Analysis
-
max time kernel
124s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe
Resource
win10v2004-20230220-en
General
-
Target
cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe
-
Size
667KB
-
MD5
746b6bff0626e6a55beb7b30caba3987
-
SHA1
ea0633c72cf82ffdbcc68ba4971c908390a6c58b
-
SHA256
cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788
-
SHA512
bf5df3305e6722b2062d0fc738606461a799c69eb0ba1818d5c1fabe4ae6fb5f40431fcd03fd1add722feaea1d26cbf1e0fe8e7e1075caa16846c16bdd21e1de
-
SSDEEP
12288:vMrJy90d+A3h6tlKG/7g587pNw373qHKWgrfcpL8LaDHFr:yyrAaKOE5yJBpLRDHl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7954.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7954.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4772-192-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-191-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-194-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-196-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-198-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-200-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-202-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-204-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-206-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-208-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-210-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-212-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-214-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-216-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-218-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-220-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-222-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4772-224-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4172 un870253.exe 3500 pro7954.exe 4772 qu2436.exe 4812 si150693.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7954.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un870253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un870253.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 996 3500 WerFault.exe 84 4832 4772 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3500 pro7954.exe 3500 pro7954.exe 4772 qu2436.exe 4772 qu2436.exe 4812 si150693.exe 4812 si150693.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3500 pro7954.exe Token: SeDebugPrivilege 4772 qu2436.exe Token: SeDebugPrivilege 4812 si150693.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4172 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 83 PID 1344 wrote to memory of 4172 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 83 PID 1344 wrote to memory of 4172 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 83 PID 4172 wrote to memory of 3500 4172 un870253.exe 84 PID 4172 wrote to memory of 3500 4172 un870253.exe 84 PID 4172 wrote to memory of 3500 4172 un870253.exe 84 PID 4172 wrote to memory of 4772 4172 un870253.exe 90 PID 4172 wrote to memory of 4772 4172 un870253.exe 90 PID 4172 wrote to memory of 4772 4172 un870253.exe 90 PID 1344 wrote to memory of 4812 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 98 PID 1344 wrote to memory of 4812 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 98 PID 1344 wrote to memory of 4812 1344 cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe"C:\Users\Admin\AppData\Local\Temp\cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 10844⤵
- Program crash
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 17724⤵
- Program crash
PID:4832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3500 -ip 35001⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4772 -ip 47721⤵PID:2700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e98cdb826bead04850b2d60711154ab2
SHA1f7527fb3ebf403cf4057f5c04571c7285fb35851
SHA2560413cabbc99d55695d1850a6da81214b7ede02e066532ab0de386aa5d0403c47
SHA5127b64f0018c723d42043a06bdd57d6c0e06367b256d2fc3643263233677674afc6ed74938791775218e94b243438ed9422032adc8eca2dc43294dd4467ad54aef
-
Filesize
175KB
MD5e98cdb826bead04850b2d60711154ab2
SHA1f7527fb3ebf403cf4057f5c04571c7285fb35851
SHA2560413cabbc99d55695d1850a6da81214b7ede02e066532ab0de386aa5d0403c47
SHA5127b64f0018c723d42043a06bdd57d6c0e06367b256d2fc3643263233677674afc6ed74938791775218e94b243438ed9422032adc8eca2dc43294dd4467ad54aef
-
Filesize
525KB
MD58353f704ffe66ffc9f6a1ce8419ce46a
SHA1bace9997b2e63e7643cdd0f79c2101d04759a36a
SHA2568dab71db761a0222ae09ac74eaeecb21fe7a3cc8ff6e35801f281cd5cad960e1
SHA512f316ea844d0caa3a6c07eb846a37c873b68cb295fe886d21c244b8a4c2c9b1797121228e0d1761c92232ce2b469d5e614d6f3fb1f7eeb3dd6cb03bb95c8c8506
-
Filesize
525KB
MD58353f704ffe66ffc9f6a1ce8419ce46a
SHA1bace9997b2e63e7643cdd0f79c2101d04759a36a
SHA2568dab71db761a0222ae09ac74eaeecb21fe7a3cc8ff6e35801f281cd5cad960e1
SHA512f316ea844d0caa3a6c07eb846a37c873b68cb295fe886d21c244b8a4c2c9b1797121228e0d1761c92232ce2b469d5e614d6f3fb1f7eeb3dd6cb03bb95c8c8506
-
Filesize
295KB
MD5a6421505ab6c0c2f813c5a8f879d1206
SHA12be1d89f658a14eb70000e81a306cb496c2cf783
SHA2561bf8c1ba54b71bf5518ec0e2930bb27a70ffd61d05181d4fa2052ff9162b4cde
SHA512a451cf430b34c70b659b157dd37c69e06e8294320f07948088d14056d69169786422d0ed4dbc3851d9b59f4375cc5b51f23bfb475f17f0aed36b1da6fb32a836
-
Filesize
295KB
MD5a6421505ab6c0c2f813c5a8f879d1206
SHA12be1d89f658a14eb70000e81a306cb496c2cf783
SHA2561bf8c1ba54b71bf5518ec0e2930bb27a70ffd61d05181d4fa2052ff9162b4cde
SHA512a451cf430b34c70b659b157dd37c69e06e8294320f07948088d14056d69169786422d0ed4dbc3851d9b59f4375cc5b51f23bfb475f17f0aed36b1da6fb32a836
-
Filesize
353KB
MD520841dcc90c6e884f14945626628b6d8
SHA18052a9698f1c92a6f5ba7a7ecb99c99046499c80
SHA256e332167fd9bc71cc47d931961b01123bcaf5df0f4f1d9e7e1d753913b9fdecff
SHA51253d2ea93244e37e087f6671f0a6169adbe4f055b241bfd9739cc6974b2ab51d18396f1ca537a47eb64193aaff546b374a5da06df7f8797f1db899c9ac0d3d542
-
Filesize
353KB
MD520841dcc90c6e884f14945626628b6d8
SHA18052a9698f1c92a6f5ba7a7ecb99c99046499c80
SHA256e332167fd9bc71cc47d931961b01123bcaf5df0f4f1d9e7e1d753913b9fdecff
SHA51253d2ea93244e37e087f6671f0a6169adbe4f055b241bfd9739cc6974b2ab51d18396f1ca537a47eb64193aaff546b374a5da06df7f8797f1db899c9ac0d3d542