ace8208992e1427da72ec42a431f7aa0e568703ea117aa831211d7f8d55bd
SHA5120e38acbd5ba59a8ea31b19448921cffbb2618ee6adf910e804712d8cad0e3f150bb46bc5ad443e1cb428ad1d63752ffd7769e083d448893af560e3670d41717a
-
Filesize
355KB
MD5c6a93f5eeb2c011ef3dffe1baea46b2b
SHA1baae4249bac97e5f9b4dee178298354df2631a78
SHA256782ace8208992e1427da72ec42a431f7aa0e568703ea117aa831211d7f8d55bd
SHA5120e38acbd5ba59a8ea31b19448921cffbb2618ee6adf910e804712d8cad0e3f150bb46bc5ad443e1cb428ad1d63752ffd7769e083d448893af560e3670d41717a