Analysis
-
max time kernel
54s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe
Resource
win10v2004-20230220-en
General
-
Target
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe
-
Size
665KB
-
MD5
19863ecb232b3715e065ac78b562cd08
-
SHA1
666b8eab387f26ea5988f2c90bb0b795d223154f
-
SHA256
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751
-
SHA512
ebc8d56bb568a558c70b13d7ce47465bff24602360efdee6637b06b528b0d37b03c949f37331612ecbd95e0e13adfdc4cb008547c59a3e2a996db30455bebe90
-
SSDEEP
12288:KMr0y90xYg9WHHIfJraVvO4Z8XNuZ67grosNPp3KcSsrUT7E/w/Oe8G2Jo1uXX:KyyiG9maXNuYgfH6cSsriSw/Ozp21uXX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8858.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1784-194-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-195-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-197-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-199-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-201-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-203-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-205-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-207-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-209-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-211-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-213-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-215-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-217-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-219-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-221-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-223-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-225-0x0000000002830000-0x000000000286F000-memory.dmp family_redline behavioral1/memory/1784-227-0x0000000002830000-0x000000000286F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3200 un944525.exe 3212 pro8858.exe 1784 qu2498.exe 3972 si430911.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8858.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un944525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un944525.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3084 3212 WerFault.exe 83 4672 1784 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3212 pro8858.exe 3212 pro8858.exe 1784 qu2498.exe 1784 qu2498.exe 3972 si430911.exe 3972 si430911.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3212 pro8858.exe Token: SeDebugPrivilege 1784 qu2498.exe Token: SeDebugPrivilege 3972 si430911.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3200 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 82 PID 4616 wrote to memory of 3200 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 82 PID 4616 wrote to memory of 3200 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 82 PID 3200 wrote to memory of 3212 3200 un944525.exe 83 PID 3200 wrote to memory of 3212 3200 un944525.exe 83 PID 3200 wrote to memory of 3212 3200 un944525.exe 83 PID 3200 wrote to memory of 1784 3200 un944525.exe 90 PID 3200 wrote to memory of 1784 3200 un944525.exe 90 PID 3200 wrote to memory of 1784 3200 un944525.exe 90 PID 4616 wrote to memory of 3972 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 94 PID 4616 wrote to memory of 3972 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 94 PID 4616 wrote to memory of 3972 4616 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe"C:\Users\Admin\AppData\Local\Temp\01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944525.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8858.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 10644⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2498.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 13484⤵
- Program crash
PID:4672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si430911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si430911.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3212 -ip 32121⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1784 -ip 17841⤵PID:4504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD54f836542bb1b5df33ebd978ee56e05e3
SHA1c61093edfe7d17a417ab6f8dfe1f662d14c0aa71
SHA2561e1bab89398fa03fc80472c0af68f022bea87d4a6b2d2f17f271c0c2ed6bfc50
SHA512b814cd2d4bbb7525c8b319900d311f0ec4007b58f6dd8ac1eb7aa388a88f883814b59f9150d5c2b10961f2a9affa536f4caefc1c0c01730dbf23036b7dc2ffba
-
Filesize
176KB
MD54f836542bb1b5df33ebd978ee56e05e3
SHA1c61093edfe7d17a417ab6f8dfe1f662d14c0aa71
SHA2561e1bab89398fa03fc80472c0af68f022bea87d4a6b2d2f17f271c0c2ed6bfc50
SHA512b814cd2d4bbb7525c8b319900d311f0ec4007b58f6dd8ac1eb7aa388a88f883814b59f9150d5c2b10961f2a9affa536f4caefc1c0c01730dbf23036b7dc2ffba
-
Filesize
524KB
MD508571fce1fa0b00e67a02735059f8a11
SHA1ce1e35dba2bfde2dfc2885def5be67aaddad3dbb
SHA2566f29d979f8f8f6009f54b4d3b7580c60f2ab787514e6892f3df039a154c101f7
SHA512fea7e22d9a0ff0f20b7f92a7a7694046f2dca9914f64dd5be7ec199861bc0778f1c0713a7acef99bc2880be2d978ffa6fdcb8b8bbc2c3ac250318e952e9352ba
-
Filesize
524KB
MD508571fce1fa0b00e67a02735059f8a11
SHA1ce1e35dba2bfde2dfc2885def5be67aaddad3dbb
SHA2566f29d979f8f8f6009f54b4d3b7580c60f2ab787514e6892f3df039a154c101f7
SHA512fea7e22d9a0ff0f20b7f92a7a7694046f2dca9914f64dd5be7ec199861bc0778f1c0713a7acef99bc2880be2d978ffa6fdcb8b8bbc2c3ac250318e952e9352ba
-
Filesize
294KB
MD58113d19814223eff2576327d4a26fbda
SHA1224cfb28164f43b232d4d937a302e99222d7ae37
SHA25676c00da1904189b09f5c44238429e816232c1445822b26405dc4a3f6d47c5f0c
SHA512b33fc6c9834df0c29c5d90166c4e41f41f83cfaf38eb66f022265f0c29ab0272124dc0e51a919257ece13795df15405d42783e62461dbb8d5e76255d9e2f9722
-
Filesize
294KB
MD58113d19814223eff2576327d4a26fbda
SHA1224cfb28164f43b232d4d937a302e99222d7ae37
SHA25676c00da1904189b09f5c44238429e816232c1445822b26405dc4a3f6d47c5f0c
SHA512b33fc6c9834df0c29c5d90166c4e41f41f83cfaf38eb66f022265f0c29ab0272124dc0e51a919257ece13795df15405d42783e62461dbb8d5e76255d9e2f9722
-
Filesize
352KB
MD51f1807e74abb3357b26004afd8ed1a60
SHA15cdbc4f5fc10e3d6ece88de86dba99a7510a12f7
SHA256584a3323e20082d83dab4052a0f2e70b0cb56e5f3d6ceaec06d7f5e1a2776b9f
SHA5126a67f32ff0851d2d39371450763f35e971d531ba550bbca59fa262d01e6a2af6ebb70edefe2e67e046c97da095f1e9dcdc02ba6f7be2d9c3e14f987154374b5c
-
Filesize
352KB
MD51f1807e74abb3357b26004afd8ed1a60
SHA15cdbc4f5fc10e3d6ece88de86dba99a7510a12f7
SHA256584a3323e20082d83dab4052a0f2e70b0cb56e5f3d6ceaec06d7f5e1a2776b9f
SHA5126a67f32ff0851d2d39371450763f35e971d531ba550bbca59fa262d01e6a2af6ebb70edefe2e67e046c97da095f1e9dcdc02ba6f7be2d9c3e14f987154374b5c