Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe
Resource
win10v2004-20230220-en
General
-
Target
c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe
-
Size
665KB
-
MD5
f7a4ef36bbd97df6b30e4fda34eb491e
-
SHA1
08c022b217ff4b517c4712dc9eebafa728084dd5
-
SHA256
c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab
-
SHA512
e23d006e37e0a51957da9c220eec875244954013de7fb48402ff440f53975efd06df8fffa07ef3f791a1084f5966847c644ce0244c6b2b45cdc2cc2f61d2c29f
-
SSDEEP
12288:/Mryy90n/NI7hBgWDAJQFUJotv2nRUVVwt7NXbww14LCjCV9Z4:dyw/KhRMJNJotviRU0lNXP4/4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9569.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9569.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2092-191-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-192-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-194-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-196-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-198-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-200-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-202-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-204-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-206-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-208-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-210-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-212-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-214-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-216-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-218-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-220-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-222-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2092-224-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3512 un642260.exe 3516 pro9569.exe 2092 qu4728.exe 4352 si836350.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9569.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un642260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un642260.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 220 3516 WerFault.exe 84 1632 2092 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3516 pro9569.exe 3516 pro9569.exe 2092 qu4728.exe 2092 qu4728.exe 4352 si836350.exe 4352 si836350.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3516 pro9569.exe Token: SeDebugPrivilege 2092 qu4728.exe Token: SeDebugPrivilege 4352 si836350.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3512 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 83 PID 2376 wrote to memory of 3512 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 83 PID 2376 wrote to memory of 3512 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 83 PID 3512 wrote to memory of 3516 3512 un642260.exe 84 PID 3512 wrote to memory of 3516 3512 un642260.exe 84 PID 3512 wrote to memory of 3516 3512 un642260.exe 84 PID 3512 wrote to memory of 2092 3512 un642260.exe 89 PID 3512 wrote to memory of 2092 3512 un642260.exe 89 PID 3512 wrote to memory of 2092 3512 un642260.exe 89 PID 2376 wrote to memory of 4352 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 93 PID 2376 wrote to memory of 4352 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 93 PID 2376 wrote to memory of 4352 2376 c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe"C:\Users\Admin\AppData\Local\Temp\c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 10804⤵
- Program crash
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 17364⤵
- Program crash
PID:1632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3516 -ip 35161⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2092 -ip 20921⤵PID:1452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD504eabdbd4ee614625e71c2a777a2528b
SHA1d54d9376e22582ff7d659c5cb3dff06e3f6a5806
SHA2568520407da475f10e3e1ea5079fe76a111c829ec62d43f53fc34915abf312cf83
SHA5128f277e864f3b059bdaf721ddb35df24bcbadc751c1b0f970488c8d16d35485633ed910c62ced8bffa1f12b12e525278f1eb6ed90df258d16b55f076d967eea65
-
Filesize
175KB
MD504eabdbd4ee614625e71c2a777a2528b
SHA1d54d9376e22582ff7d659c5cb3dff06e3f6a5806
SHA2568520407da475f10e3e1ea5079fe76a111c829ec62d43f53fc34915abf312cf83
SHA5128f277e864f3b059bdaf721ddb35df24bcbadc751c1b0f970488c8d16d35485633ed910c62ced8bffa1f12b12e525278f1eb6ed90df258d16b55f076d967eea65
-
Filesize
523KB
MD5577b237c4e831a9af366cc0a061be83e
SHA16514f01a9942f78e30d7e249eb72fbb6d951d370
SHA2569dedbe523626c2dfde094341f2db48006f9d595c6ba166229e0fa2983ca37001
SHA512d1a00ba98ddc23376a1a6eca97d11e95db3bc71ed8d636a0bf75242a4774b0ad952502f3c247a6a318f84a8f4888a717e9d0a64a44353ab41aafe4f797143628
-
Filesize
523KB
MD5577b237c4e831a9af366cc0a061be83e
SHA16514f01a9942f78e30d7e249eb72fbb6d951d370
SHA2569dedbe523626c2dfde094341f2db48006f9d595c6ba166229e0fa2983ca37001
SHA512d1a00ba98ddc23376a1a6eca97d11e95db3bc71ed8d636a0bf75242a4774b0ad952502f3c247a6a318f84a8f4888a717e9d0a64a44353ab41aafe4f797143628
-
Filesize
294KB
MD577d36f30531f6159e2c5bfe86c880dd9
SHA1df3cc3e9a4f2fbd8422e46869fff2837951ca27c
SHA256120864ba3d4b79f6bc4ea8dcd3db4a1711b7028e3a0587ecb690387ffe30e2bd
SHA512c357873905a5b8fdbbedd63666cdb80f61f6e6a6dbc0de91d84e251f3dd8b7fd2fd2845ee26df4c565ae0861ac75cb3c5afba64fc58129940632db86461f2766
-
Filesize
294KB
MD577d36f30531f6159e2c5bfe86c880dd9
SHA1df3cc3e9a4f2fbd8422e46869fff2837951ca27c
SHA256120864ba3d4b79f6bc4ea8dcd3db4a1711b7028e3a0587ecb690387ffe30e2bd
SHA512c357873905a5b8fdbbedd63666cdb80f61f6e6a6dbc0de91d84e251f3dd8b7fd2fd2845ee26df4c565ae0861ac75cb3c5afba64fc58129940632db86461f2766
-
Filesize
353KB
MD51e0a836483da5634d14261d5a4b6b71c
SHA1e38cafe65f3ea7fe6618934e098f706821dabc1e
SHA256bbea3d87d3010ff611d429379c84640257dd4be3079e52750476438c304e9ae5
SHA512ac9eb46ec1287bb5214d1f37c011dbc047bacdbdf56449dccabc3f3f1100b48046253f7ee6ce1d9d844bc795df075cbd959824fb09a3a759886916b36a4039c1
-
Filesize
353KB
MD51e0a836483da5634d14261d5a4b6b71c
SHA1e38cafe65f3ea7fe6618934e098f706821dabc1e
SHA256bbea3d87d3010ff611d429379c84640257dd4be3079e52750476438c304e9ae5
SHA512ac9eb46ec1287bb5214d1f37c011dbc047bacdbdf56449dccabc3f3f1100b48046253f7ee6ce1d9d844bc795df075cbd959824fb09a3a759886916b36a4039c1