Analysis
-
max time kernel
86s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 16:51
Static task
static1
Behavioral task
behavioral1
Sample
1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe
Resource
win10v2004-20230220-en
General
-
Target
1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe
-
Size
659KB
-
MD5
91ca0dec126c2a9701c5b7221488fdb1
-
SHA1
d5d641860b99931fbb3b8cce94bd45343267307e
-
SHA256
1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104
-
SHA512
44fc0cb4dc680d45b882fc3c28bfc34d273fec496058b81a28fe7ea49ad46812a50a9b46b349159d3391db75b77e830d2b4c3599aa4af5f27f08160188f3a81a
-
SSDEEP
12288:DMrEy90lOomXcA+wnYGDK9xDAclp+CPGCcT7TTes/J/+EAZxd3VopT:ryOEcA5YGjEp+1Tr3/1+EAzdWpT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2068.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3304-192-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-197-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-195-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline behavioral1/memory/3304-194-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-199-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-201-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-203-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-205-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-207-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-209-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-211-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-213-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-215-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-217-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-219-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-221-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-223-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-225-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline behavioral1/memory/3304-227-0x0000000007770000-0x00000000077AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1604 un592151.exe 648 pro2068.exe 3304 qu0292.exe 1260 si005711.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2068.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un592151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un592151.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1364 648 WerFault.exe 85 4068 3304 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 648 pro2068.exe 648 pro2068.exe 3304 qu0292.exe 3304 qu0292.exe 1260 si005711.exe 1260 si005711.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 648 pro2068.exe Token: SeDebugPrivilege 3304 qu0292.exe Token: SeDebugPrivilege 1260 si005711.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1604 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 84 PID 2680 wrote to memory of 1604 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 84 PID 2680 wrote to memory of 1604 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 84 PID 1604 wrote to memory of 648 1604 un592151.exe 85 PID 1604 wrote to memory of 648 1604 un592151.exe 85 PID 1604 wrote to memory of 648 1604 un592151.exe 85 PID 1604 wrote to memory of 3304 1604 un592151.exe 91 PID 1604 wrote to memory of 3304 1604 un592151.exe 91 PID 1604 wrote to memory of 3304 1604 un592151.exe 91 PID 2680 wrote to memory of 1260 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 96 PID 2680 wrote to memory of 1260 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 96 PID 2680 wrote to memory of 1260 2680 1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe"C:\Users\Admin\AppData\Local\Temp\1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 10804⤵
- Program crash
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 19564⤵
- Program crash
PID:4068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 648 -ip 6481⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3304 -ip 33041⤵PID:2524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d0b3b243a5aa1eec8c13e6d5512b1a40
SHA145e47eca15ee2cac5b1ec1dd1fbf44921051a4ed
SHA256990d98d9ed24cd25c99582494738808c113ff2c76ede90726fdd0be835390d7e
SHA5121c6e842cc17b6de8cdb33beb664ecd31bbed00de78683eac28454a226123802441a3a6c7c2e9099bf3d6ef9e9856b998786c1721802d528eab0c10d759443709
-
Filesize
175KB
MD5d0b3b243a5aa1eec8c13e6d5512b1a40
SHA145e47eca15ee2cac5b1ec1dd1fbf44921051a4ed
SHA256990d98d9ed24cd25c99582494738808c113ff2c76ede90726fdd0be835390d7e
SHA5121c6e842cc17b6de8cdb33beb664ecd31bbed00de78683eac28454a226123802441a3a6c7c2e9099bf3d6ef9e9856b998786c1721802d528eab0c10d759443709
-
Filesize
517KB
MD554c579e1f1cb5c288c81bc79a6352a09
SHA15f51445b1d24b33c41299ec1e90b82a3e0d21fc4
SHA2569ae0fe29a25fa3848a08a70cf41d440cd1b6c8d50a09e00b040cd5fc173e39a8
SHA5124b476cb32ccd8dc76aff00935e26d4f84f038f2869d32769764d51623c7b860d7b1fa4d3ac92f6b2ddb2b4f70261222edf6265678889beeefc606dc6aa841a4c
-
Filesize
517KB
MD554c579e1f1cb5c288c81bc79a6352a09
SHA15f51445b1d24b33c41299ec1e90b82a3e0d21fc4
SHA2569ae0fe29a25fa3848a08a70cf41d440cd1b6c8d50a09e00b040cd5fc173e39a8
SHA5124b476cb32ccd8dc76aff00935e26d4f84f038f2869d32769764d51623c7b860d7b1fa4d3ac92f6b2ddb2b4f70261222edf6265678889beeefc606dc6aa841a4c
-
Filesize
295KB
MD52236145da14026d5e53fcfbdf3a6bc06
SHA1e1eeae1be6f7e1be3b808a537d3ebf9748594c76
SHA256e526e7b710482cd1687fa631ae1f88a073f0500fdc0853649916738d7b83b727
SHA51216720a68def5255312842d475a7d9ef54505290b7255798cac5c192a0d6eec56396bde3aed7683f85a5c5303451059158d5549a7a520b3f2b3adace181750a0a
-
Filesize
295KB
MD52236145da14026d5e53fcfbdf3a6bc06
SHA1e1eeae1be6f7e1be3b808a537d3ebf9748594c76
SHA256e526e7b710482cd1687fa631ae1f88a073f0500fdc0853649916738d7b83b727
SHA51216720a68def5255312842d475a7d9ef54505290b7255798cac5c192a0d6eec56396bde3aed7683f85a5c5303451059158d5549a7a520b3f2b3adace181750a0a
-
Filesize
354KB
MD55ceb321a8803df67eae63007eb07f730
SHA15574ef7158cb0ee6d23dae0d393b3a3319e70130
SHA2561b853084bc19054729f3093c44da396501c37439a9e2fb6280264f9ff4b22700
SHA512a8a7b7c721ea12e1aa36894c888fd8868463b31ca2322c50cc1c2ac3f57ab432bc9b117fcf35221e75b1614b79af2ce7d7106f1c881d8206a3b485014e440503
-
Filesize
354KB
MD55ceb321a8803df67eae63007eb07f730
SHA15574ef7158cb0ee6d23dae0d393b3a3319e70130
SHA2561b853084bc19054729f3093c44da396501c37439a9e2fb6280264f9ff4b22700
SHA512a8a7b7c721ea12e1aa36894c888fd8868463b31ca2322c50cc1c2ac3f57ab432bc9b117fcf35221e75b1614b79af2ce7d7106f1c881d8206a3b485014e440503