Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe
Resource
win10v2004-20230220-en
General
-
Target
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe
-
Size
667KB
-
MD5
49e80828e0dc6112327ee85a4e7be939
-
SHA1
f269752fd14d8e4cb78d80c5add75bbee60b260d
-
SHA256
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756
-
SHA512
e1bfd41eac6c3c7877db4e14c57383ea0ac01ffd60fcaf04168fc4ec613daebb62f7b27b44bdb74dbbd44986fca3bda12cda65034f9a13ee6290ee9bd26675e2
-
SSDEEP
12288:9MrKy90ASi5DBqqWwJkGexBAk1g3P+U6zWWqI/CLThHtLmIqBCC3/tLH:7ywi5D0qWwVudefwzobtCIeCA7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3064-192-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-191-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-194-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-196-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-198-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-200-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-202-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-204-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-206-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-208-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-210-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-212-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-214-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-216-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-218-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-220-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-222-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3064-224-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 444 un669993.exe 2264 pro7650.exe 3064 qu4191.exe 1324 si926198.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7650.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un669993.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un669993.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3212 2264 WerFault.exe 85 1460 3064 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2264 pro7650.exe 2264 pro7650.exe 3064 qu4191.exe 3064 qu4191.exe 1324 si926198.exe 1324 si926198.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2264 pro7650.exe Token: SeDebugPrivilege 3064 qu4191.exe Token: SeDebugPrivilege 1324 si926198.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 444 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 84 PID 2252 wrote to memory of 444 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 84 PID 2252 wrote to memory of 444 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 84 PID 444 wrote to memory of 2264 444 un669993.exe 85 PID 444 wrote to memory of 2264 444 un669993.exe 85 PID 444 wrote to memory of 2264 444 un669993.exe 85 PID 444 wrote to memory of 3064 444 un669993.exe 94 PID 444 wrote to memory of 3064 444 un669993.exe 94 PID 444 wrote to memory of 3064 444 un669993.exe 94 PID 2252 wrote to memory of 1324 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 99 PID 2252 wrote to memory of 1324 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 99 PID 2252 wrote to memory of 1324 2252 19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe"C:\Users\Admin\AppData\Local\Temp\19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un669993.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un669993.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7650.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 10844⤵
- Program crash
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4191.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 11764⤵
- Program crash
PID:1460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si926198.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si926198.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2264 -ip 22641⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3064 -ip 30641⤵PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD553aebe08d58e4eb900b933f675c4a131
SHA18000f11fec0245b0f1d38277a094150a709a6a1d
SHA25694da874e2c88a98984ecb98dc587d220fbde10c58508ec1521e955401ffe0962
SHA5125dee7e53bc854bea91f594f61c5f88c4bc2401a1b5d29332849126df1c645ebf34dc0bfd9ac8174bd3e600d886a10695bf2cc0512782e7cb865e7349c4b639a2
-
Filesize
175KB
MD553aebe08d58e4eb900b933f675c4a131
SHA18000f11fec0245b0f1d38277a094150a709a6a1d
SHA25694da874e2c88a98984ecb98dc587d220fbde10c58508ec1521e955401ffe0962
SHA5125dee7e53bc854bea91f594f61c5f88c4bc2401a1b5d29332849126df1c645ebf34dc0bfd9ac8174bd3e600d886a10695bf2cc0512782e7cb865e7349c4b639a2
-
Filesize
525KB
MD54b462440300b987bbc554e8e3f1e9faf
SHA1260ec16bd0cf42041c357c04b855dc62ae68e600
SHA25670695108a7f263f7f1ef39079666bf930d226568437007923e1067c765f8d973
SHA512c124e21139720ccf95e217a4303aaede233d4ac849ae2f4d89f4a552259b49e418acd1599fa4cb564898359eff56d487f2368461dcd4ff0b09d0c91f5d9c88f5
-
Filesize
525KB
MD54b462440300b987bbc554e8e3f1e9faf
SHA1260ec16bd0cf42041c357c04b855dc62ae68e600
SHA25670695108a7f263f7f1ef39079666bf930d226568437007923e1067c765f8d973
SHA512c124e21139720ccf95e217a4303aaede233d4ac849ae2f4d89f4a552259b49e418acd1599fa4cb564898359eff56d487f2368461dcd4ff0b09d0c91f5d9c88f5
-
Filesize
295KB
MD59cb237043663b05a0c1d88265a434490
SHA182f4d2b64a9ba6578b79b381150aee178253139f
SHA2567c37c3dc379ffa457810c759e62c704b4b4016fbec21ebe94a41986ba333d7d8
SHA5121fb9f50aa814f5103595ddbd4a061040364086592e60bf118c3f800ec705b0b46eaadf63b45d32a3bd6d4c72a3d5e17c54e8f3768850504956e44bed2371151d
-
Filesize
295KB
MD59cb237043663b05a0c1d88265a434490
SHA182f4d2b64a9ba6578b79b381150aee178253139f
SHA2567c37c3dc379ffa457810c759e62c704b4b4016fbec21ebe94a41986ba333d7d8
SHA5121fb9f50aa814f5103595ddbd4a061040364086592e60bf118c3f800ec705b0b46eaadf63b45d32a3bd6d4c72a3d5e17c54e8f3768850504956e44bed2371151d
-
Filesize
353KB
MD51fb86f5a5be806fb4068a06c6d453a4d
SHA18a8e1727399212f2112fb342bd0dd45deba87f6c
SHA2567e2be38211c91f2431b9a19455cf9769efca1412e727305dd2c18245ba7d3d5d
SHA512e8d8ff81fa800506336ae9d1417b97d72b5089350dd63847ec3bd54a58b0249fe84baf02a708946a72c53f49f480ca6fe490149bfabbfdbfd9759eb2063eedbd
-
Filesize
353KB
MD51fb86f5a5be806fb4068a06c6d453a4d
SHA18a8e1727399212f2112fb342bd0dd45deba87f6c
SHA2567e2be38211c91f2431b9a19455cf9769efca1412e727305dd2c18245ba7d3d5d
SHA512e8d8ff81fa800506336ae9d1417b97d72b5089350dd63847ec3bd54a58b0249fe84baf02a708946a72c53f49f480ca6fe490149bfabbfdbfd9759eb2063eedbd