Analysis
-
max time kernel
62s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe
Resource
win10v2004-20230220-en
General
-
Target
f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe
-
Size
658KB
-
MD5
28f5f6b8a4df2e2fe862a445e33ad6c9
-
SHA1
4dcd112fe818f398f728cb9290ef3962764ebb54
-
SHA256
f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4
-
SHA512
5efcf8e4bcc90a43825d35e90ba3308756f199cb10c188329df8d48071d1fb9ca75c219cd8cff3d741e1bd26c888641c824a87e28314ce13afd4c8b27636a057
-
SSDEEP
12288:EMr0y90kgRWHeQNjDna/2+9ohU8KSUE+YdmuKjpi0zeRQgQfO8Rmw:IyzgcnX2BRnDYQzfO88w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3535.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3535.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2096-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-204-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-206-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-208-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-210-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-212-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2096-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 768 un487599.exe 464 pro3535.exe 2096 qu6467.exe 4864 si016780.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3535.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un487599.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un487599.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4284 464 WerFault.exe 80 1692 2096 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 464 pro3535.exe 464 pro3535.exe 2096 qu6467.exe 2096 qu6467.exe 4864 si016780.exe 4864 si016780.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 464 pro3535.exe Token: SeDebugPrivilege 2096 qu6467.exe Token: SeDebugPrivilege 4864 si016780.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3356 wrote to memory of 768 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 79 PID 3356 wrote to memory of 768 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 79 PID 3356 wrote to memory of 768 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 79 PID 768 wrote to memory of 464 768 un487599.exe 80 PID 768 wrote to memory of 464 768 un487599.exe 80 PID 768 wrote to memory of 464 768 un487599.exe 80 PID 768 wrote to memory of 2096 768 un487599.exe 88 PID 768 wrote to memory of 2096 768 un487599.exe 88 PID 768 wrote to memory of 2096 768 un487599.exe 88 PID 3356 wrote to memory of 4864 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 92 PID 3356 wrote to memory of 4864 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 92 PID 3356 wrote to memory of 4864 3356 f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe"C:\Users\Admin\AppData\Local\Temp\f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 10804⤵
- Program crash
PID:4284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 17884⤵
- Program crash
PID:1692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 464 -ip 4641⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2096 -ip 20961⤵PID:5028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
516KB
MD5b5c98343763d867a45d8247976e5adc5
SHA1efb1cfa6fb866fc804fa142600d433b6e09b88f7
SHA2563b40a96810aecefcefc0f8fe93785c159fc92187c2387a028ca3180472acd09a
SHA5122a8deb60e057db3f8e24562c20257f86159414208361164e7beb6711d9c9e08ee43e540e016d4f64bfd2e8a772873da76177da82bfd5d18e813bb5148e0ae317
-
Filesize
516KB
MD5b5c98343763d867a45d8247976e5adc5
SHA1efb1cfa6fb866fc804fa142600d433b6e09b88f7
SHA2563b40a96810aecefcefc0f8fe93785c159fc92187c2387a028ca3180472acd09a
SHA5122a8deb60e057db3f8e24562c20257f86159414208361164e7beb6711d9c9e08ee43e540e016d4f64bfd2e8a772873da76177da82bfd5d18e813bb5148e0ae317
-
Filesize
236KB
MD5dd214f0146307b7c81d36e3914c946b0
SHA1b1f37b01765a9f92f1118f431789f9eee5959499
SHA256ffb561781c62aede090817fd47713808e556a6c7546c333af9f0abe9b59222a7
SHA5122dc2f57943a013fda755e3ccf2488e7e9fd94e3e295ce40480b96561f7a5be72d2eb43825a628f3c8ba0073d05b3e89167071f366aac9a675077ecaca293fed8
-
Filesize
236KB
MD5dd214f0146307b7c81d36e3914c946b0
SHA1b1f37b01765a9f92f1118f431789f9eee5959499
SHA256ffb561781c62aede090817fd47713808e556a6c7546c333af9f0abe9b59222a7
SHA5122dc2f57943a013fda755e3ccf2488e7e9fd94e3e295ce40480b96561f7a5be72d2eb43825a628f3c8ba0073d05b3e89167071f366aac9a675077ecaca293fed8
-
Filesize
294KB
MD5c39a2eb1497d355522763bbd4ebce5d8
SHA18bae64f63df8ecdd89b00b0bb6368d72cbedc6f0
SHA2569ec1440bd760af09a91149d97bc4c7cf6873b47727e772ee31d1b603bb1e027c
SHA512a22e70f7abd78e43bd6ef028fe57abec4c40b3b02b3723a32192742e3264f7e8b63f290f777097fcc85978c47869ed08943e23c3362171c67d6ad5cd4e8b67ac
-
Filesize
294KB
MD5c39a2eb1497d355522763bbd4ebce5d8
SHA18bae64f63df8ecdd89b00b0bb6368d72cbedc6f0
SHA2569ec1440bd760af09a91149d97bc4c7cf6873b47727e772ee31d1b603bb1e027c
SHA512a22e70f7abd78e43bd6ef028fe57abec4c40b3b02b3723a32192742e3264f7e8b63f290f777097fcc85978c47869ed08943e23c3362171c67d6ad5cd4e8b67ac