Analysis
-
max time kernel
61s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 21:00
Static task
static1
Behavioral task
behavioral1
Sample
3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe
Resource
win10v2004-20230220-en
General
-
Target
3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe
-
Size
658KB
-
MD5
17d182e0c3296e368f6734798698f528
-
SHA1
f4b2e290d957cf6dc0a51d2f31d5d85e5132069f
-
SHA256
3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c
-
SHA512
3120087dd051849e7634080fa51543a995638700b88ab00202c40038684c55014208bc53b04b7a76eb6b4c12c0e1186b4f2078a8448b10fa4f98a75d84472cc2
-
SSDEEP
12288:AMr/y90YCg+b0HTZu9o5Ty68HpvCPGgBIHN+5h+EXZxJkQhI2JnLG4:Py5Cg+qT0a8HpvI+N4+EXzx62FG4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7808.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4728-192-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-194-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-197-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-199-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-201-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-203-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-205-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-207-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-209-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-211-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-213-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-215-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-217-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-219-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-221-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-223-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-225-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4728-227-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3744 un650967.exe 2948 pro7808.exe 4728 qu7398.exe 3704 si741116.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7808.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7808.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un650967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un650967.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4984 2948 WerFault.exe 84 2340 4728 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2948 pro7808.exe 2948 pro7808.exe 4728 qu7398.exe 4728 qu7398.exe 3704 si741116.exe 3704 si741116.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2948 pro7808.exe Token: SeDebugPrivilege 4728 qu7398.exe Token: SeDebugPrivilege 3704 si741116.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 540 wrote to memory of 3744 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 83 PID 540 wrote to memory of 3744 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 83 PID 540 wrote to memory of 3744 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 83 PID 3744 wrote to memory of 2948 3744 un650967.exe 84 PID 3744 wrote to memory of 2948 3744 un650967.exe 84 PID 3744 wrote to memory of 2948 3744 un650967.exe 84 PID 3744 wrote to memory of 4728 3744 un650967.exe 90 PID 3744 wrote to memory of 4728 3744 un650967.exe 90 PID 3744 wrote to memory of 4728 3744 un650967.exe 90 PID 540 wrote to memory of 3704 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 95 PID 540 wrote to memory of 3704 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 95 PID 540 wrote to memory of 3704 540 3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe"C:\Users\Admin\AppData\Local\Temp\3197e4e31539ef52e8efc5577ddb3e8af4be55db5331065d8c6180384207641c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650967.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7808.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 10884⤵
- Program crash
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7398.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 13484⤵
- Program crash
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si741116.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si741116.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2948 -ip 29481⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4728 -ip 47281⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56591863efa48535fd6fa9e4db182099c
SHA1f2ce20d931a38aff73b5ada8442e1d7bc1be9d43
SHA256330ea88303a14f0abd3cadf9e19cd5da38f5ce10044c8560c40b359e25bb8d71
SHA512c1f4516422d1e4ea6d1a4141d429300f43a8747a3a729ec9f7683fe2e812274f382bea7b524d607124715ec66c1a10f09cd6e6082fd9095985069e3f07071e12
-
Filesize
176KB
MD56591863efa48535fd6fa9e4db182099c
SHA1f2ce20d931a38aff73b5ada8442e1d7bc1be9d43
SHA256330ea88303a14f0abd3cadf9e19cd5da38f5ce10044c8560c40b359e25bb8d71
SHA512c1f4516422d1e4ea6d1a4141d429300f43a8747a3a729ec9f7683fe2e812274f382bea7b524d607124715ec66c1a10f09cd6e6082fd9095985069e3f07071e12
-
Filesize
516KB
MD540e12765b1e94986d8cfae791fc12eca
SHA1b5c1cd6e4fb02146935406781a6d4186b6e5342e
SHA2566076c680d248f4b832b0530c22219ad3dd7d6ac4b2b7a2322d63af20a499c38b
SHA512d536f975626383365be5680941d4c331fdb7a70d039541f589f5c481132495393987477b08d5e6b84722623d3a7df8fb3426750f34e3e96607fd4d92954a208f
-
Filesize
516KB
MD540e12765b1e94986d8cfae791fc12eca
SHA1b5c1cd6e4fb02146935406781a6d4186b6e5342e
SHA2566076c680d248f4b832b0530c22219ad3dd7d6ac4b2b7a2322d63af20a499c38b
SHA512d536f975626383365be5680941d4c331fdb7a70d039541f589f5c481132495393987477b08d5e6b84722623d3a7df8fb3426750f34e3e96607fd4d92954a208f
-
Filesize
295KB
MD5aaee6b0006073afa4c7a4d3335687ee4
SHA1bdcc78a0eb6e4e14a860bea91cdbe02038acbb10
SHA25688c8a660dafd7f0b05ad4ccc8ff3d4fe936c06d827f1a12ad02e5a12d4474579
SHA5129b46b8396e0d97956665ec34bd24aa79c9bb715b1c7de914c8b736f8eb84d5905d80f39e6535a92074029c5df6f54a0699d5cb2a8d369e2a8cf722937ee44c11
-
Filesize
295KB
MD5aaee6b0006073afa4c7a4d3335687ee4
SHA1bdcc78a0eb6e4e14a860bea91cdbe02038acbb10
SHA25688c8a660dafd7f0b05ad4ccc8ff3d4fe936c06d827f1a12ad02e5a12d4474579
SHA5129b46b8396e0d97956665ec34bd24aa79c9bb715b1c7de914c8b736f8eb84d5905d80f39e6535a92074029c5df6f54a0699d5cb2a8d369e2a8cf722937ee44c11
-
Filesize
354KB
MD5f9e6fcb284f0a294ddd7a8cbb391ed9c
SHA16a751f2f934c8cbb6cb083af93c37f171ac3feb2
SHA256f0d1997ff873a06d7918aa8c4633c29d75775656e4db7cd550b6c50f61362f9b
SHA51227c9463a4b12c1a164e6a6d48b00a42d3124fd56fe6f130749af95e8ed90c218012e5afda23114a22eaed6e74d86914d862080a4913d39248bf10789ee128726
-
Filesize
354KB
MD5f9e6fcb284f0a294ddd7a8cbb391ed9c
SHA16a751f2f934c8cbb6cb083af93c37f171ac3feb2
SHA256f0d1997ff873a06d7918aa8c4633c29d75775656e4db7cd550b6c50f61362f9b
SHA51227c9463a4b12c1a164e6a6d48b00a42d3124fd56fe6f130749af95e8ed90c218012e5afda23114a22eaed6e74d86914d862080a4913d39248bf10789ee128726