Analysis
-
max time kernel
84s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 10:50
Static task
static1
Behavioral task
behavioral1
Sample
3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe
Resource
win10v2004-20230220-en
General
-
Target
3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe
-
Size
659KB
-
MD5
bffe31ecf6e34ee9f50c76213ecf3a75
-
SHA1
f0699ffedfc6bd0288bb02dcdd66f1c5dfbde43a
-
SHA256
3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271
-
SHA512
346fb873752c290cc0ae1f8c610efba8327e5c01824193956f400c39ef01693e7ab2b4df87ab56a83e743ba3fa8de80af89ffeef02a6db5f8d29ab8ab2797c8f
-
SSDEEP
12288:YMriy90mahAOEg9bjSCJty4eK66XaR5YFslR32PifvER:ay69fSzA7X0WFxPiK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0097.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0097.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1956-195-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-194-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-197-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-199-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-201-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-203-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-207-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-211-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-213-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-215-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-217-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-219-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-221-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-223-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-225-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-227-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-229-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-231-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1956-1115-0x0000000005110000-0x0000000005120000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2516 un435970.exe 1912 pro0097.exe 1956 qu6135.exe 3216 si122237.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0097.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un435970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un435970.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3780 1912 WerFault.exe 83 4648 1956 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1912 pro0097.exe 1912 pro0097.exe 1956 qu6135.exe 1956 qu6135.exe 3216 si122237.exe 3216 si122237.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1912 pro0097.exe Token: SeDebugPrivilege 1956 qu6135.exe Token: SeDebugPrivilege 3216 si122237.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4356 wrote to memory of 2516 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 82 PID 4356 wrote to memory of 2516 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 82 PID 4356 wrote to memory of 2516 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 82 PID 2516 wrote to memory of 1912 2516 un435970.exe 83 PID 2516 wrote to memory of 1912 2516 un435970.exe 83 PID 2516 wrote to memory of 1912 2516 un435970.exe 83 PID 2516 wrote to memory of 1956 2516 un435970.exe 90 PID 2516 wrote to memory of 1956 2516 un435970.exe 90 PID 2516 wrote to memory of 1956 2516 un435970.exe 90 PID 4356 wrote to memory of 3216 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 94 PID 4356 wrote to memory of 3216 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 94 PID 4356 wrote to memory of 3216 4356 3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe"C:\Users\Admin\AppData\Local\Temp\3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 10804⤵
- Program crash
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 13284⤵
- Program crash
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1912 -ip 19121⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1956 -ip 19561⤵PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD564c372f989043a4957033bfaecb71f4d
SHA159906cdd94f6903fd4967e546549a54999bd3d8d
SHA25610b19ecb3e932d336a380e715e8a040974d72496dc294502e21a6d382289de88
SHA512d017ad78748ff271bd51c2f809f1a4525b621a15a4ccaebd2f0952f37d8d39288589e390197c8f800170420c5e935e796d60be977b156844c51122040f3cfb7a
-
Filesize
177KB
MD564c372f989043a4957033bfaecb71f4d
SHA159906cdd94f6903fd4967e546549a54999bd3d8d
SHA25610b19ecb3e932d336a380e715e8a040974d72496dc294502e21a6d382289de88
SHA512d017ad78748ff271bd51c2f809f1a4525b621a15a4ccaebd2f0952f37d8d39288589e390197c8f800170420c5e935e796d60be977b156844c51122040f3cfb7a
-
Filesize
518KB
MD5e0267888e669cc758e1ac41ba9644e24
SHA17c6abd631dc74e1fad9d2670a62e7540c616cf25
SHA256427333ecfa422d53463dedf970ab251c442cfe47dd9673002afd411bbeb2c51c
SHA51235e63fbb4295a7779a1b3c847a28c865e7c19e4d08d7f1311f24dbcc9a43877ee881dd6f2957344a1394078691d0d8d17cbc7ef3fbaec8455d25a8349c10c4da
-
Filesize
518KB
MD5e0267888e669cc758e1ac41ba9644e24
SHA17c6abd631dc74e1fad9d2670a62e7540c616cf25
SHA256427333ecfa422d53463dedf970ab251c442cfe47dd9673002afd411bbeb2c51c
SHA51235e63fbb4295a7779a1b3c847a28c865e7c19e4d08d7f1311f24dbcc9a43877ee881dd6f2957344a1394078691d0d8d17cbc7ef3fbaec8455d25a8349c10c4da
-
Filesize
295KB
MD5ef1b609fac0f6d7cd5126b0f59d003f0
SHA17a14d3f17e0d194430aa9228ad9628e6296b777c
SHA25656a50560d48fa87af84bab6929422f6a650678e7caefb249e317a0d4194d9785
SHA512ff8038dfdcc020ff92c581f356bba327065d79e4e181aa9577b4297f7afb55200876064cee6befe42c130aabeff7d98caa96afe058903a1ed900839919e9e366
-
Filesize
295KB
MD5ef1b609fac0f6d7cd5126b0f59d003f0
SHA17a14d3f17e0d194430aa9228ad9628e6296b777c
SHA25656a50560d48fa87af84bab6929422f6a650678e7caefb249e317a0d4194d9785
SHA512ff8038dfdcc020ff92c581f356bba327065d79e4e181aa9577b4297f7afb55200876064cee6befe42c130aabeff7d98caa96afe058903a1ed900839919e9e366
-
Filesize
353KB
MD57496d6c3d2fbf92578ee6aeda096db77
SHA1a4d5cdaee7bdcf34844b34177a469fc7ca0f60ad
SHA2567af7f7395229a8e5298dbdd49cfe5089b3f52b4deb387c6c28b7a53933307aa0
SHA512d1bfc106d41b3d843c684869e0664ce10d46f41b7ccd74a250cd60086c15a3e15755ccac699371be3dea920f67388c7d7090b523609e0716ee29ff6ecef4d687
-
Filesize
353KB
MD57496d6c3d2fbf92578ee6aeda096db77
SHA1a4d5cdaee7bdcf34844b34177a469fc7ca0f60ad
SHA2567af7f7395229a8e5298dbdd49cfe5089b3f52b4deb387c6c28b7a53933307aa0
SHA512d1bfc106d41b3d843c684869e0664ce10d46f41b7ccd74a250cd60086c15a3e15755ccac699371be3dea920f67388c7d7090b523609e0716ee29ff6ecef4d687