Analysis
-
max time kernel
92s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe
Resource
win10v2004-20230220-en
General
-
Target
a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe
-
Size
667KB
-
MD5
a5fa0f248837ecdae38267650942c3a7
-
SHA1
110df14099313d48e3d130fb19fd669ca460037f
-
SHA256
a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4
-
SHA512
7d674868c5f164f02caefc5deba029a396187601c9135f71c4d8251b51edfce5b239009b4eeb4dd20b0532526c8c36b0ed167a6f095315f55dc80feec919aa82
-
SSDEEP
12288:MMrOy90LA7vVYQk75RELxJpHfwpw/q8HWQm1izH01qT3H:SyvpOPELxJdfywSiWn82I3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1859.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3972-192-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-194-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-198-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-200-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-202-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-204-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-206-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-208-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-210-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-212-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-216-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-218-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-220-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-222-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-224-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3972-226-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1248 un702074.exe 852 pro1859.exe 3972 qu1145.exe 2932 si605887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1859.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un702074.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un702074.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3832 852 WerFault.exe 84 1000 3972 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 852 pro1859.exe 852 pro1859.exe 3972 qu1145.exe 3972 qu1145.exe 2932 si605887.exe 2932 si605887.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 852 pro1859.exe Token: SeDebugPrivilege 3972 qu1145.exe Token: SeDebugPrivilege 2932 si605887.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4132 wrote to memory of 1248 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 83 PID 4132 wrote to memory of 1248 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 83 PID 4132 wrote to memory of 1248 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 83 PID 1248 wrote to memory of 852 1248 un702074.exe 84 PID 1248 wrote to memory of 852 1248 un702074.exe 84 PID 1248 wrote to memory of 852 1248 un702074.exe 84 PID 1248 wrote to memory of 3972 1248 un702074.exe 93 PID 1248 wrote to memory of 3972 1248 un702074.exe 93 PID 1248 wrote to memory of 3972 1248 un702074.exe 93 PID 4132 wrote to memory of 2932 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 98 PID 4132 wrote to memory of 2932 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 98 PID 4132 wrote to memory of 2932 4132 a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe"C:\Users\Admin\AppData\Local\Temp\a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 10844⤵
- Program crash
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 11404⤵
- Program crash
PID:1000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 852 -ip 8521⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3972 -ip 39721⤵PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58a26c9a847b78a00df32a639a9c45699
SHA1a924b91157bb820c987aa1073689ad8b3b3db3d5
SHA25650619a7fa79dbbd64152ee7a58a43fa3934746b1d62636f3930ee98446ae97fe
SHA51215e3709b4028e5b6b49496b9d4ac86eaeb3c6fe962e0711c789f6c1192d7414a6e107ee90e71b5e92a76bb933de33ff2c1df714bc7cf7be178e5316892ae5ad4
-
Filesize
175KB
MD58a26c9a847b78a00df32a639a9c45699
SHA1a924b91157bb820c987aa1073689ad8b3b3db3d5
SHA25650619a7fa79dbbd64152ee7a58a43fa3934746b1d62636f3930ee98446ae97fe
SHA51215e3709b4028e5b6b49496b9d4ac86eaeb3c6fe962e0711c789f6c1192d7414a6e107ee90e71b5e92a76bb933de33ff2c1df714bc7cf7be178e5316892ae5ad4
-
Filesize
525KB
MD5edfac9ddd81b50a4c8f243c3092cc4ff
SHA1f6a7519dd412a99e506f2a6623c44c428ed220ce
SHA256c0f4b9009563c87255db63f935c319fb4dd3e3f20ba4123d09bbd343ac517764
SHA5123696bf02669a2174086cb79ea332dca699b7482cece87eb77c3ee66556aaff51756a7f61484b7b4c2c5ac0196fdc5ebf994099eaaf702b9710a40614d40bfa3e
-
Filesize
525KB
MD5edfac9ddd81b50a4c8f243c3092cc4ff
SHA1f6a7519dd412a99e506f2a6623c44c428ed220ce
SHA256c0f4b9009563c87255db63f935c319fb4dd3e3f20ba4123d09bbd343ac517764
SHA5123696bf02669a2174086cb79ea332dca699b7482cece87eb77c3ee66556aaff51756a7f61484b7b4c2c5ac0196fdc5ebf994099eaaf702b9710a40614d40bfa3e
-
Filesize
295KB
MD5550fea48f76c5fb463d50c7966bcd0d0
SHA13607ea25490f69635ecadf9a0b9706efd68aaa1c
SHA256ac6c85025df648cb91c270cb595036476d46af78294a082bf73e4a93c4de922e
SHA5129844bc91c1e56111a2c79b750c8dd636d0128dfc6615cc2804daf6d7a27b79a966d0bedd5234bb35c038dd380e09c51d8764d6fdec82457ba200202d80c6bb5a
-
Filesize
295KB
MD5550fea48f76c5fb463d50c7966bcd0d0
SHA13607ea25490f69635ecadf9a0b9706efd68aaa1c
SHA256ac6c85025df648cb91c270cb595036476d46af78294a082bf73e4a93c4de922e
SHA5129844bc91c1e56111a2c79b750c8dd636d0128dfc6615cc2804daf6d7a27b79a966d0bedd5234bb35c038dd380e09c51d8764d6fdec82457ba200202d80c6bb5a
-
Filesize
353KB
MD5f4f9c9c2b2cd9f7308a827fb33d28a56
SHA1f4c0ce80998113e3e65ee39cb7559ba065e00974
SHA256f0060df9d635260c04bc7c9283452616e38b3655083e812275475e66f9f0663a
SHA5121ba4b812365f8f42fe54d82e201a4914975eafade9342e337229c855df2e9808dd016c09652984a9b162c1f19aa72c742c7292a0675a76da4f4427a8a632069e
-
Filesize
353KB
MD5f4f9c9c2b2cd9f7308a827fb33d28a56
SHA1f4c0ce80998113e3e65ee39cb7559ba065e00974
SHA256f0060df9d635260c04bc7c9283452616e38b3655083e812275475e66f9f0663a
SHA5121ba4b812365f8f42fe54d82e201a4914975eafade9342e337229c855df2e9808dd016c09652984a9b162c1f19aa72c742c7292a0675a76da4f4427a8a632069e