Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe
Resource
win10v2004-20230220-en
General
-
Target
8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe
-
Size
659KB
-
MD5
ff30b79ef9841cb9ebe8bd36088a2558
-
SHA1
f199a515544fc281fc43babe42d1f23a8a702abe
-
SHA256
8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d
-
SHA512
9f8837d51cc453e8304a16d9ae6cba588e6592e5b4822d3235f97a9baea3378def20896c05b071f51b5071c6b165b8bb4cab307e4d2f9266da6cbe8d4bc8d4bf
-
SSDEEP
12288:CMrsy90jnfW2saH/3fEprCPGFcF5b895R+ERZxbidkYOk:iyY+Bm/8pr2Fp81+ERzRYx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4444-191-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-192-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-194-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-196-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-198-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-200-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-202-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-204-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-206-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-209-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-213-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-216-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-218-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-220-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-222-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-224-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-226-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4444-228-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 684 un461064.exe 2116 pro6757.exe 4444 qu2839.exe 2912 si864144.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6757.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un461064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un461064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3352 2116 WerFault.exe 85 3220 4444 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2116 pro6757.exe 2116 pro6757.exe 4444 qu2839.exe 4444 qu2839.exe 2912 si864144.exe 2912 si864144.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 pro6757.exe Token: SeDebugPrivilege 4444 qu2839.exe Token: SeDebugPrivilege 2912 si864144.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3664 wrote to memory of 684 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 84 PID 3664 wrote to memory of 684 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 84 PID 3664 wrote to memory of 684 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 84 PID 684 wrote to memory of 2116 684 un461064.exe 85 PID 684 wrote to memory of 2116 684 un461064.exe 85 PID 684 wrote to memory of 2116 684 un461064.exe 85 PID 684 wrote to memory of 4444 684 un461064.exe 91 PID 684 wrote to memory of 4444 684 un461064.exe 91 PID 684 wrote to memory of 4444 684 un461064.exe 91 PID 3664 wrote to memory of 2912 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 99 PID 3664 wrote to memory of 2912 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 99 PID 3664 wrote to memory of 2912 3664 8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe"C:\Users\Admin\AppData\Local\Temp\8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 10924⤵
- Program crash
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 13524⤵
- Program crash
PID:3220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2116 -ip 21161⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4444 -ip 44441⤵PID:4512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e2e78efc2197c412510301f8957d9b4a
SHA192ded2a3b2c11d0247e78f86e3b7301e45606642
SHA25645d43b1269fe20d173c50b946991aa0a67d37537df69ecf75bd1d93ead34576b
SHA512ae90b86c568a20ae9558c41e5fd0cc1f832da1930858a0e798b8c9ae87bbacdc9ebd74ef35bd00fbdd30ab40ce083fcfc367ff2d00d3688984bf0e9dab3aff8a
-
Filesize
175KB
MD5e2e78efc2197c412510301f8957d9b4a
SHA192ded2a3b2c11d0247e78f86e3b7301e45606642
SHA25645d43b1269fe20d173c50b946991aa0a67d37537df69ecf75bd1d93ead34576b
SHA512ae90b86c568a20ae9558c41e5fd0cc1f832da1930858a0e798b8c9ae87bbacdc9ebd74ef35bd00fbdd30ab40ce083fcfc367ff2d00d3688984bf0e9dab3aff8a
-
Filesize
517KB
MD5f73d1abcb34d7f502b3dd2b3b3905f52
SHA19cbd4fc8ad8221aee4afa7546da7fcb2764b0d5a
SHA256a862a0783d734bf7ee4bda813da5e8dfcb26d47ef7127569ed3d4f57cbc879d9
SHA512a1542ff372709b32a1535f241b4e6c643d16d055b715727da5a01bc617914043e04036d01257b734434661dfd35ac5d21060f6418f3e04683d6a43f5a55f33d2
-
Filesize
517KB
MD5f73d1abcb34d7f502b3dd2b3b3905f52
SHA19cbd4fc8ad8221aee4afa7546da7fcb2764b0d5a
SHA256a862a0783d734bf7ee4bda813da5e8dfcb26d47ef7127569ed3d4f57cbc879d9
SHA512a1542ff372709b32a1535f241b4e6c643d16d055b715727da5a01bc617914043e04036d01257b734434661dfd35ac5d21060f6418f3e04683d6a43f5a55f33d2
-
Filesize
295KB
MD5c5e37682da56303fa4ba5f498f4bf506
SHA15cc882bd14b85027e5b0e153ed345024ea14df82
SHA256d11e44b2442bbb7bad441b0e437cad5ecf9875c4bd2822d5c7370750a7bb451c
SHA5122bd4ba53208c2364ba6bd956ad9811a420ed681271fbfbd59882aff413fd9bb379fb0f43eaa3f3fa196942a02b6a88c63ac845a50f845e568c845979b8c3524b
-
Filesize
295KB
MD5c5e37682da56303fa4ba5f498f4bf506
SHA15cc882bd14b85027e5b0e153ed345024ea14df82
SHA256d11e44b2442bbb7bad441b0e437cad5ecf9875c4bd2822d5c7370750a7bb451c
SHA5122bd4ba53208c2364ba6bd956ad9811a420ed681271fbfbd59882aff413fd9bb379fb0f43eaa3f3fa196942a02b6a88c63ac845a50f845e568c845979b8c3524b
-
Filesize
354KB
MD599592a108fb204dec38c366d8e7ecfb5
SHA1f334b36c7e46ebad2fca20436f128c2c90b1d39a
SHA2564d61d4a53ec0abafc16c51228bc1f890e76c28dc7b30edc399ab93d9c6f8758f
SHA5124574d56535ab0d4ae2445ff2e34de616211e1374888992e8faffa6b52a2eea125e48b8da5165ca8e9d1d2cca081d3cda799e1044ff5bbaa768676befc2a268a5
-
Filesize
354KB
MD599592a108fb204dec38c366d8e7ecfb5
SHA1f334b36c7e46ebad2fca20436f128c2c90b1d39a
SHA2564d61d4a53ec0abafc16c51228bc1f890e76c28dc7b30edc399ab93d9c6f8758f
SHA5124574d56535ab0d4ae2445ff2e34de616211e1374888992e8faffa6b52a2eea125e48b8da5165ca8e9d1d2cca081d3cda799e1044ff5bbaa768676befc2a268a5