Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe
Resource
win10v2004-20230221-en
General
-
Target
f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe
-
Size
659KB
-
MD5
00e06b8733fccf123e281a99f760382e
-
SHA1
36230f11049c1ac9d4a86ae20a9b6957231a8ecb
-
SHA256
f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d
-
SHA512
16c145d0b51feffe1c7f59fed3a4b1d5987c7c52913587b5ee35d8ca353d10632eb54f2ea787dc77f19f1d63903012ebaaa3ab328fcf8d35ed7e7970174fa78a
-
SSDEEP
12288:0MrOy90wb2bqhQdUXG3cVXu/3JL6mW18J2uOuRiAH:Ky/b41MV0eme8nyAH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1012.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1012.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/5028-191-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-192-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-198-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-196-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-214-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-216-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-218-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-220-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-222-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/5028-224-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2064 un755919.exe 2776 pro1012.exe 5028 qu2867.exe 4420 si320263.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1012.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un755919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un755919.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1476 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5100 2776 WerFault.exe 77 1128 5028 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2776 pro1012.exe 2776 pro1012.exe 5028 qu2867.exe 5028 qu2867.exe 4420 si320263.exe 4420 si320263.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2776 pro1012.exe Token: SeDebugPrivilege 5028 qu2867.exe Token: SeDebugPrivilege 4420 si320263.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2064 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 76 PID 4824 wrote to memory of 2064 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 76 PID 4824 wrote to memory of 2064 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 76 PID 2064 wrote to memory of 2776 2064 un755919.exe 77 PID 2064 wrote to memory of 2776 2064 un755919.exe 77 PID 2064 wrote to memory of 2776 2064 un755919.exe 77 PID 2064 wrote to memory of 5028 2064 un755919.exe 86 PID 2064 wrote to memory of 5028 2064 un755919.exe 86 PID 2064 wrote to memory of 5028 2064 un755919.exe 86 PID 4824 wrote to memory of 4420 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 90 PID 4824 wrote to memory of 4420 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 90 PID 4824 wrote to memory of 4420 4824 f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe"C:\Users\Admin\AppData\Local\Temp\f6b18415a409b19147d5e469a5112011af5b7d8c604b6606defa461d98a89d9d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un755919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un755919.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1012.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 11004⤵
- Program crash
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2867.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 13484⤵
- Program crash
PID:1128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si320263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si320263.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2776 -ip 27761⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5028 -ip 50281⤵PID:1044
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD53482116c45e660725f1b9ff65fcbf6f8
SHA1242bba9421f8148b4cfef671829147597c7a4139
SHA2562a77089601862f0d7500152f37f32b4c5f73099d8016559de2356f7798d819da
SHA512ca3ae2c4418fa85a8703641e6565516fe6ef1ca50f3647dd52d8bb5fc5d49ab258ee84574a29f4db3ca486abf4b3dc96e676227ab4142bcb7d6e25c6cd56bffd
-
Filesize
176KB
MD53482116c45e660725f1b9ff65fcbf6f8
SHA1242bba9421f8148b4cfef671829147597c7a4139
SHA2562a77089601862f0d7500152f37f32b4c5f73099d8016559de2356f7798d819da
SHA512ca3ae2c4418fa85a8703641e6565516fe6ef1ca50f3647dd52d8bb5fc5d49ab258ee84574a29f4db3ca486abf4b3dc96e676227ab4142bcb7d6e25c6cd56bffd
-
Filesize
517KB
MD50788657fa8de30cb606b4e91481d64e2
SHA1bf159d912ff4e5cf1b3c15210ffc091183b3e7a3
SHA256168e97179ce1e3f861e4035090bd561b481b61c77ee28834da092e6023cb43f3
SHA5123695ea08f161b3ac7962c798701ca0a14c95d006062fe78a12eff18aaeed2f15c198432c395014ddd7fb2f3f743f4e35a2b05915b38a5b62d5910da4c3f3376c
-
Filesize
517KB
MD50788657fa8de30cb606b4e91481d64e2
SHA1bf159d912ff4e5cf1b3c15210ffc091183b3e7a3
SHA256168e97179ce1e3f861e4035090bd561b481b61c77ee28834da092e6023cb43f3
SHA5123695ea08f161b3ac7962c798701ca0a14c95d006062fe78a12eff18aaeed2f15c198432c395014ddd7fb2f3f743f4e35a2b05915b38a5b62d5910da4c3f3376c
-
Filesize
376KB
MD5b01794ee8134f55f28620c0305532995
SHA13d9e6369c263fd0d39f97e2d72ec2edb912786a5
SHA2569935e7beebeb1b7840acbba4e2b48741eb661ae5b869e3399eae38403bbe6e9e
SHA512f229b2e69d5d2342104797510318ff1891566b2f297602ee1744720c3b749141b143cef6ba3840a7fa6080146e07218480ae78526c43fea43b7fa869daa4e966
-
Filesize
376KB
MD5b01794ee8134f55f28620c0305532995
SHA13d9e6369c263fd0d39f97e2d72ec2edb912786a5
SHA2569935e7beebeb1b7840acbba4e2b48741eb661ae5b869e3399eae38403bbe6e9e
SHA512f229b2e69d5d2342104797510318ff1891566b2f297602ee1744720c3b749141b143cef6ba3840a7fa6080146e07218480ae78526c43fea43b7fa869daa4e966
-
Filesize
434KB
MD56d228a9f2d4d2de4e093030c3ae25984
SHA18c846fcdf17d35b85f82a5c57f8e7de4e1a2256f
SHA256c0d0a9beec744b3b9e006863eaff2060f8d086d25fc9eba6237e946e410c2207
SHA512cbc3ee9b97d4238cfe452a3a4ab6c22624905abdc0f50d09f69016162df596a23d5f9c7fc1e9cee4636e64bd2692b269d6cf821eafd5c8f6923697e6078476de
-
Filesize
434KB
MD56d228a9f2d4d2de4e093030c3ae25984
SHA18c846fcdf17d35b85f82a5c57f8e7de4e1a2256f
SHA256c0d0a9beec744b3b9e006863eaff2060f8d086d25fc9eba6237e946e410c2207
SHA512cbc3ee9b97d4238cfe452a3a4ab6c22624905abdc0f50d09f69016162df596a23d5f9c7fc1e9cee4636e64bd2692b269d6cf821eafd5c8f6923697e6078476de