Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe
Resource
win10v2004-20230221-en
General
-
Target
dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe
-
Size
658KB
-
MD5
5358cec708bb0d674158b1dc6466baf5
-
SHA1
426dc82b6a30d1fb4b6c1e1471e60dce2381cb2a
-
SHA256
dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015
-
SHA512
854a86b053e1fd28a536d6c6d7a9c1fd679957df360e057f891a60a59cd89edc549426a93fd281edade4ec815f2414a26236c43e4d7d792fc53ed42985459fb9
-
SSDEEP
12288:oMr6y90S9jkZ7syDooLVF4fHW+QxM9ohUgt8msqCKNjyjpU0j8RUgcwew2rW:yyDFM7L74nUztdjyBaUXwek
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5734.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2592-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-204-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-206-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-208-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-210-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-212-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2592-1109-0x0000000004AE0000-0x0000000004AF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4776 un252004.exe 2416 pro5734.exe 2592 qu1187.exe 3560 si352052.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5734.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un252004.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un252004.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1284 2416 WerFault.exe 85 2364 2592 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2416 pro5734.exe 2416 pro5734.exe 2592 qu1187.exe 2592 qu1187.exe 3560 si352052.exe 3560 si352052.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2416 pro5734.exe Token: SeDebugPrivilege 2592 qu1187.exe Token: SeDebugPrivilege 3560 si352052.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4776 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 84 PID 1304 wrote to memory of 4776 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 84 PID 1304 wrote to memory of 4776 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 84 PID 4776 wrote to memory of 2416 4776 un252004.exe 85 PID 4776 wrote to memory of 2416 4776 un252004.exe 85 PID 4776 wrote to memory of 2416 4776 un252004.exe 85 PID 4776 wrote to memory of 2592 4776 un252004.exe 91 PID 4776 wrote to memory of 2592 4776 un252004.exe 91 PID 4776 wrote to memory of 2592 4776 un252004.exe 91 PID 1304 wrote to memory of 3560 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 96 PID 1304 wrote to memory of 3560 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 96 PID 1304 wrote to memory of 3560 1304 dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe"C:\Users\Admin\AppData\Local\Temp\dad8be73cb1576ce3132a60a8a12a8b100432ac4e92417c9ed99f0f1a2106015.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un252004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un252004.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5734.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 10804⤵
- Program crash
PID:1284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1187.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 10964⤵
- Program crash
PID:2364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352052.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2416 -ip 24161⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2592 -ip 25921⤵PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
516KB
MD52bba071fdf6ed3579048362816027564
SHA150349eb8152407b56ffae879d0436d90df6242ba
SHA256daee381528b7e1896869dd8e5240613ad6a234f667120c9bb2ccae26fcbae278
SHA512c6f99f5f627fd3d52f0e5ff68d4690504a6b0dbb75337eff0119fe4645aa7a46864719bc39bc8d9f902778bd713b0ccaad310af8cae1df7d12624dcdd62950ba
-
Filesize
516KB
MD52bba071fdf6ed3579048362816027564
SHA150349eb8152407b56ffae879d0436d90df6242ba
SHA256daee381528b7e1896869dd8e5240613ad6a234f667120c9bb2ccae26fcbae278
SHA512c6f99f5f627fd3d52f0e5ff68d4690504a6b0dbb75337eff0119fe4645aa7a46864719bc39bc8d9f902778bd713b0ccaad310af8cae1df7d12624dcdd62950ba
-
Filesize
236KB
MD5953fbde73a2b92414bd6002c858a4ba2
SHA1971c931969fba8289e255e87c98568f26180b7fb
SHA256c95c5763e884b8f65f7916fb286e187e53fc9f384952e9382f26a008e5112536
SHA5122c64024ac6fb5f1cf870cb1766f5927c2ed69733fcdb0ce9ab33b10b85c25aa5b6bf5b1550cd8ce291962d8d4e51471874a9a398d145e231fca429e055930e4b
-
Filesize
236KB
MD5953fbde73a2b92414bd6002c858a4ba2
SHA1971c931969fba8289e255e87c98568f26180b7fb
SHA256c95c5763e884b8f65f7916fb286e187e53fc9f384952e9382f26a008e5112536
SHA5122c64024ac6fb5f1cf870cb1766f5927c2ed69733fcdb0ce9ab33b10b85c25aa5b6bf5b1550cd8ce291962d8d4e51471874a9a398d145e231fca429e055930e4b
-
Filesize
294KB
MD5ccfda434c43f6801067b1263783c5bbc
SHA15d991425b3d1ba6ef4a5fa0948011a313f44e315
SHA256bb50b78a196d8e9d48be0623e621109d2992b9e9e87551cc179de74f1218a8ac
SHA5120e90024047b3ed84bad70e8ff92568cab89119b6500f42c4745679b865e43514758dc47cc85b08266c9226800050b011ceba9879727b77e7adfb9e7f2a57f3d1
-
Filesize
294KB
MD5ccfda434c43f6801067b1263783c5bbc
SHA15d991425b3d1ba6ef4a5fa0948011a313f44e315
SHA256bb50b78a196d8e9d48be0623e621109d2992b9e9e87551cc179de74f1218a8ac
SHA5120e90024047b3ed84bad70e8ff92568cab89119b6500f42c4745679b865e43514758dc47cc85b08266c9226800050b011ceba9879727b77e7adfb9e7f2a57f3d1