Analysis
-
max time kernel
62s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe
Resource
win10v2004-20230220-en
General
-
Target
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe
-
Size
659KB
-
MD5
ebf78f10f286c370b5af52326c8fea53
-
SHA1
fb1d5b688d0feb8e5b21e343cc4a50c813c2980e
-
SHA256
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86
-
SHA512
89d13cad7d35b839c76ae154db7d2317404a6b4e2c05bb0fa0d0d279b60da0d85ba183113b368f1e84f10da7139f130da0767febc30de3e7909a519487f568a8
-
SSDEEP
12288:dMrsy90Sd/VXewgvmJU7cB2IVN88Zebhh9ohUKhGc10wZXTUB/RqgbiFJvxThS:1yF/FevvMUZITDebhKPf10iYBJqAiFJq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4814.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4814.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4256-192-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-193-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-195-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-197-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-199-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-201-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-203-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-205-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-207-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-209-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-211-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-213-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-215-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-217-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-219-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-221-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-223-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4256-225-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 704 un734897.exe 4124 pro4814.exe 4256 qu1258.exe 740 si354674.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4814.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un734897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un734897.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 996 4124 WerFault.exe 80 1480 4256 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4124 pro4814.exe 4124 pro4814.exe 4256 qu1258.exe 4256 qu1258.exe 740 si354674.exe 740 si354674.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4124 pro4814.exe Token: SeDebugPrivilege 4256 qu1258.exe Token: SeDebugPrivilege 740 si354674.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 704 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 79 PID 2016 wrote to memory of 704 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 79 PID 2016 wrote to memory of 704 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 79 PID 704 wrote to memory of 4124 704 un734897.exe 80 PID 704 wrote to memory of 4124 704 un734897.exe 80 PID 704 wrote to memory of 4124 704 un734897.exe 80 PID 704 wrote to memory of 4256 704 un734897.exe 92 PID 704 wrote to memory of 4256 704 un734897.exe 92 PID 704 wrote to memory of 4256 704 un734897.exe 92 PID 2016 wrote to memory of 740 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 96 PID 2016 wrote to memory of 740 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 96 PID 2016 wrote to memory of 740 2016 ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe"C:\Users\Admin\AppData\Local\Temp\ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10804⤵
- Program crash
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 17604⤵
- Program crash
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4124 -ip 41241⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4256 -ip 42561⤵PID:5056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
516KB
MD51d4bb67197d3d8fa87e97f7523781b82
SHA1038b5e2a1b87b118585c280086d64ce28d49cc59
SHA256e0846d5f38b68e2331a2379351784737c39e6d4ba7e19f88bdcf11b7f195f857
SHA5129742c84cc62229fbe52fdff87aaeaa8a28ee019185deee3f8b1903a572d2a516da386fc917b479e98d195d7fac19ed6f9fc24960907a1df18745bae3c95e5068
-
Filesize
516KB
MD51d4bb67197d3d8fa87e97f7523781b82
SHA1038b5e2a1b87b118585c280086d64ce28d49cc59
SHA256e0846d5f38b68e2331a2379351784737c39e6d4ba7e19f88bdcf11b7f195f857
SHA5129742c84cc62229fbe52fdff87aaeaa8a28ee019185deee3f8b1903a572d2a516da386fc917b479e98d195d7fac19ed6f9fc24960907a1df18745bae3c95e5068
-
Filesize
236KB
MD52ffa98cf23d791ea229a4d9d0c573de7
SHA1a82cece6aeb485e94fa9ddcbeef4441965b037e1
SHA256b8b88b19a3b66043a65d3338507b93e8e362c74123fb288f9e759f214ce4f53b
SHA5121d92ec9a1ee4ddb775b74e28033f753916a887fdf7e30217424822c81cbbbfefa2a9c3e949ffabb8ef003ec4ba74f6aec5c9b13ddd540a92353e4944fd8e2afc
-
Filesize
236KB
MD52ffa98cf23d791ea229a4d9d0c573de7
SHA1a82cece6aeb485e94fa9ddcbeef4441965b037e1
SHA256b8b88b19a3b66043a65d3338507b93e8e362c74123fb288f9e759f214ce4f53b
SHA5121d92ec9a1ee4ddb775b74e28033f753916a887fdf7e30217424822c81cbbbfefa2a9c3e949ffabb8ef003ec4ba74f6aec5c9b13ddd540a92353e4944fd8e2afc
-
Filesize
294KB
MD53eb272d1477ca3e0cb493ec10a9574dc
SHA1c0afb1edf2cbc5f58113f2b8bd812431c4f29395
SHA256e18b3ef8908b3462a5e733ed0d1d00239b83d3df519efc4f66dafbacbacb44e0
SHA512506f2837d490dc334fbea2a03dc8ea377a978b3b4c949eca5cc83aa3e0f262b2a58b4a0fa6055da9f62a42871071f6abd32c548b65fe7a2d033dd2c91e232520
-
Filesize
294KB
MD53eb272d1477ca3e0cb493ec10a9574dc
SHA1c0afb1edf2cbc5f58113f2b8bd812431c4f29395
SHA256e18b3ef8908b3462a5e733ed0d1d00239b83d3df519efc4f66dafbacbacb44e0
SHA512506f2837d490dc334fbea2a03dc8ea377a978b3b4c949eca5cc83aa3e0f262b2a58b4a0fa6055da9f62a42871071f6abd32c548b65fe7a2d033dd2c91e232520