Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 08:17
Static task
static1
Behavioral task
behavioral1
Sample
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe
Resource
win10v2004-20230220-en
General
-
Target
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe
-
Size
660KB
-
MD5
1ba6a1b0915311c4e862f47ab7f2a71b
-
SHA1
bb00f8b88f45a95987a1c1353318dbcda77db1b8
-
SHA256
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925
-
SHA512
3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc
-
SSDEEP
12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9050.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4480-191-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-193-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-190-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-195-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-197-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-199-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-201-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-203-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-205-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-207-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-209-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-211-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-213-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-215-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-217-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-219-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-221-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/4480-223-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1720 un116874.exe 4568 pro9050.exe 4480 qu4212.exe 2820 si078485.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9050.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un116874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un116874.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4768 4568 WerFault.exe 83 4484 4480 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4568 pro9050.exe 4568 pro9050.exe 4480 qu4212.exe 4480 qu4212.exe 2820 si078485.exe 2820 si078485.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4568 pro9050.exe Token: SeDebugPrivilege 4480 qu4212.exe Token: SeDebugPrivilege 2820 si078485.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1720 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 82 PID 4908 wrote to memory of 1720 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 82 PID 4908 wrote to memory of 1720 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 82 PID 1720 wrote to memory of 4568 1720 un116874.exe 83 PID 1720 wrote to memory of 4568 1720 un116874.exe 83 PID 1720 wrote to memory of 4568 1720 un116874.exe 83 PID 1720 wrote to memory of 4480 1720 un116874.exe 89 PID 1720 wrote to memory of 4480 1720 un116874.exe 89 PID 1720 wrote to memory of 4480 1720 un116874.exe 89 PID 4908 wrote to memory of 2820 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 93 PID 4908 wrote to memory of 2820 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 93 PID 4908 wrote to memory of 2820 4908 fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe"C:\Users\Admin\AppData\Local\Temp\fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 10844⤵
- Program crash
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 13484⤵
- Program crash
PID:4484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4568 -ip 45681⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4480 -ip 44801⤵PID:2568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD538a34534234e9df1e7bc495765f8816b
SHA19cdc80a19b50320ad0403576935611376ce30c68
SHA256f32d5d36978cca36d3d4659aac82a42fdf00e49d8dd6d637c3ea10c5a6a5ef97
SHA51207c4303c3b9754ab165ecb3f122f5e2bfa0520d859a503a94779f31a1d19ccbac2a82e5873f8a227bedbd4c0facc58f9b2efea1d278ac408abf3c421a9f3b2a9
-
Filesize
176KB
MD538a34534234e9df1e7bc495765f8816b
SHA19cdc80a19b50320ad0403576935611376ce30c68
SHA256f32d5d36978cca36d3d4659aac82a42fdf00e49d8dd6d637c3ea10c5a6a5ef97
SHA51207c4303c3b9754ab165ecb3f122f5e2bfa0520d859a503a94779f31a1d19ccbac2a82e5873f8a227bedbd4c0facc58f9b2efea1d278ac408abf3c421a9f3b2a9
-
Filesize
518KB
MD50c04af9baf085725714c1896a13bd619
SHA1d69787a0855b43e424d62a734ea3e940d9ae415b
SHA256746caa3882f592ce6cf83a38978c6e9e57974dfc6a051c5c425e675e37596239
SHA51217962c0e21dc0b0be0a3357b54bf6eb8ac0fe0e58020b1c086f240654550ed94fc7d01512505d86dd3ab72b2f9796c24fc03799773f21c48d9c472bb543d7a52
-
Filesize
518KB
MD50c04af9baf085725714c1896a13bd619
SHA1d69787a0855b43e424d62a734ea3e940d9ae415b
SHA256746caa3882f592ce6cf83a38978c6e9e57974dfc6a051c5c425e675e37596239
SHA51217962c0e21dc0b0be0a3357b54bf6eb8ac0fe0e58020b1c086f240654550ed94fc7d01512505d86dd3ab72b2f9796c24fc03799773f21c48d9c472bb543d7a52
-
Filesize
295KB
MD5593766a6806e3ab449508ff81e9c445c
SHA130054605828359582ce41f3d96318d7162911fd6
SHA256d02927fe9fa433415a8b564783390121be35f54854eada5a2bc3dafbe0d7abc4
SHA51241a72b43646a32fb983236bd015f0ea107aa84fcda8cd6e2366a285671e12038effa1044cfdf060eacc54fbddc847950e440b83665fa55379fb5360de7bc57f2
-
Filesize
295KB
MD5593766a6806e3ab449508ff81e9c445c
SHA130054605828359582ce41f3d96318d7162911fd6
SHA256d02927fe9fa433415a8b564783390121be35f54854eada5a2bc3dafbe0d7abc4
SHA51241a72b43646a32fb983236bd015f0ea107aa84fcda8cd6e2366a285671e12038effa1044cfdf060eacc54fbddc847950e440b83665fa55379fb5360de7bc57f2
-
Filesize
353KB
MD5747ec2d54b6b9b84e4353790bcbfd693
SHA11612b03961a27ba790b4b006d8ffc0e83e5734c0
SHA256017a80896e8047bf232a3fcb0aecb60f18a18b23583d488abb3500e57012da2c
SHA51251d94bf584d6a21df95d3163e895c167a89336271cef4e118c79fffbda23b7341cd0f526260bb67cc7d87eed1bd079f8d9cc662567a4101711c4e9b5114a8798
-
Filesize
353KB
MD5747ec2d54b6b9b84e4353790bcbfd693
SHA11612b03961a27ba790b4b006d8ffc0e83e5734c0
SHA256017a80896e8047bf232a3fcb0aecb60f18a18b23583d488abb3500e57012da2c
SHA51251d94bf584d6a21df95d3163e895c167a89336271cef4e118c79fffbda23b7341cd0f526260bb67cc7d87eed1bd079f8d9cc662567a4101711c4e9b5114a8798