Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:47
Static task
static1
Behavioral task
behavioral1
Sample
9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe
Resource
win10v2004-20230220-en
General
-
Target
9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe
-
Size
659KB
-
MD5
98acfd7abaa1eb0e7c402e5a1f47c210
-
SHA1
f5c01e7129126d5a05a512b0558bd4843face6d9
-
SHA256
9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9
-
SHA512
604246fcd84c1ad52cf1d38cb3d384e55ca51536d7888fa87ff6c72afaeefd247bfd722a815d1c1afdaf949d641fb7520243848ff3acc5008c6622b3feb3a09c
-
SSDEEP
12288:+MrWy90pZiOoMOXlFu6BbTkA3BV0yPWyUkct59OrwEeFCLfeft/juVgLI:UyAFdAdRb3MpyUt5MHeMLWB4H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4583.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4583.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4583.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/744-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-196-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-198-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-200-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-202-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-204-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-206-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-208-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-210-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-212-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-214-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-216-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-218-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-220-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-222-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-224-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-226-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/744-228-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un639115.exepro4583.exequ0580.exesi935240.exepid process 1596 un639115.exe 4892 pro4583.exe 744 qu0580.exe 824 si935240.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4583.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4583.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exeun639115.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un639115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un639115.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2628 4892 WerFault.exe pro4583.exe 2724 744 WerFault.exe qu0580.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4583.exequ0580.exesi935240.exepid process 4892 pro4583.exe 4892 pro4583.exe 744 qu0580.exe 744 qu0580.exe 824 si935240.exe 824 si935240.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4583.exequ0580.exesi935240.exedescription pid process Token: SeDebugPrivilege 4892 pro4583.exe Token: SeDebugPrivilege 744 qu0580.exe Token: SeDebugPrivilege 824 si935240.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exeun639115.exedescription pid process target process PID 3192 wrote to memory of 1596 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe un639115.exe PID 3192 wrote to memory of 1596 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe un639115.exe PID 3192 wrote to memory of 1596 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe un639115.exe PID 1596 wrote to memory of 4892 1596 un639115.exe pro4583.exe PID 1596 wrote to memory of 4892 1596 un639115.exe pro4583.exe PID 1596 wrote to memory of 4892 1596 un639115.exe pro4583.exe PID 1596 wrote to memory of 744 1596 un639115.exe qu0580.exe PID 1596 wrote to memory of 744 1596 un639115.exe qu0580.exe PID 1596 wrote to memory of 744 1596 un639115.exe qu0580.exe PID 3192 wrote to memory of 824 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe si935240.exe PID 3192 wrote to memory of 824 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe si935240.exe PID 3192 wrote to memory of 824 3192 9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe si935240.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe"C:\Users\Admin\AppData\Local\Temp\9ee709cbbb5d6cfda61f86197ba3b18b11f3268ceafc4c9719a0dbbdf500b2e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639115.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4583.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 11084⤵
- Program crash
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0580.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 13524⤵
- Program crash
PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si935240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si935240.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4892 -ip 48921⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 744 -ip 7441⤵PID:4368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5934f3379f828e0d7316d1929342b4ea7
SHA1525b6ba28a80215871cc29fb8be32a98dd0e9cda
SHA25658575c17f23da487f8c36b31824fc9f9268d348be0c347a076d8b4896232c569
SHA512a090537cf47cfd4d2ad89fb6f5449214965e48b44e0392663ef117b0ca4f5f68fa44904e71fb615e7fa922588cfcb1982a24bd31b2096e15b2091e48b4d36a3d
-
Filesize
175KB
MD5934f3379f828e0d7316d1929342b4ea7
SHA1525b6ba28a80215871cc29fb8be32a98dd0e9cda
SHA25658575c17f23da487f8c36b31824fc9f9268d348be0c347a076d8b4896232c569
SHA512a090537cf47cfd4d2ad89fb6f5449214965e48b44e0392663ef117b0ca4f5f68fa44904e71fb615e7fa922588cfcb1982a24bd31b2096e15b2091e48b4d36a3d
-
Filesize
517KB
MD5e17be0bf347ebbd647505f3ec06d2859
SHA1cb42db935ee137a12e91b1e96591df939451e250
SHA256f5ed9657ae36619e3b713e71cbb761d8f3886ac043d00005cf9123468e4ca4f0
SHA512de5cec0415560e4a21a3bb84490d0ff27408bfe08895e47dd41f4157fac4d7edeecc3c71c2d55aaaa6b4ff17d1210eca253179af580219f22d364010a6b4fa1b
-
Filesize
517KB
MD5e17be0bf347ebbd647505f3ec06d2859
SHA1cb42db935ee137a12e91b1e96591df939451e250
SHA256f5ed9657ae36619e3b713e71cbb761d8f3886ac043d00005cf9123468e4ca4f0
SHA512de5cec0415560e4a21a3bb84490d0ff27408bfe08895e47dd41f4157fac4d7edeecc3c71c2d55aaaa6b4ff17d1210eca253179af580219f22d364010a6b4fa1b
-
Filesize
237KB
MD544bee950700feb6d0390886c01379903
SHA14305a9b967d013d67aae536598344fcc67a9ddd4
SHA2568d63b5289b2cce80ab5f7b5317986a6c355dd4c5b14b16d03ffe1825e01c366c
SHA5127de9c0baca4e6025a621e666137e748e24346a59038d6c42d6b477915e125ea808067fd1314f90e74b0c8571f1445a7e9ff06cf047156bb0b2c35e3ac9ef1ec7
-
Filesize
237KB
MD544bee950700feb6d0390886c01379903
SHA14305a9b967d013d67aae536598344fcc67a9ddd4
SHA2568d63b5289b2cce80ab5f7b5317986a6c355dd4c5b14b16d03ffe1825e01c366c
SHA5127de9c0baca4e6025a621e666137e748e24346a59038d6c42d6b477915e125ea808067fd1314f90e74b0c8571f1445a7e9ff06cf047156bb0b2c35e3ac9ef1ec7
-
Filesize
295KB
MD53e1fdb9440a4e2851f230fe980a1c203
SHA1204b00b45a8d2f812e72a9bec11f035511742eb5
SHA256b84811031404510fe2cc8b34c00742e0064f4b8b7985b2a22697a3ea0116bf93
SHA512db6c0fcde01829054f32735a18d80b8ef72c4b0311dee305e0a63345763070cb00f1b20bc86679fd84a564498a6b023efaf23d3d454e79308e20d90cf938b676
-
Filesize
295KB
MD53e1fdb9440a4e2851f230fe980a1c203
SHA1204b00b45a8d2f812e72a9bec11f035511742eb5
SHA256b84811031404510fe2cc8b34c00742e0064f4b8b7985b2a22697a3ea0116bf93
SHA512db6c0fcde01829054f32735a18d80b8ef72c4b0311dee305e0a63345763070cb00f1b20bc86679fd84a564498a6b023efaf23d3d454e79308e20d90cf938b676