Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe
Resource
win10v2004-20230220-en
General
-
Target
561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe
-
Size
666KB
-
MD5
f3f35f37a37c17a16f583a2c6bd96435
-
SHA1
4ea62369e5f0a24303806e471a6175a6b687c24b
-
SHA256
561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e
-
SHA512
4727bb79045b6ea8b919dcb9bf044e2884b76aadd33e1b7db18a1b31c68ff6b447e60c3d00600f05c6ad6d28ec20e77faf196bb7cdb6e99249097cd80e1dd254
-
SSDEEP
12288:UMrHy90MFHnpV47UdZAXbho5v3ftNj167groxNoKN+B7l6u5rUd4R/wzHXe8iaQg:jyhHfRdZKbYNNjkg+al35rHlwzHXzxE4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4422.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4422.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1032-190-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-191-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-193-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-197-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-201-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-203-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-205-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-207-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-209-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-211-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-213-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-215-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-217-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-219-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-221-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-223-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-225-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1032-227-0x0000000002850000-0x000000000288F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1380 un984551.exe 2016 pro4422.exe 1032 qu4365.exe 1112 si307325.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4422.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un984551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un984551.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2884 2016 WerFault.exe 85 832 1032 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2016 pro4422.exe 2016 pro4422.exe 1032 qu4365.exe 1032 qu4365.exe 1112 si307325.exe 1112 si307325.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2016 pro4422.exe Token: SeDebugPrivilege 1032 qu4365.exe Token: SeDebugPrivilege 1112 si307325.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1380 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 84 PID 1280 wrote to memory of 1380 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 84 PID 1280 wrote to memory of 1380 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 84 PID 1380 wrote to memory of 2016 1380 un984551.exe 85 PID 1380 wrote to memory of 2016 1380 un984551.exe 85 PID 1380 wrote to memory of 2016 1380 un984551.exe 85 PID 1380 wrote to memory of 1032 1380 un984551.exe 91 PID 1380 wrote to memory of 1032 1380 un984551.exe 91 PID 1380 wrote to memory of 1032 1380 un984551.exe 91 PID 1280 wrote to memory of 1112 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 95 PID 1280 wrote to memory of 1112 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 95 PID 1280 wrote to memory of 1112 1280 561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe"C:\Users\Admin\AppData\Local\Temp\561c4eeb2c23fe0c634bbebe4872420812d83b922f385d1f8b28e35ee443d34e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984551.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4422.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 10804⤵
- Program crash
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4365.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 13444⤵
- Program crash
PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si307325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si307325.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2016 -ip 20161⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1032 -ip 10321⤵PID:3056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5f1b60eb0179694d1dbf35d59de5c9e59
SHA1952764914ad367666c8da0a4bc2afc150da917bf
SHA256abc25b24f48e8eb2c35fac731fa12defb1ee8a5d50005859d4cfb8e8cdce4829
SHA5129b5b1922a523f2e60d1b5116e79e93b7d7fc693176ef248956d3f7b50e7cba147e35d8ff15ff70837b13c2b95dd48e8cb0f6a090bf6f16d871ae1af12a39a266
-
Filesize
176KB
MD5f1b60eb0179694d1dbf35d59de5c9e59
SHA1952764914ad367666c8da0a4bc2afc150da917bf
SHA256abc25b24f48e8eb2c35fac731fa12defb1ee8a5d50005859d4cfb8e8cdce4829
SHA5129b5b1922a523f2e60d1b5116e79e93b7d7fc693176ef248956d3f7b50e7cba147e35d8ff15ff70837b13c2b95dd48e8cb0f6a090bf6f16d871ae1af12a39a266
-
Filesize
524KB
MD5fce833cff2992e3061a156e379d11521
SHA1d06cc5eb2895b9d0d7efab405e55c83ab700a637
SHA25680568290415049ada7687f91a0e9ab21bdd7b4ba86f466b96deb9cee3999151a
SHA512f6f03906362a672b31c764f36e7e7e2f77bf00df241a78ce34988bdbff5d3d56eb28ccdc8b25e510e352ced391762ba75f600a4c4c04fd0fc71a68c671237e7d
-
Filesize
524KB
MD5fce833cff2992e3061a156e379d11521
SHA1d06cc5eb2895b9d0d7efab405e55c83ab700a637
SHA25680568290415049ada7687f91a0e9ab21bdd7b4ba86f466b96deb9cee3999151a
SHA512f6f03906362a672b31c764f36e7e7e2f77bf00df241a78ce34988bdbff5d3d56eb28ccdc8b25e510e352ced391762ba75f600a4c4c04fd0fc71a68c671237e7d
-
Filesize
294KB
MD5be4888cb83d3782f074a34a3707d4207
SHA18319f3d78d62dbc699e8ad606c24061adf84d631
SHA256bd66386510b8e7a35f5f88ec6c2b6b3aef5ca88e01731ba53dd264044b97697d
SHA5121f9ec86869496b6ee11ff363619c7a747aed5a4065714b3c22ac96da1be838848958844a0ffdfd70ea5ee28e9c76e9a965edddab01aea042b73800afe3131a6c
-
Filesize
294KB
MD5be4888cb83d3782f074a34a3707d4207
SHA18319f3d78d62dbc699e8ad606c24061adf84d631
SHA256bd66386510b8e7a35f5f88ec6c2b6b3aef5ca88e01731ba53dd264044b97697d
SHA5121f9ec86869496b6ee11ff363619c7a747aed5a4065714b3c22ac96da1be838848958844a0ffdfd70ea5ee28e9c76e9a965edddab01aea042b73800afe3131a6c
-
Filesize
352KB
MD5fc4bf48649d557f8384f80d50ef923e0
SHA19ed30aa3c4196dd139ccfb8c9160028c0892e996
SHA2560649c7982a4b1e92ad61220be3d11adb34f297396f9eff71e8f07154173830a9
SHA512245a3ca7fcf9a51bd361825aa54a6977e125825783349d0436ed9ea6070d9c3bb0fb30e0be4e5d0b91a44ee85586be9a462cdf864ae4fc573f4a22850cd071f2
-
Filesize
352KB
MD5fc4bf48649d557f8384f80d50ef923e0
SHA19ed30aa3c4196dd139ccfb8c9160028c0892e996
SHA2560649c7982a4b1e92ad61220be3d11adb34f297396f9eff71e8f07154173830a9
SHA512245a3ca7fcf9a51bd361825aa54a6977e125825783349d0436ed9ea6070d9c3bb0fb30e0be4e5d0b91a44ee85586be9a462cdf864ae4fc573f4a22850cd071f2