Analysis
-
max time kernel
87s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 13:51
Static task
static1
Behavioral task
behavioral1
Sample
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe
Resource
win10v2004-20230220-en
General
-
Target
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe
-
Size
659KB
-
MD5
e8db902e73ef89a32af27d90f7c85036
-
SHA1
add72b2ecbb83f5120fb4ff75a7c59debfb917b2
-
SHA256
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32
-
SHA512
23fa4d3d467b8ecbd8c65b2958c6122fbfbf48d6c1c34e96ac213c60543a37d442772b7b423cc8fcdd48b7a9d5c3d8b89367a010b96afbddb5b7036e8905a902
-
SSDEEP
12288:bMryy90pSqfL5Kk2O+B8XulUAXxbKjoQoqBijir/FCSIi3:tyySj5+XulpkEQDf9gi3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0394.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0394.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4420-188-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-187-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-190-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-192-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-194-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-196-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-198-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-202-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-200-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-204-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-206-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-211-0x00000000049C0000-0x00000000049D0000-memory.dmp family_redline behavioral1/memory/4420-212-0x00000000049C0000-0x00000000049D0000-memory.dmp family_redline behavioral1/memory/4420-210-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-209-0x00000000049C0000-0x00000000049D0000-memory.dmp family_redline behavioral1/memory/4420-214-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-216-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-218-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-220-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-222-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline behavioral1/memory/4420-224-0x00000000076F0000-0x000000000772F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1504 un367715.exe 5056 pro0394.exe 4420 qu4142.exe 4968 si738352.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0394.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un367715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367715.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5000 5056 WerFault.exe 84 1572 4420 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5056 pro0394.exe 5056 pro0394.exe 4420 qu4142.exe 4420 qu4142.exe 4968 si738352.exe 4968 si738352.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5056 pro0394.exe Token: SeDebugPrivilege 4420 qu4142.exe Token: SeDebugPrivilege 4968 si738352.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1504 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 83 PID 4524 wrote to memory of 1504 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 83 PID 4524 wrote to memory of 1504 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 83 PID 1504 wrote to memory of 5056 1504 un367715.exe 84 PID 1504 wrote to memory of 5056 1504 un367715.exe 84 PID 1504 wrote to memory of 5056 1504 un367715.exe 84 PID 1504 wrote to memory of 4420 1504 un367715.exe 90 PID 1504 wrote to memory of 4420 1504 un367715.exe 90 PID 1504 wrote to memory of 4420 1504 un367715.exe 90 PID 4524 wrote to memory of 4968 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 94 PID 4524 wrote to memory of 4968 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 94 PID 4524 wrote to memory of 4968 4524 95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe"C:\Users\Admin\AppData\Local\Temp\95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367715.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367715.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0394.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10764⤵
- Program crash
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4142.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4142.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 13484⤵
- Program crash
PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si738352.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si738352.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5056 -ip 50561⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4420 -ip 44201⤵PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d0dea9899398159ad2e7a8a392c9482d
SHA13ffb068db0c9faa26129c4c315ff7c436c5dded6
SHA2560e787d722bf3055e07b3327c9cf042435ac6c6f6dbf0d5c08ec5267d4d4d8a7f
SHA5122a6389d0af2f2b8cb1c34daf8eabb4cccaee3dfc4003b6d47c81d18bb2f151194afbe6b016fd7c50895e37d860837bb23882d8312fd4a3acff1bd072d2835249
-
Filesize
175KB
MD5d0dea9899398159ad2e7a8a392c9482d
SHA13ffb068db0c9faa26129c4c315ff7c436c5dded6
SHA2560e787d722bf3055e07b3327c9cf042435ac6c6f6dbf0d5c08ec5267d4d4d8a7f
SHA5122a6389d0af2f2b8cb1c34daf8eabb4cccaee3dfc4003b6d47c81d18bb2f151194afbe6b016fd7c50895e37d860837bb23882d8312fd4a3acff1bd072d2835249
-
Filesize
517KB
MD5e672fefd10484a9c22cf0d5fb8e61fbb
SHA1a4d88f2255957ceaf69a716e4fda828f5967903f
SHA256b12d62d0a75335d70e65a625a36da9e253784cde371b97f6537925ad796fa267
SHA5127799834357960e179e573756c45fa26c5e3952a2f5f493e29b52188c4433816847d4adbca61a655e58a060792bcdd42c757a66e3068b125cb0631925ff0df4a3
-
Filesize
517KB
MD5e672fefd10484a9c22cf0d5fb8e61fbb
SHA1a4d88f2255957ceaf69a716e4fda828f5967903f
SHA256b12d62d0a75335d70e65a625a36da9e253784cde371b97f6537925ad796fa267
SHA5127799834357960e179e573756c45fa26c5e3952a2f5f493e29b52188c4433816847d4adbca61a655e58a060792bcdd42c757a66e3068b125cb0631925ff0df4a3
-
Filesize
295KB
MD518d71cf6ffab85748fb91cec330a7e96
SHA1f19c3a5ebfe735ec1220c8ef86493dc37feb5520
SHA256f97a512a903b0d6bf044fc9b35a0ce79896b2f493e6b9995f8cbd232497d0cee
SHA5126f9e0f4f4066d98ac151031e4240728fd4fef902c80093b303227fea281be2d4eafd38ad018c5b73b5e3dab8ee9b52697d617c9a416559ae0474a6283a20d649
-
Filesize
295KB
MD518d71cf6ffab85748fb91cec330a7e96
SHA1f19c3a5ebfe735ec1220c8ef86493dc37feb5520
SHA256f97a512a903b0d6bf044fc9b35a0ce79896b2f493e6b9995f8cbd232497d0cee
SHA5126f9e0f4f4066d98ac151031e4240728fd4fef902c80093b303227fea281be2d4eafd38ad018c5b73b5e3dab8ee9b52697d617c9a416559ae0474a6283a20d649
-
Filesize
354KB
MD5f7734a7e11c47cdcdf483d5984bd1b36
SHA1b15d24c1ed03cafa498620a1352d2ce0a80f30d3
SHA256cb6b586ab0c55f4cde87a05063a74562599e1f1b6c334a34c5ebfd13f1007b67
SHA5125bcd32bbb85a50cbcdbaa8f4561df653af6e67bfbe9f78d0071aab4e1b90ca9cbb321644104360504d3fa90635fcd33e28a20322abed16ebb93e0402bbce3ada
-
Filesize
354KB
MD5f7734a7e11c47cdcdf483d5984bd1b36
SHA1b15d24c1ed03cafa498620a1352d2ce0a80f30d3
SHA256cb6b586ab0c55f4cde87a05063a74562599e1f1b6c334a34c5ebfd13f1007b67
SHA5125bcd32bbb85a50cbcdbaa8f4561df653af6e67bfbe9f78d0071aab4e1b90ca9cbb321644104360504d3fa90635fcd33e28a20322abed16ebb93e0402bbce3ada