Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe
Resource
win10v2004-20230220-en
General
-
Target
c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe
-
Size
660KB
-
MD5
c21a9468cdefa5595ba90c469d7000f8
-
SHA1
57f06a6bbf62bd7848828233bfab3304dd94c6a5
-
SHA256
c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed
-
SHA512
a508064335cf493c51e01fb5fa3517544455982f274be2d44dd15af6c51333c55a020b02b735da05672bca7d9816f5d3fb3c88346cd237dc20ae17f16c430450
-
SSDEEP
12288:fMray90Z4NMlFHgsKEO+OqeB5P+GMNDJ20u6n6UL/mEUQMBSFrjv:FyszFHz2qeB52GM5J2X6n6UL/hgBS97
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2338.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3024-192-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-191-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-194-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-196-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-198-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-200-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-202-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-204-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-206-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-211-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-213-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-215-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-217-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-219-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-221-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-223-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-225-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/3024-227-0x0000000002640000-0x000000000267F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4924 un486012.exe 3684 pro2338.exe 3024 qu7432.exe 2116 si813350.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2338.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un486012.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un486012.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3748 3684 WerFault.exe 86 3048 3024 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3684 pro2338.exe 3684 pro2338.exe 3024 qu7432.exe 3024 qu7432.exe 2116 si813350.exe 2116 si813350.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3684 pro2338.exe Token: SeDebugPrivilege 3024 qu7432.exe Token: SeDebugPrivilege 2116 si813350.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4924 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 85 PID 4264 wrote to memory of 4924 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 85 PID 4264 wrote to memory of 4924 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 85 PID 4924 wrote to memory of 3684 4924 un486012.exe 86 PID 4924 wrote to memory of 3684 4924 un486012.exe 86 PID 4924 wrote to memory of 3684 4924 un486012.exe 86 PID 4924 wrote to memory of 3024 4924 un486012.exe 89 PID 4924 wrote to memory of 3024 4924 un486012.exe 89 PID 4924 wrote to memory of 3024 4924 un486012.exe 89 PID 4264 wrote to memory of 2116 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 93 PID 4264 wrote to memory of 2116 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 93 PID 4264 wrote to memory of 2116 4264 c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe"C:\Users\Admin\AppData\Local\Temp\c49460b01c82bf896599e36952a92ccf881da345de513b7d64650ba675c252ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un486012.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un486012.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2338.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2338.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10924⤵
- Program crash
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7432.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 14724⤵
- Program crash
PID:3048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si813350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si813350.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3684 -ip 36841⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3024 -ip 30241⤵PID:3204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5eac575e69e28220ee6255a3d68217bf1
SHA1372cd0f8ff317e9aa12e5fc19ebd7d026e17234d
SHA2562146cd852a9b507e803e592938c37a71dfa9ec50a0039308718e5e6b94b0c0b8
SHA5120be22a04e4a8019d259423f72cbecd3b76353d2a70e9c0d804b36ac464e406db49f7138e667434fac001f17e6ad7f717a490dfca989cb6a2ea8ed1b705d3e5a3
-
Filesize
176KB
MD5eac575e69e28220ee6255a3d68217bf1
SHA1372cd0f8ff317e9aa12e5fc19ebd7d026e17234d
SHA2562146cd852a9b507e803e592938c37a71dfa9ec50a0039308718e5e6b94b0c0b8
SHA5120be22a04e4a8019d259423f72cbecd3b76353d2a70e9c0d804b36ac464e406db49f7138e667434fac001f17e6ad7f717a490dfca989cb6a2ea8ed1b705d3e5a3
-
Filesize
518KB
MD5928d484c6921d13f9dfdec019fc8859e
SHA16fe6614ab449dab66de99a07a6ceaba8c3e2ba87
SHA256e1804d5aab58a245df511ac8a4fd7dbcd978b978120db1ddb5fd9a1e6155651e
SHA512605f1d467d82c713178a8c1c15e407226b946d9a739aff73ae7a9c242db4ca20dc9233502dd714faf7cd0b979bc8c99270e5f5127eb1063a7b1f1a988e205065
-
Filesize
518KB
MD5928d484c6921d13f9dfdec019fc8859e
SHA16fe6614ab449dab66de99a07a6ceaba8c3e2ba87
SHA256e1804d5aab58a245df511ac8a4fd7dbcd978b978120db1ddb5fd9a1e6155651e
SHA512605f1d467d82c713178a8c1c15e407226b946d9a739aff73ae7a9c242db4ca20dc9233502dd714faf7cd0b979bc8c99270e5f5127eb1063a7b1f1a988e205065
-
Filesize
276KB
MD545bb2353f4c9d03863833e2bf9c7b730
SHA16df83c15000387c9b6d19aed464e22ee8933976c
SHA2560048beb1fed87b9bd1c8b4b0d4a6f7940dd98ef36121a12b2e18bc082f2d8a24
SHA5124e850f61546a1460e1ca8fac8856fc4a71a433416c6276fa6f071bb2bc05d31e27b8ff92a74441a4bee003fc14fa39300089a80ec45a760c8d7ad9a985661573
-
Filesize
276KB
MD545bb2353f4c9d03863833e2bf9c7b730
SHA16df83c15000387c9b6d19aed464e22ee8933976c
SHA2560048beb1fed87b9bd1c8b4b0d4a6f7940dd98ef36121a12b2e18bc082f2d8a24
SHA5124e850f61546a1460e1ca8fac8856fc4a71a433416c6276fa6f071bb2bc05d31e27b8ff92a74441a4bee003fc14fa39300089a80ec45a760c8d7ad9a985661573
-
Filesize
295KB
MD5a0ef4613da116ad8157d6624f3ab58df
SHA1131eb5103e57fc0cc5d4aa8ac15b217a22361fc7
SHA256b2a142c615f2d8fdc6421bcad06542629a0e646578c659961f8fb595b430aa58
SHA512036e35a0629bf24cafa2d31615f23a244d1287035606085a037e7c9eb4b5a5b3aac7dc6392d90ee37d728cde3b6ac17679977784efe3318280704d88087e0c50
-
Filesize
295KB
MD5a0ef4613da116ad8157d6624f3ab58df
SHA1131eb5103e57fc0cc5d4aa8ac15b217a22361fc7
SHA256b2a142c615f2d8fdc6421bcad06542629a0e646578c659961f8fb595b430aa58
SHA512036e35a0629bf24cafa2d31615f23a244d1287035606085a037e7c9eb4b5a5b3aac7dc6392d90ee37d728cde3b6ac17679977784efe3318280704d88087e0c50