Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe
Resource
win10v2004-20230220-en
General
-
Target
593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe
-
Size
674KB
-
MD5
558e822314c4f1f033c0f0b26bab014e
-
SHA1
9fdb0180af6b46f5d702661f0a7f7fa9e49e67b2
-
SHA256
593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33
-
SHA512
7ceea6ff11cac315ec64f9ef878913d4c3ac6f0769a12e92285330f6f4587356b9c66a2ccf0f07cb4fd0af885d0cf2632fbc4a7be331f21b71d7d64431f18b6b
-
SSDEEP
12288:QMrGy90c1Vp3J6emgzFQJAiaA/4nDDD7ex1vuZuXe42x4pbmlaZjA:Gy/3k5gzWyE4a6X42OjA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1238.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4040-190-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-189-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-192-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-194-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-196-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-198-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-203-0x0000000006B70000-0x0000000006B80000-memory.dmp family_redline behavioral1/memory/4040-206-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-202-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-208-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-210-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-212-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-214-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-216-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-218-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-220-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-222-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-224-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4040-226-0x0000000004310000-0x000000000434F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4680 un904772.exe 4504 pro1238.exe 4040 qu6363.exe 1712 si839680.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1238.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un904772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904772.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4952 4504 WerFault.exe 85 4144 4040 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 pro1238.exe 4504 pro1238.exe 4040 qu6363.exe 4040 qu6363.exe 1712 si839680.exe 1712 si839680.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 pro1238.exe Token: SeDebugPrivilege 4040 qu6363.exe Token: SeDebugPrivilege 1712 si839680.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4680 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 84 PID 4944 wrote to memory of 4680 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 84 PID 4944 wrote to memory of 4680 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 84 PID 4680 wrote to memory of 4504 4680 un904772.exe 85 PID 4680 wrote to memory of 4504 4680 un904772.exe 85 PID 4680 wrote to memory of 4504 4680 un904772.exe 85 PID 4680 wrote to memory of 4040 4680 un904772.exe 91 PID 4680 wrote to memory of 4040 4680 un904772.exe 91 PID 4680 wrote to memory of 4040 4680 un904772.exe 91 PID 4944 wrote to memory of 1712 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 95 PID 4944 wrote to memory of 1712 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 95 PID 4944 wrote to memory of 1712 4944 593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe"C:\Users\Admin\AppData\Local\Temp\593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 10804⤵
- Program crash
PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 10924⤵
- Program crash
PID:4144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4504 -ip 45041⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4040 -ip 40401⤵PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD54d2a7a55cb45b0d5e8fba3141ad7ccce
SHA1a140fbd253451efa0ef34c0832bd6bdef6fe61fa
SHA256890819d8d09c6c163930a8fea3477263f75cae37e97650bab7551402bdb0e2a2
SHA5120daf7f6e61c7c48bfb8bf5f0ef8f3aaebbad0d2656918cdc7a8c88a3f24b28d22fae8a8ff32b1d2b59b6a3d4e182986d44b040392a2138488464099cae01d72d
-
Filesize
176KB
MD54d2a7a55cb45b0d5e8fba3141ad7ccce
SHA1a140fbd253451efa0ef34c0832bd6bdef6fe61fa
SHA256890819d8d09c6c163930a8fea3477263f75cae37e97650bab7551402bdb0e2a2
SHA5120daf7f6e61c7c48bfb8bf5f0ef8f3aaebbad0d2656918cdc7a8c88a3f24b28d22fae8a8ff32b1d2b59b6a3d4e182986d44b040392a2138488464099cae01d72d
-
Filesize
533KB
MD50dbc041b0561b414966283cfc4a5410f
SHA19c6ae099a5d6f4d17c997d5a398653af6d1e3136
SHA2562fec590f230c1eb8a20395d952c2d0025210518e8ee96ac36aca5cc1bf48e39d
SHA512882ae1fc7d3dede38e25a7cb2b86147567f0515004c2193b6285143d354671236e5147d79ff0a1158306845f64f1d5041965dc451d6d2ee8c1a562b48a0db9ee
-
Filesize
533KB
MD50dbc041b0561b414966283cfc4a5410f
SHA19c6ae099a5d6f4d17c997d5a398653af6d1e3136
SHA2562fec590f230c1eb8a20395d952c2d0025210518e8ee96ac36aca5cc1bf48e39d
SHA512882ae1fc7d3dede38e25a7cb2b86147567f0515004c2193b6285143d354671236e5147d79ff0a1158306845f64f1d5041965dc451d6d2ee8c1a562b48a0db9ee
-
Filesize
376KB
MD58a78cf7903a4dc4152b1f0d5d78bced2
SHA187a17f9c9cad2283fabb01ca695adcc4f563d5a5
SHA2567bad83485668b359d589dbfc8a19457cd03a969ddc40a20ecc08a4c0eef62a89
SHA512c1f5c6117b706ea48e0a87fc34c11ff0e4d6f47468c83200e1c0fe1255971708d9795b91837b4a348a5c6972c8d1fd59f60acb73bbd2011d9c1957f3671ecac5
-
Filesize
376KB
MD58a78cf7903a4dc4152b1f0d5d78bced2
SHA187a17f9c9cad2283fabb01ca695adcc4f563d5a5
SHA2567bad83485668b359d589dbfc8a19457cd03a969ddc40a20ecc08a4c0eef62a89
SHA512c1f5c6117b706ea48e0a87fc34c11ff0e4d6f47468c83200e1c0fe1255971708d9795b91837b4a348a5c6972c8d1fd59f60acb73bbd2011d9c1957f3671ecac5
-
Filesize
435KB
MD5c41aaeae7eda7e75176e14bc66ce5ee5
SHA1c738b92fc2ba455de8c3064572811e0a834e3a82
SHA2562723af96e45e90514bc243b45263ac2205b258f6393f1020de497a619f9c480f
SHA512664130bbd28ec7b3c8d4371ac4d5b0ff6a1556ae21737d5644c0e1e1c33edefd5cf7487b919ea065ef4095abc3cbb4ede3a1cbf6ce8daff9d35fbf5b450c83c5
-
Filesize
435KB
MD5c41aaeae7eda7e75176e14bc66ce5ee5
SHA1c738b92fc2ba455de8c3064572811e0a834e3a82
SHA2562723af96e45e90514bc243b45263ac2205b258f6393f1020de497a619f9c480f
SHA512664130bbd28ec7b3c8d4371ac4d5b0ff6a1556ae21737d5644c0e1e1c33edefd5cf7487b919ea065ef4095abc3cbb4ede3a1cbf6ce8daff9d35fbf5b450c83c5