Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 05:54
Static task
static1
Behavioral task
behavioral1
Sample
85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe
Resource
win10v2004-20230220-en
General
-
Target
85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe
-
Size
659KB
-
MD5
fa08e0cd871c6dab49620f3909afe5f9
-
SHA1
76c259e12925039069197df74014ab270a10bd33
-
SHA256
85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765
-
SHA512
ad47a573aab9a54b343b7ef98067de1eb46e284bd3a519770582c1059e895e0187087c36431056424e96f83c10b4ac25fd227d8935919e741967e9e768d60aa8
-
SSDEEP
12288:oMrIy90q1MJGG+udJaHU32WjJraNYqdBdDtOQ5yghXw+9Cq/x:wy/uJcGwQzONYqxDtOQZX/J
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0883.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/324-191-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-190-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-193-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-195-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-197-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-199-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-201-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-203-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-205-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-207-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-209-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-211-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-213-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-215-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-217-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-219-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-221-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-223-0x0000000005020000-0x000000000505F000-memory.dmp family_redline behavioral1/memory/324-291-0x00000000049E0000-0x00000000049F0000-memory.dmp family_redline behavioral1/memory/324-1109-0x00000000049E0000-0x00000000049F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1920 un535485.exe 1684 pro0883.exe 324 qu1020.exe 1336 si954836.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0883.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0883.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un535485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un535485.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 180 1684 WerFault.exe 83 1852 324 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1684 pro0883.exe 1684 pro0883.exe 324 qu1020.exe 324 qu1020.exe 1336 si954836.exe 1336 si954836.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1684 pro0883.exe Token: SeDebugPrivilege 324 qu1020.exe Token: SeDebugPrivilege 1336 si954836.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1920 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 82 PID 3776 wrote to memory of 1920 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 82 PID 3776 wrote to memory of 1920 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 82 PID 1920 wrote to memory of 1684 1920 un535485.exe 83 PID 1920 wrote to memory of 1684 1920 un535485.exe 83 PID 1920 wrote to memory of 1684 1920 un535485.exe 83 PID 1920 wrote to memory of 324 1920 un535485.exe 86 PID 1920 wrote to memory of 324 1920 un535485.exe 86 PID 1920 wrote to memory of 324 1920 un535485.exe 86 PID 3776 wrote to memory of 1336 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 90 PID 3776 wrote to memory of 1336 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 90 PID 3776 wrote to memory of 1336 3776 85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe"C:\Users\Admin\AppData\Local\Temp\85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 10924⤵
- Program crash
PID:180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 13284⤵
- Program crash
PID:1852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1684 -ip 16841⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 324 -ip 3241⤵PID:4752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5616fb13a99ae040d141d385ee927019e
SHA173010864f0d02024c6104be88921b24b16bb5e3e
SHA256d03dc4517ef69de08e0d7001806a4fb43b773c9aa748e03ea2d218f79143ace3
SHA5125c7bd37dca00e3bd51e12830d34bdc16a2bc7a1511b23c9be656d91d14886aedbf1357d5574f695724ea3daa74aa5d90385526022d15ef655041b5145f24819e
-
Filesize
176KB
MD5616fb13a99ae040d141d385ee927019e
SHA173010864f0d02024c6104be88921b24b16bb5e3e
SHA256d03dc4517ef69de08e0d7001806a4fb43b773c9aa748e03ea2d218f79143ace3
SHA5125c7bd37dca00e3bd51e12830d34bdc16a2bc7a1511b23c9be656d91d14886aedbf1357d5574f695724ea3daa74aa5d90385526022d15ef655041b5145f24819e
-
Filesize
517KB
MD5fff84b3667df07a42092ad1520803f5b
SHA1059081f27ff0eed94599f2544d8722c13fb96749
SHA256dc6e43979beaa1bac459c4cfb29b652457d4cde18a41acfa161a190394108b5a
SHA512068a455f880c27db7b1cceefcc3b73863cfcf5fcb7c9d274b0fcd23a6b7350ef672f080952a85ad1e2203b6b7c7b38f02fbdf12a36a837e03b6de87ddaeb9cf5
-
Filesize
517KB
MD5fff84b3667df07a42092ad1520803f5b
SHA1059081f27ff0eed94599f2544d8722c13fb96749
SHA256dc6e43979beaa1bac459c4cfb29b652457d4cde18a41acfa161a190394108b5a
SHA512068a455f880c27db7b1cceefcc3b73863cfcf5fcb7c9d274b0fcd23a6b7350ef672f080952a85ad1e2203b6b7c7b38f02fbdf12a36a837e03b6de87ddaeb9cf5
-
Filesize
237KB
MD58a172b473d64e638c74fde8535322d1e
SHA1ad0c316865d3b203dcb0bf797879d63cadfc368c
SHA256f68891fdf64f6f0f0a7eb0cda3f7a6d4c1dfe77f3b9066aa26f64c88ed6c39b2
SHA5129347b0aa536a451e7c95cff3434b4efcab7bc2ddf045dcee62672c72e9431d534a50ef8553e46279cb12b5791a053097516736974ab4c55a2a675c5d9f095d77
-
Filesize
237KB
MD58a172b473d64e638c74fde8535322d1e
SHA1ad0c316865d3b203dcb0bf797879d63cadfc368c
SHA256f68891fdf64f6f0f0a7eb0cda3f7a6d4c1dfe77f3b9066aa26f64c88ed6c39b2
SHA5129347b0aa536a451e7c95cff3434b4efcab7bc2ddf045dcee62672c72e9431d534a50ef8553e46279cb12b5791a053097516736974ab4c55a2a675c5d9f095d77
-
Filesize
295KB
MD58390a93ca79cfd09313be870f1e00828
SHA1632bb27a85f48822fe9a6cf99afd6c22db14c9ba
SHA25648ab5491db40d3bace69a79cab169c6cb4183a71d02de42718d48791565f47c4
SHA5129d2637809150b25e994985f8c6cfd77abb09a19512f9267a2f937ea943abeb9c421fe52d8e173ef06ef5716c295e282a5f242edb9bc03c6d4ac9306482478f77
-
Filesize
295KB
MD58390a93ca79cfd09313be870f1e00828
SHA1632bb27a85f48822fe9a6cf99afd6c22db14c9ba
SHA25648ab5491db40d3bace69a79cab169c6cb4183a71d02de42718d48791565f47c4
SHA5129d2637809150b25e994985f8c6cfd77abb09a19512f9267a2f937ea943abeb9c421fe52d8e173ef06ef5716c295e282a5f242edb9bc03c6d4ac9306482478f77