Analysis
-
max time kernel
109s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 13:25
Static task
static1
Behavioral task
behavioral1
Sample
98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe
Resource
win10v2004-20230221-en
General
-
Target
98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe
-
Size
666KB
-
MD5
c04a2786cd95b09175ce6ba25ff46e4b
-
SHA1
f2c5d453bf241cdda08ff70595acc214b08ad998
-
SHA256
98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3
-
SHA512
809dd573586c5b963b356292e26f7505509a212da3de37fd73bc40aa2fa1bfa066e4acd0ef9ac6175b08ef90182dc238b87109f85795192760fd7c95bd398e44
-
SSDEEP
12288:wMrUy90bmdfFB+m0jInApe8CNloF/auXpeg+MxHc9BVR01mz1itG:0yVj+vInApe+aSpeg+H9BVR01kitG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8297.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3312-191-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-192-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-195-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-199-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-201-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-203-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-205-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-207-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-209-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-211-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-213-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-215-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-219-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-217-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-221-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-223-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-225-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3312-227-0x00000000027B0000-0x00000000027EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4220 un416027.exe 1052 pro8297.exe 3312 qu7645.exe 4432 si509607.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8297.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un416027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un416027.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2116 1052 WerFault.exe 86 1588 3312 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1052 pro8297.exe 1052 pro8297.exe 3312 qu7645.exe 3312 qu7645.exe 4432 si509607.exe 4432 si509607.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1052 pro8297.exe Token: SeDebugPrivilege 3312 qu7645.exe Token: SeDebugPrivilege 4432 si509607.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4220 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 85 PID 1704 wrote to memory of 4220 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 85 PID 1704 wrote to memory of 4220 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 85 PID 4220 wrote to memory of 1052 4220 un416027.exe 86 PID 4220 wrote to memory of 1052 4220 un416027.exe 86 PID 4220 wrote to memory of 1052 4220 un416027.exe 86 PID 4220 wrote to memory of 3312 4220 un416027.exe 95 PID 4220 wrote to memory of 3312 4220 un416027.exe 95 PID 4220 wrote to memory of 3312 4220 un416027.exe 95 PID 1704 wrote to memory of 4432 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 100 PID 1704 wrote to memory of 4432 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 100 PID 1704 wrote to memory of 4432 1704 98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe"C:\Users\Admin\AppData\Local\Temp\98ee7342feaa2ca1317945cff51df8731ba939e4515d293ff0c0df21c86f44f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416027.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 10844⤵
- Program crash
PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 13644⤵
- Program crash
PID:1588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si509607.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si509607.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1052 -ip 10521⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3312 -ip 33121⤵PID:4124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bdaef4358a9dc8673a6b08a009f06c4d
SHA14cfb3ffc0827916b1203febd994f627cf077f767
SHA256e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a
SHA5126d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0
-
Filesize
175KB
MD5bdaef4358a9dc8673a6b08a009f06c4d
SHA14cfb3ffc0827916b1203febd994f627cf077f767
SHA256e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a
SHA5126d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0
-
Filesize
524KB
MD5c76efaf12f4ccb869f9367d3f734e324
SHA1f09485704b0e1aecf2f38de00608f6b56075a946
SHA256aaf900fa2753bc5f3b5e1f5bfa7df0c2c138d0171880a3065e2c1604cd973b35
SHA512868afae3f2ec2487ac669271d24f11571f9e1bebf67728b7b9de6e9989e3db40bee20a434bcd5a9840f6333c3988f1eb512913be60e6406d44abcc726d0d24a8
-
Filesize
524KB
MD5c76efaf12f4ccb869f9367d3f734e324
SHA1f09485704b0e1aecf2f38de00608f6b56075a946
SHA256aaf900fa2753bc5f3b5e1f5bfa7df0c2c138d0171880a3065e2c1604cd973b35
SHA512868afae3f2ec2487ac669271d24f11571f9e1bebf67728b7b9de6e9989e3db40bee20a434bcd5a9840f6333c3988f1eb512913be60e6406d44abcc726d0d24a8
-
Filesize
295KB
MD51b56a78442dad03df338d4643cd3e3c9
SHA1a5041ed9984135f5066caa05ef921b27a0657e17
SHA2561b66f8738ca2644cd59418dd2afab72af9713557e36a3f7aab91fc6f95824b66
SHA512789ca662537446eea59f968029b0480cb3d6239069b662ea891cfee7b31164f61c1de8b9c3ccaf530ef8962388ab14362ef17bfcc3b46b1cbb2247cc755ffe4b
-
Filesize
295KB
MD51b56a78442dad03df338d4643cd3e3c9
SHA1a5041ed9984135f5066caa05ef921b27a0657e17
SHA2561b66f8738ca2644cd59418dd2afab72af9713557e36a3f7aab91fc6f95824b66
SHA512789ca662537446eea59f968029b0480cb3d6239069b662ea891cfee7b31164f61c1de8b9c3ccaf530ef8962388ab14362ef17bfcc3b46b1cbb2247cc755ffe4b
-
Filesize
353KB
MD596102ed5e2193fe4d9eb894850f2e3b3
SHA16ac0964c36f701118253fb846f45c06278717b75
SHA256dcde24a775f3840fd7e6b2c7bc808c7e9ff5ba194d48b64a2b224ffaac19a31d
SHA512a310812c5c790855a9cc2ce2b6e8b4b8b0ebb72a8e008710964f41459818a9663b5aaf1b992bb96c161e7cd5d7dfdcfbd56edd1045554352bef578e574750d48
-
Filesize
353KB
MD596102ed5e2193fe4d9eb894850f2e3b3
SHA16ac0964c36f701118253fb846f45c06278717b75
SHA256dcde24a775f3840fd7e6b2c7bc808c7e9ff5ba194d48b64a2b224ffaac19a31d
SHA512a310812c5c790855a9cc2ce2b6e8b4b8b0ebb72a8e008710964f41459818a9663b5aaf1b992bb96c161e7cd5d7dfdcfbd56edd1045554352bef578e574750d48