Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 05:18
Static task
static1
Behavioral task
behavioral1
Sample
389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe
Resource
win10v2004-20230220-en
General
-
Target
389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe
-
Size
660KB
-
MD5
f74d1a2bf11255bdde8a51631d1c30f7
-
SHA1
ed7952128c0f7494f5b67a83947c8099f3ab07a5
-
SHA256
389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834
-
SHA512
b7f5970a24ac5ba7c8a5bdde87248c638de76b6bdaa17bbacafd7b2791b31f0adcc32ca26ed0931537b35d2ca505a3a99b66b8b7acbf0042e17c5b1130d730fa
-
SSDEEP
12288:WMrSy90Qk+lTegY7kx0w0PyLHtUL1N2yr2T:AygaY00w0mHtULLHG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9351.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9351.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2400-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2400-464-0x0000000004B90000-0x0000000004BA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4728 un141060.exe 4820 pro9351.exe 2400 qu9681.exe 488 si174899.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9351.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9351.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un141060.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un141060.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4196 4820 WerFault.exe 86 1352 2400 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4820 pro9351.exe 4820 pro9351.exe 2400 qu9681.exe 2400 qu9681.exe 488 si174899.exe 488 si174899.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4820 pro9351.exe Token: SeDebugPrivilege 2400 qu9681.exe Token: SeDebugPrivilege 488 si174899.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4728 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 85 PID 4112 wrote to memory of 4728 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 85 PID 4112 wrote to memory of 4728 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 85 PID 4728 wrote to memory of 4820 4728 un141060.exe 86 PID 4728 wrote to memory of 4820 4728 un141060.exe 86 PID 4728 wrote to memory of 4820 4728 un141060.exe 86 PID 4728 wrote to memory of 2400 4728 un141060.exe 92 PID 4728 wrote to memory of 2400 4728 un141060.exe 92 PID 4728 wrote to memory of 2400 4728 un141060.exe 92 PID 4112 wrote to memory of 488 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 96 PID 4112 wrote to memory of 488 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 96 PID 4112 wrote to memory of 488 4112 389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe"C:\Users\Admin\AppData\Local\Temp\389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 10804⤵
- Program crash
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 13524⤵
- Program crash
PID:1352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4820 -ip 48201⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2400 -ip 24001⤵PID:4848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD55e3e5593fd68cd5e984a6919ca27ce87
SHA12ef917bab09a7553e3f78d45b0d223734c2a348c
SHA256998d9d3719a8238c21f044d98766ca8ff13498f7868d379fcbe77cf17902642c
SHA5122c4f964ed33265dd862f91e9583e46557372eb42d0dc1960c88e7a6864d6c78bdcd7011f1acce4a6b8a13f0bd12de71954966887855f86a1725a77f9dcb9e819
-
Filesize
176KB
MD55e3e5593fd68cd5e984a6919ca27ce87
SHA12ef917bab09a7553e3f78d45b0d223734c2a348c
SHA256998d9d3719a8238c21f044d98766ca8ff13498f7868d379fcbe77cf17902642c
SHA5122c4f964ed33265dd862f91e9583e46557372eb42d0dc1960c88e7a6864d6c78bdcd7011f1acce4a6b8a13f0bd12de71954966887855f86a1725a77f9dcb9e819
-
Filesize
518KB
MD5250fb9859aa5acb6cc25cb6a0d16d20e
SHA14b089aa410e7afc721e50e966218cac77f3070ec
SHA2568a97affb2705ccf77432b89953720a864b369d670d05776784ca0c38c5a8881e
SHA5128c89b8ce8fca3b1ff403da9bf80a30587ca2da1545011194233d08060fb0d1d4f66553061cadc601a3f668361aacd658878846ae8b5cd9797b2e23f34b0dad56
-
Filesize
518KB
MD5250fb9859aa5acb6cc25cb6a0d16d20e
SHA14b089aa410e7afc721e50e966218cac77f3070ec
SHA2568a97affb2705ccf77432b89953720a864b369d670d05776784ca0c38c5a8881e
SHA5128c89b8ce8fca3b1ff403da9bf80a30587ca2da1545011194233d08060fb0d1d4f66553061cadc601a3f668361aacd658878846ae8b5cd9797b2e23f34b0dad56
-
Filesize
237KB
MD5b93c2ed0f3cb1937bc93e8d7cf70ad8a
SHA1333cca37db559061116bf4f0e157b38f5dcf0dfb
SHA256a86ea44a2ab42796aa7f40dd0ccd742e4243f03633b9b2308e31c8a1e7ea98d8
SHA51231e903b76ddfcce01da91936a280c545f9fc635c8c02c31c4fccea51447aaf4f9b2488871c5c8670cf1343daef8a36fdc0f4e086e11d332f7c3a2ab15f69943b
-
Filesize
237KB
MD5b93c2ed0f3cb1937bc93e8d7cf70ad8a
SHA1333cca37db559061116bf4f0e157b38f5dcf0dfb
SHA256a86ea44a2ab42796aa7f40dd0ccd742e4243f03633b9b2308e31c8a1e7ea98d8
SHA51231e903b76ddfcce01da91936a280c545f9fc635c8c02c31c4fccea51447aaf4f9b2488871c5c8670cf1343daef8a36fdc0f4e086e11d332f7c3a2ab15f69943b
-
Filesize
295KB
MD5d1f032755925ca75fb7aae4052bc33d7
SHA11d49c69e8e50051aa825902df39870ed0be6059d
SHA256e310754fceb55df776e41b07b58106bec6c809df4cb80e9a9330f775c9d72c28
SHA512b6c6621b405ec198bc5d9eca615c3f074304e4d3eade2238c6f753ba833f90c22e5555bbf27ebebd25adb4a6241e827f2664c011f66edd06192022db5ec4f873
-
Filesize
295KB
MD5d1f032755925ca75fb7aae4052bc33d7
SHA11d49c69e8e50051aa825902df39870ed0be6059d
SHA256e310754fceb55df776e41b07b58106bec6c809df4cb80e9a9330f775c9d72c28
SHA512b6c6621b405ec198bc5d9eca615c3f074304e4d3eade2238c6f753ba833f90c22e5555bbf27ebebd25adb4a6241e827f2664c011f66edd06192022db5ec4f873