Analysis
-
max time kernel
65s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 09:04
Static task
static1
Behavioral task
behavioral1
Sample
cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe
Resource
win10v2004-20230220-en
General
-
Target
cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe
-
Size
659KB
-
MD5
b409990496ac2b7afdae94e1a93b11ed
-
SHA1
c2b920054ec85477b7b731cae31487794b152789
-
SHA256
cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211
-
SHA512
454a2a3caaab2527bcb6516b3d918ecb98de88cff10334118775a14286ae260985b89a1d900f85a684c0b355019a26591f4f77d60eb9d6e7e0450f04bf0af4ca
-
SSDEEP
12288:rMrIy909TvUk7EPqsvQX1Y7xVUNZpy/VrONajFvlRbFsxifITdZU:PyyjU5PDa1YrUvQ/VrON0Fsi8dZU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4196-192-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-191-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-194-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-198-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-200-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-202-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-204-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-206-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-208-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-210-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-212-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-216-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-218-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-220-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-222-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/4196-224-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3832 un406597.exe 840 pro7242.exe 4196 qu0997.exe 3252 si326234.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7242.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un406597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un406597.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4880 840 WerFault.exe 84 4172 4196 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 840 pro7242.exe 840 pro7242.exe 4196 qu0997.exe 4196 qu0997.exe 3252 si326234.exe 3252 si326234.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 840 pro7242.exe Token: SeDebugPrivilege 4196 qu0997.exe Token: SeDebugPrivilege 3252 si326234.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3832 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 83 PID 4692 wrote to memory of 3832 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 83 PID 4692 wrote to memory of 3832 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 83 PID 3832 wrote to memory of 840 3832 un406597.exe 84 PID 3832 wrote to memory of 840 3832 un406597.exe 84 PID 3832 wrote to memory of 840 3832 un406597.exe 84 PID 3832 wrote to memory of 4196 3832 un406597.exe 93 PID 3832 wrote to memory of 4196 3832 un406597.exe 93 PID 3832 wrote to memory of 4196 3832 un406597.exe 93 PID 4692 wrote to memory of 3252 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 98 PID 4692 wrote to memory of 3252 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 98 PID 4692 wrote to memory of 3252 4692 cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe"C:\Users\Admin\AppData\Local\Temp\cd43d1074fe4c6b7c3642a0aa5c47833c17a09d8b4577914f139a08f36657211.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un406597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un406597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10884⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0997.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0997.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 13444⤵
- Program crash
PID:4172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si326234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si326234.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 840 -ip 8401⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4196 -ip 41961⤵PID:4204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD58de7b24014912895ffd5c953f058f39b
SHA1e9e2576ad7992ff5bb3551abdbd1c1639b2d9aaa
SHA25637c510b092fa146af680451571fe338151bf47d7451635742900f94ad100c1bc
SHA5128ea6e5597a65795b3c6e9e5d11a033ccbd088680f6b8a964b21dc119c2809b5a79a1fe24e0623713786cead18f52796cc71ab61039ac1ba7a7c4836a83ae2388
-
Filesize
176KB
MD58de7b24014912895ffd5c953f058f39b
SHA1e9e2576ad7992ff5bb3551abdbd1c1639b2d9aaa
SHA25637c510b092fa146af680451571fe338151bf47d7451635742900f94ad100c1bc
SHA5128ea6e5597a65795b3c6e9e5d11a033ccbd088680f6b8a964b21dc119c2809b5a79a1fe24e0623713786cead18f52796cc71ab61039ac1ba7a7c4836a83ae2388
-
Filesize
516KB
MD52a90539ca4c733f881aa67efa9808e4b
SHA10dc18ea8291431dc682870ed5f183f4061e0243a
SHA256994aaf0d1579cf04af859b5abe71b643546ec4f88054b667d340d0596933b8c3
SHA512f2b6c150946dabe674a14b89c0c2dd2ab7faf84b5ab9bbceacfc538ac736cc03d50a1716f05c8617f04f3053584e02c53fb256a2761bdeca5b2a2179f36e6201
-
Filesize
516KB
MD52a90539ca4c733f881aa67efa9808e4b
SHA10dc18ea8291431dc682870ed5f183f4061e0243a
SHA256994aaf0d1579cf04af859b5abe71b643546ec4f88054b667d340d0596933b8c3
SHA512f2b6c150946dabe674a14b89c0c2dd2ab7faf84b5ab9bbceacfc538ac736cc03d50a1716f05c8617f04f3053584e02c53fb256a2761bdeca5b2a2179f36e6201
-
Filesize
295KB
MD552a419412a3eaf2cde95859a40c6240d
SHA15a58f0392ea73fb2522556485718893e002e1f48
SHA256b0b2f484a2f18e22f9cdc8dde56530a741b402ce02798ff4428e65365b39ac47
SHA5125d64e6034472ccf6321d7f0aef0767ee417b72444049314ee92b9baaca5679259dd4e0232e6a5f138cc34b41320730c2050af792c03e3e6ce12a3257f5b940e3
-
Filesize
295KB
MD552a419412a3eaf2cde95859a40c6240d
SHA15a58f0392ea73fb2522556485718893e002e1f48
SHA256b0b2f484a2f18e22f9cdc8dde56530a741b402ce02798ff4428e65365b39ac47
SHA5125d64e6034472ccf6321d7f0aef0767ee417b72444049314ee92b9baaca5679259dd4e0232e6a5f138cc34b41320730c2050af792c03e3e6ce12a3257f5b940e3
-
Filesize
353KB
MD5d8374e42777011d4bee0ab20a7ae103b
SHA17a061484f0901e07e1884de3089929c497a0ad34
SHA2565ff8ee883f5de76aa9c119d6f53904afee83d8335f7d4e072996736d541bb1fc
SHA512053b94c68300dd1949a168740271508bf1ecfe27479f506edc8ba501700e5eb17ab7627eb8ea29652c49e338e99e721a9ad4b90c463a9db122fecbf851c3eff8
-
Filesize
353KB
MD5d8374e42777011d4bee0ab20a7ae103b
SHA17a061484f0901e07e1884de3089929c497a0ad34
SHA2565ff8ee883f5de76aa9c119d6f53904afee83d8335f7d4e072996736d541bb1fc
SHA512053b94c68300dd1949a168740271508bf1ecfe27479f506edc8ba501700e5eb17ab7627eb8ea29652c49e338e99e721a9ad4b90c463a9db122fecbf851c3eff8