Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 20:53
Static task
static1
Behavioral task
behavioral1
Sample
0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe
Resource
win10v2004-20230220-en
General
-
Target
0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe
-
Size
658KB
-
MD5
ad7760149daf7680e2c8cb43af744fd6
-
SHA1
0c2a9643f683b2d28c8edc665751058bbdb06ff4
-
SHA256
0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3
-
SHA512
e9d870987a51318ef110a0575cf8c8b03b0c8e4b17573d78fd42010ec7617dfc84566f32cab0e190f0a080effc797d9ed5c4c943138e4ee23f88b016c8c77607
-
SSDEEP
12288:NMrgy90q8oH2Y8DMSMFqPOpXCPGHc5HPtP+EjZxl/WnqzN6F:hyf8oHmSFZpX85HPB+EjztzNW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7262.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2368-191-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-193-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-196-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-200-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-202-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-204-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-206-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-208-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-212-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-214-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-210-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-216-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-218-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-220-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-222-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-224-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-226-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline behavioral1/memory/2368-228-0x0000000004B60000-0x0000000004B9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3548 un772743.exe 64 pro7262.exe 2368 qu7144.exe 4960 si371735.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7262.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un772743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un772743.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4112 64 WerFault.exe 83 2908 2368 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 64 pro7262.exe 64 pro7262.exe 2368 qu7144.exe 2368 qu7144.exe 4960 si371735.exe 4960 si371735.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 64 pro7262.exe Token: SeDebugPrivilege 2368 qu7144.exe Token: SeDebugPrivilege 4960 si371735.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3548 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 82 PID 4348 wrote to memory of 3548 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 82 PID 4348 wrote to memory of 3548 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 82 PID 3548 wrote to memory of 64 3548 un772743.exe 83 PID 3548 wrote to memory of 64 3548 un772743.exe 83 PID 3548 wrote to memory of 64 3548 un772743.exe 83 PID 3548 wrote to memory of 2368 3548 un772743.exe 88 PID 3548 wrote to memory of 2368 3548 un772743.exe 88 PID 3548 wrote to memory of 2368 3548 un772743.exe 88 PID 4348 wrote to memory of 4960 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 91 PID 4348 wrote to memory of 4960 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 91 PID 4348 wrote to memory of 4960 4348 0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe"C:\Users\Admin\AppData\Local\Temp\0cf148f824880b3c48752ef306578bd38103b5b237bee2f68add26b60cda04b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un772743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un772743.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7262.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7262.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 10804⤵
- Program crash
PID:4112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7144.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 15804⤵
- Program crash
PID:2908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si371735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si371735.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 64 -ip 641⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2368 -ip 23681⤵PID:3248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52e7e3347d94c4445b26224f56036bc5c
SHA198e48aae46289fd276e5e0128e06b443a3bb5b4b
SHA256cb991517ec94b81d19254a72dc9a1cb1690f7d2053cfd09b2493fb66ecdbf32d
SHA51287609b991e269ce4c1c25a68de0b610d985de43818b8b18abb863a2eecc5037741753cea69f9f5c6de9275f2d9151aa146fd3e6a5273f0451d7cb878e6cca571
-
Filesize
175KB
MD52e7e3347d94c4445b26224f56036bc5c
SHA198e48aae46289fd276e5e0128e06b443a3bb5b4b
SHA256cb991517ec94b81d19254a72dc9a1cb1690f7d2053cfd09b2493fb66ecdbf32d
SHA51287609b991e269ce4c1c25a68de0b610d985de43818b8b18abb863a2eecc5037741753cea69f9f5c6de9275f2d9151aa146fd3e6a5273f0451d7cb878e6cca571
-
Filesize
516KB
MD5281030fcd22f6c3a3aec26b52ca5efcb
SHA17f5601b5f69a69558c9ebc9bec1883b8558910fc
SHA256228779793f8ddd629bc6d92682dba152c211ae96211d78f597ccfec81877b96b
SHA512a0a4dae9d803df71f522b444c810cf85ce382ef0c89d7721d0c92adb15aa156085dd27a74133ff9e655ed8cf7841b968a7944b95cd3c66691c53d3635a208679
-
Filesize
516KB
MD5281030fcd22f6c3a3aec26b52ca5efcb
SHA17f5601b5f69a69558c9ebc9bec1883b8558910fc
SHA256228779793f8ddd629bc6d92682dba152c211ae96211d78f597ccfec81877b96b
SHA512a0a4dae9d803df71f522b444c810cf85ce382ef0c89d7721d0c92adb15aa156085dd27a74133ff9e655ed8cf7841b968a7944b95cd3c66691c53d3635a208679
-
Filesize
295KB
MD51c32d948100e95d3ad07e12d65a1ccc6
SHA18e101cfae7955ff77961d3c82092ef8af13a4e8c
SHA2568e7a3e2a29c87585921c50861ca3fed93cda78accba878cd4e1abaf034c7d740
SHA51287accafa91a44f282928627cdc7520e7cb6cb0d0f622bc95e69c91279c312073edd12ab15d820f8ec097cf8c1e3032db020709bfd2fd42fd05e18c23d8e07489
-
Filesize
295KB
MD51c32d948100e95d3ad07e12d65a1ccc6
SHA18e101cfae7955ff77961d3c82092ef8af13a4e8c
SHA2568e7a3e2a29c87585921c50861ca3fed93cda78accba878cd4e1abaf034c7d740
SHA51287accafa91a44f282928627cdc7520e7cb6cb0d0f622bc95e69c91279c312073edd12ab15d820f8ec097cf8c1e3032db020709bfd2fd42fd05e18c23d8e07489
-
Filesize
354KB
MD50576a0bee3a107e92643fe1e2981afa0
SHA13ecbf7c88934a78ed2e634abbd5e22bd27d9d826
SHA2565ff1cf6899b4666d170ea0c7f281ee8a763c3215ac04f0d703087ef0d38fd034
SHA512e6a43785c2b4ca5972a0f73bac80a4f4fed0fd1f05587af13dc568dbbb5123de419ebc9648daead8c42469c7cda4228b6171b0cb3d85125326ed942cc1080a13
-
Filesize
354KB
MD50576a0bee3a107e92643fe1e2981afa0
SHA13ecbf7c88934a78ed2e634abbd5e22bd27d9d826
SHA2565ff1cf6899b4666d170ea0c7f281ee8a763c3215ac04f0d703087ef0d38fd034
SHA512e6a43785c2b4ca5972a0f73bac80a4f4fed0fd1f05587af13dc568dbbb5123de419ebc9648daead8c42469c7cda4228b6171b0cb3d85125326ed942cc1080a13