Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 16:14
Static task
static1
Behavioral task
behavioral1
Sample
d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe
Resource
win10v2004-20230220-en
General
-
Target
d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe
-
Size
660KB
-
MD5
08dd335f7dd111143cc3afe69787b2cb
-
SHA1
9cf8ebff2cdbc12980820c252a9a8435b628b70c
-
SHA256
d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db
-
SHA512
e8268292f2ec64ac3c40750610c2b6203eb0e36823e36d41b391ebc7a119ae58cd49cb9a15e8b1af210896f5b34a1b3a4308c689f2a6db88b96f9185b90818e6
-
SSDEEP
12288:1Mrmy90v6/vIlhXbNp0DTfh11cyZeq79/GOWKjpQoqBiynePlL6:PyhyrNaZvp79+81QD1sc
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3900-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/3900-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4424 un428947.exe 4696 pro1282.exe 3900 qu1646.exe 4880 si406616.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1282.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un428947.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un428947.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3096 4696 WerFault.exe 84 3648 3900 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4696 pro1282.exe 4696 pro1282.exe 3900 qu1646.exe 3900 qu1646.exe 4880 si406616.exe 4880 si406616.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4696 pro1282.exe Token: SeDebugPrivilege 3900 qu1646.exe Token: SeDebugPrivilege 4880 si406616.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4424 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 83 PID 1724 wrote to memory of 4424 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 83 PID 1724 wrote to memory of 4424 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 83 PID 4424 wrote to memory of 4696 4424 un428947.exe 84 PID 4424 wrote to memory of 4696 4424 un428947.exe 84 PID 4424 wrote to memory of 4696 4424 un428947.exe 84 PID 4424 wrote to memory of 3900 4424 un428947.exe 93 PID 4424 wrote to memory of 3900 4424 un428947.exe 93 PID 4424 wrote to memory of 3900 4424 un428947.exe 93 PID 1724 wrote to memory of 4880 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 98 PID 1724 wrote to memory of 4880 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 98 PID 1724 wrote to memory of 4880 1724 d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe"C:\Users\Admin\AppData\Local\Temp\d0604b0302f80bb29b25cc8427c711beb9d9ffb552de6cdb29a27500b72327db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un428947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un428947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1282.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 10844⤵
- Program crash
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1646.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1646.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 13524⤵
- Program crash
PID:3648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406616.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4696 -ip 46961⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3900 -ip 39001⤵PID:240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b0dccfd58ca99210efff800e5ad14a38
SHA1d5c1adfd63866158e2b3db1602887d83fd22902a
SHA256b7b0de59eaba152c24aae48fad120e98048366ef4ce77e543166389b0b76523d
SHA512effb6f579358b718f54c92237b470a538f4d60c9d6fe8cd3523ffbb35e81de05502948ac50a3f9b33d703fab03ea310ab6b6440391a81bcf359b5b80c29a7de6
-
Filesize
175KB
MD5b0dccfd58ca99210efff800e5ad14a38
SHA1d5c1adfd63866158e2b3db1602887d83fd22902a
SHA256b7b0de59eaba152c24aae48fad120e98048366ef4ce77e543166389b0b76523d
SHA512effb6f579358b718f54c92237b470a538f4d60c9d6fe8cd3523ffbb35e81de05502948ac50a3f9b33d703fab03ea310ab6b6440391a81bcf359b5b80c29a7de6
-
Filesize
518KB
MD5ba909f159c89f552148f0869ede75285
SHA16aff0c17aaef5226f7edc136d84a860cf9f19278
SHA256fa7d791e621624e5c552abf44ddc222684a440192936ec981a4eca7912a857c7
SHA51262e67ead810422fa65f5ff4468f73315c49497f58c8b0f4201f30eabd7ff0c5338d2aafb54d0e7ce317091a60a423daa943af220bc4e5480dfeef03ef0cefa75
-
Filesize
518KB
MD5ba909f159c89f552148f0869ede75285
SHA16aff0c17aaef5226f7edc136d84a860cf9f19278
SHA256fa7d791e621624e5c552abf44ddc222684a440192936ec981a4eca7912a857c7
SHA51262e67ead810422fa65f5ff4468f73315c49497f58c8b0f4201f30eabd7ff0c5338d2aafb54d0e7ce317091a60a423daa943af220bc4e5480dfeef03ef0cefa75
-
Filesize
295KB
MD51aa65b005abbd83e1223e339cac94b95
SHA17afd929beee005240d7feb83c86979cf55c39381
SHA256b24bbf29383ed20c471b8a3501f115cb4e03a90927c1c25838a171df03e47c1f
SHA5125fff19c5d1b45c36f6e5e0d71981e975b34ecff64926d47a1a0be4acfa9ee404edef0a3f8d44a74c9e8d7a9f9f1fd80d491fc5fed5d3308cc13498598e11d628
-
Filesize
295KB
MD51aa65b005abbd83e1223e339cac94b95
SHA17afd929beee005240d7feb83c86979cf55c39381
SHA256b24bbf29383ed20c471b8a3501f115cb4e03a90927c1c25838a171df03e47c1f
SHA5125fff19c5d1b45c36f6e5e0d71981e975b34ecff64926d47a1a0be4acfa9ee404edef0a3f8d44a74c9e8d7a9f9f1fd80d491fc5fed5d3308cc13498598e11d628
-
Filesize
354KB
MD59049f7d6effd9c45c67ee587c175a336
SHA12cd38dbe695a96a4f40f1b451aa397ceb956e583
SHA256a620fc53adb8c04ff41a22b0490413d2c4f947d50e6e7fe329f65382f43eccb5
SHA512ca6371c8eff081dfd8592f32c0b524c1038c0bdb7f3376ff5f0f53921239aa49cf708bb2328535ba7093525cc54a824001a983cef7d280f28d863cacc198fe41
-
Filesize
354KB
MD59049f7d6effd9c45c67ee587c175a336
SHA12cd38dbe695a96a4f40f1b451aa397ceb956e583
SHA256a620fc53adb8c04ff41a22b0490413d2c4f947d50e6e7fe329f65382f43eccb5
SHA512ca6371c8eff081dfd8592f32c0b524c1038c0bdb7f3376ff5f0f53921239aa49cf708bb2328535ba7093525cc54a824001a983cef7d280f28d863cacc198fe41