Analysis
-
max time kernel
61s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe
Resource
win10v2004-20230220-en
General
-
Target
2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe
-
Size
660KB
-
MD5
4a539c4f66c519e1021e34a4961f94f9
-
SHA1
0de3bd871f67c478152f8ad519717b1788ecaa26
-
SHA256
2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748
-
SHA512
d5290a86324c4d2d7a4bf649a3e6c462370dac44167a68a6a75161c0bfdd482446787c989b2070a379a2e0ea68a4e34cb3538ada8d418e1d42db8f96499d7797
-
SSDEEP
12288:bMrOy90She+iJ+vAsyuO4I6n40oLOkXAbvw0JsOrLijizaWPG8pb:hyBhe+ZvAsNDI6nSQjwgsO6jiz5Gwb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1411.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1411.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4848-191-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-192-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-194-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-196-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-198-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-200-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-202-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-204-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-206-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-208-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-210-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-212-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-214-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-216-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-218-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-220-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-222-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-224-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/4848-423-0x0000000002410000-0x0000000002420000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5056 un627859.exe 5104 pro1411.exe 4848 qu4227.exe 5040 si416991.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1411.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un627859.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un627859.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3368 5104 WerFault.exe 83 2712 4848 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5104 pro1411.exe 5104 pro1411.exe 4848 qu4227.exe 4848 qu4227.exe 5040 si416991.exe 5040 si416991.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5104 pro1411.exe Token: SeDebugPrivilege 4848 qu4227.exe Token: SeDebugPrivilege 5040 si416991.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1888 wrote to memory of 5056 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 82 PID 1888 wrote to memory of 5056 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 82 PID 1888 wrote to memory of 5056 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 82 PID 5056 wrote to memory of 5104 5056 un627859.exe 83 PID 5056 wrote to memory of 5104 5056 un627859.exe 83 PID 5056 wrote to memory of 5104 5056 un627859.exe 83 PID 5056 wrote to memory of 4848 5056 un627859.exe 90 PID 5056 wrote to memory of 4848 5056 un627859.exe 90 PID 5056 wrote to memory of 4848 5056 un627859.exe 90 PID 1888 wrote to memory of 5040 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 94 PID 1888 wrote to memory of 5040 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 94 PID 1888 wrote to memory of 5040 1888 2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe"C:\Users\Admin\AppData\Local\Temp\2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 10804⤵
- Program crash
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 18964⤵
- Program crash
PID:2712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5104 -ip 51041⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4848 -ip 48481⤵PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
518KB
MD52393b4f59344c30326951143550b289b
SHA1e638ca8f17d9cdfc3bf4d50bf4470ba2ddb84a5a
SHA2560518f30cbc21c25fc91c75cc4a3e9c6c4867a8f194982ed976a4ab91a38cf17e
SHA51231fcc12346aa75c2dd5a3f1e020842b0cb66d8c4247ae37b672387b815d23639d0afcfe7aee312b8e3640dfccb49233cf3618607ffd04fd587ae2f9061dc35bc
-
Filesize
518KB
MD52393b4f59344c30326951143550b289b
SHA1e638ca8f17d9cdfc3bf4d50bf4470ba2ddb84a5a
SHA2560518f30cbc21c25fc91c75cc4a3e9c6c4867a8f194982ed976a4ab91a38cf17e
SHA51231fcc12346aa75c2dd5a3f1e020842b0cb66d8c4247ae37b672387b815d23639d0afcfe7aee312b8e3640dfccb49233cf3618607ffd04fd587ae2f9061dc35bc
-
Filesize
236KB
MD5244e04103d9d1afffaa40200671904d3
SHA18409b4dba28877b40991fefdc3be7591a1229f1d
SHA256d7e12ae3050cd819b078760e980cc1ce4df0fe4533eaa6e91de0b86c2c909abc
SHA512290358aa80338ee067d5c9c1cbf86a76b2398f7e521205f6e0bf6fb205b71268595abe475c1a566bef8a85f9adb4e915c5eb762cff96e945aa19e01f65640750
-
Filesize
236KB
MD5244e04103d9d1afffaa40200671904d3
SHA18409b4dba28877b40991fefdc3be7591a1229f1d
SHA256d7e12ae3050cd819b078760e980cc1ce4df0fe4533eaa6e91de0b86c2c909abc
SHA512290358aa80338ee067d5c9c1cbf86a76b2398f7e521205f6e0bf6fb205b71268595abe475c1a566bef8a85f9adb4e915c5eb762cff96e945aa19e01f65640750
-
Filesize
295KB
MD533e3a9674c45e2697c3131b36c0499ec
SHA1277367ee5342df5d663f725d47d8d08ac1653d52
SHA2567ed3fc1329cf4a29c234e5b1452636dd96edbb084b1203238e2ead101a97ed71
SHA5121b06d360f549f84994dddc348c9ccf291925a108ecd8500b866481b1566a805b2183f151953f49ba19d623c88ca22e808d5284a8c314c8fef98fc32ac5c13213
-
Filesize
295KB
MD533e3a9674c45e2697c3131b36c0499ec
SHA1277367ee5342df5d663f725d47d8d08ac1653d52
SHA2567ed3fc1329cf4a29c234e5b1452636dd96edbb084b1203238e2ead101a97ed71
SHA5121b06d360f549f84994dddc348c9ccf291925a108ecd8500b866481b1566a805b2183f151953f49ba19d623c88ca22e808d5284a8c314c8fef98fc32ac5c13213