Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 03:45
Static task
static1
Behavioral task
behavioral1
Sample
8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe
Resource
win10v2004-20230221-en
General
-
Target
8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe
-
Size
666KB
-
MD5
be074f58ad108656f2c23b4efbe3cd7f
-
SHA1
af3eda63e68dd0874ba412d9186db1fa353de729
-
SHA256
8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b
-
SHA512
9fe82beca0aceaf6cc3adaa3082b70c52ec95ebbff576cc8757be17be035abd45cc7831b8405552576d2847735fc3faaa2ac7db560e5c7561ecafaba7b7cc2d1
-
SSDEEP
12288:LMrhy90ytASS6aW9rnX1r20CSn3aBWn8DrUUFK/wKpKGHHkTfWx:ey+7JsrdrXqBe8Drj0wSKeHT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4997.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4997.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1564-192-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-194-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-191-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-196-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-198-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-200-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-202-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-204-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-206-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-208-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-210-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-212-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-214-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-216-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-218-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-220-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-222-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/1564-224-0x0000000004DB0000-0x0000000004DEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2672 un781868.exe 2660 pro4997.exe 1564 qu9011.exe 3856 si181075.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4997.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un781868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un781868.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3924 2660 WerFault.exe 83 2152 1564 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2660 pro4997.exe 2660 pro4997.exe 1564 qu9011.exe 1564 qu9011.exe 3856 si181075.exe 3856 si181075.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2660 pro4997.exe Token: SeDebugPrivilege 1564 qu9011.exe Token: SeDebugPrivilege 3856 si181075.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4488 wrote to memory of 2672 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 82 PID 4488 wrote to memory of 2672 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 82 PID 4488 wrote to memory of 2672 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 82 PID 2672 wrote to memory of 2660 2672 un781868.exe 83 PID 2672 wrote to memory of 2660 2672 un781868.exe 83 PID 2672 wrote to memory of 2660 2672 un781868.exe 83 PID 2672 wrote to memory of 1564 2672 un781868.exe 89 PID 2672 wrote to memory of 1564 2672 un781868.exe 89 PID 2672 wrote to memory of 1564 2672 un781868.exe 89 PID 4488 wrote to memory of 3856 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 93 PID 4488 wrote to memory of 3856 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 93 PID 4488 wrote to memory of 3856 4488 8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe"C:\Users\Admin\AppData\Local\Temp\8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10844⤵
- Program crash
PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 13484⤵
- Program crash
PID:2152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2660 -ip 26601⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1564 -ip 15641⤵PID:2896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD584784fa906ec990f84721e300ef7778c
SHA17580614349547a99b77582e81b1d11eb90d5b15c
SHA25679fbf5449a257eabf3342bd14f5882cf2997e41f742099c0deff47de214a0d9d
SHA51245ad51091359c0317296bd993a24b5b2d5bf741b9f48ea83f47723d8e11495098096963e700d9cadbfbc45364f3c08d9236a34e577902a37dfa161d52e135d2d
-
Filesize
176KB
MD584784fa906ec990f84721e300ef7778c
SHA17580614349547a99b77582e81b1d11eb90d5b15c
SHA25679fbf5449a257eabf3342bd14f5882cf2997e41f742099c0deff47de214a0d9d
SHA51245ad51091359c0317296bd993a24b5b2d5bf741b9f48ea83f47723d8e11495098096963e700d9cadbfbc45364f3c08d9236a34e577902a37dfa161d52e135d2d
-
Filesize
524KB
MD5fe9b68aab5c5575ee293ed6e1a1ae55f
SHA17cde8d701cff05f800dbf39397e7cd68e53f8eaf
SHA256f29f5b9f6b159e49d521f70e6dc90a7b8dda43ef4e5eac9e9f4b289017100a71
SHA512e105771082fb4dd2789a62d85ae4ea0bd9a50cc8d290a0a657eddd259f06af25f1eb8eee082b3e0a4569e52b387116412472b43fd9d41997e181e1143899d218
-
Filesize
524KB
MD5fe9b68aab5c5575ee293ed6e1a1ae55f
SHA17cde8d701cff05f800dbf39397e7cd68e53f8eaf
SHA256f29f5b9f6b159e49d521f70e6dc90a7b8dda43ef4e5eac9e9f4b289017100a71
SHA512e105771082fb4dd2789a62d85ae4ea0bd9a50cc8d290a0a657eddd259f06af25f1eb8eee082b3e0a4569e52b387116412472b43fd9d41997e181e1143899d218
-
Filesize
294KB
MD5663a71c19dd4a0355e54a46d42b65448
SHA1b646dec054f85e0d86855efd18fae1157815ae97
SHA2560fa049e51f73bccb5029a3d68baafcc4503108ee55933ca9a02e1cb289defe77
SHA51287f817705c6ff35fba44f9662aeebc60461f3a5e3c0cc02019d5155cf17dacc9e0f82d5eac081b584a0e5b25541da63976a35cda4dc88ff0393858f81d89c0d1
-
Filesize
294KB
MD5663a71c19dd4a0355e54a46d42b65448
SHA1b646dec054f85e0d86855efd18fae1157815ae97
SHA2560fa049e51f73bccb5029a3d68baafcc4503108ee55933ca9a02e1cb289defe77
SHA51287f817705c6ff35fba44f9662aeebc60461f3a5e3c0cc02019d5155cf17dacc9e0f82d5eac081b584a0e5b25541da63976a35cda4dc88ff0393858f81d89c0d1
-
Filesize
352KB
MD51b902a520f9726f7215b0450f9c97fe7
SHA13233515f8e7fb59f1d76dd69040499aaa986172c
SHA256f04ddb14633d420799bd7578544b6b2f256121fb470153b5f0e74da2e32308a0
SHA51245bad1fea0d2dfbe3acb377a96bc7d17edbffecef7f74d8b8af9fd3e3440e7c48ca60137b911c376e7e30725c58188d329e128d67d8ea758bff458a9754866e4
-
Filesize
352KB
MD51b902a520f9726f7215b0450f9c97fe7
SHA13233515f8e7fb59f1d76dd69040499aaa986172c
SHA256f04ddb14633d420799bd7578544b6b2f256121fb470153b5f0e74da2e32308a0
SHA51245bad1fea0d2dfbe3acb377a96bc7d17edbffecef7f74d8b8af9fd3e3440e7c48ca60137b911c376e7e30725c58188d329e128d67d8ea758bff458a9754866e4