Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe
Resource
win10v2004-20230220-en
General
-
Target
37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe
-
Size
660KB
-
MD5
84a813dc3fe1e8bba6f3900941541dbe
-
SHA1
14d79e264794ec3fea401b6cbbdea8c530799ffe
-
SHA256
37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf
-
SHA512
a5b688b065136eac52db4b276d1752e075a22f290bb982f3091dbd6209ae6ef4b48c14f66c4ae33fca0118e75f4c48d9f9c9036252a31f5d102476c0a3f05f7c
-
SSDEEP
12288:UMrEy90jXf69q+Xj+7s7xDl0n6oCF1X2YFZSlg8dal6Rjsyuky1tN:Iy2f8Xj+A9DXlalgNs+yW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5887.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5887.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/992-176-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-170-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-167-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-181-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-188-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-184-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-192-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-197-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-201-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-204-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-208-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-212-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-216-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-219-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-221-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-223-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/992-225-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un951892.exepro5887.exepro5887.exequ0054.exesi492731.exepid process 4128 un951892.exe 3748 pro5887.exe 2988 pro5887.exe 992 qu0054.exe 1304 si492731.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5887.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5887.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exeun951892.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un951892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un951892.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro5887.exedescription pid process target process PID 3748 set thread context of 2988 3748 pro5887.exe pro5887.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4488 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1228 992 WerFault.exe qu0054.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5887.exequ0054.exesi492731.exepid process 2988 pro5887.exe 2988 pro5887.exe 992 qu0054.exe 992 qu0054.exe 1304 si492731.exe 1304 si492731.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5887.exequ0054.exesi492731.exedescription pid process Token: SeDebugPrivilege 2988 pro5887.exe Token: SeDebugPrivilege 992 qu0054.exe Token: SeDebugPrivilege 1304 si492731.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exeun951892.exepro5887.exedescription pid process target process PID 368 wrote to memory of 4128 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe un951892.exe PID 368 wrote to memory of 4128 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe un951892.exe PID 368 wrote to memory of 4128 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe un951892.exe PID 4128 wrote to memory of 3748 4128 un951892.exe pro5887.exe PID 4128 wrote to memory of 3748 4128 un951892.exe pro5887.exe PID 4128 wrote to memory of 3748 4128 un951892.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 3748 wrote to memory of 2988 3748 pro5887.exe pro5887.exe PID 4128 wrote to memory of 992 4128 un951892.exe qu0054.exe PID 4128 wrote to memory of 992 4128 un951892.exe qu0054.exe PID 4128 wrote to memory of 992 4128 un951892.exe qu0054.exe PID 368 wrote to memory of 1304 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe si492731.exe PID 368 wrote to memory of 1304 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe si492731.exe PID 368 wrote to memory of 1304 368 37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe si492731.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe"C:\Users\Admin\AppData\Local\Temp\37382274ea37c78c862cac1d26d8f24b5b008d5bd26f69262b0cd228f6845baf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un951892.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un951892.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5887.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5887.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0054.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 19564⤵
- Program crash
PID:1228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si492731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si492731.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 992 -ip 9921⤵PID:4536
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD516ae2962eadab97e788c36cc3dd96597
SHA1c35ebcf43aa9447e3c724155abeed1d1fe856ae4
SHA2563b182ea4dd87f3a91fa1ceac4e8980a66e0114edf721b7d7dbcca802b1541c4a
SHA51281a74e66559fdce4943b68daa5279367065c980338e5eda0ba4bcbafaf86f7a501ef6f631270a77b899b4eb1a319744603a849fb0cb7cfcf8807fc34c05e58a8
-
Filesize
175KB
MD516ae2962eadab97e788c36cc3dd96597
SHA1c35ebcf43aa9447e3c724155abeed1d1fe856ae4
SHA2563b182ea4dd87f3a91fa1ceac4e8980a66e0114edf721b7d7dbcca802b1541c4a
SHA51281a74e66559fdce4943b68daa5279367065c980338e5eda0ba4bcbafaf86f7a501ef6f631270a77b899b4eb1a319744603a849fb0cb7cfcf8807fc34c05e58a8
-
Filesize
517KB
MD5f31221a855386c6a6999a18634d8d2d3
SHA19c4417aaa8c62ff8b31ea4b74297522c072254e9
SHA256362ef2e9d5a5bed0a4deaeafb3574d08d27ceb8bf32d4c53324549a9a4550f00
SHA5120c0264e21a40b4e395f99fd473f52b04653db0da82a71a43d44e5850570e735859c42f0fda6f010159ecaf667938402e854a8da5004b1d02b1432f1d03b8ac04
-
Filesize
517KB
MD5f31221a855386c6a6999a18634d8d2d3
SHA19c4417aaa8c62ff8b31ea4b74297522c072254e9
SHA256362ef2e9d5a5bed0a4deaeafb3574d08d27ceb8bf32d4c53324549a9a4550f00
SHA5120c0264e21a40b4e395f99fd473f52b04653db0da82a71a43d44e5850570e735859c42f0fda6f010159ecaf667938402e854a8da5004b1d02b1432f1d03b8ac04
-
Filesize
237KB
MD57d2c6e32d5a4dd5ca3b190ea9387269d
SHA1d3b079dbe1799d1dc57e16be923de413775bfd41
SHA2564ff6086466e548a917e20114db6f1f2efc15846556bad3262e995e6f1168cc79
SHA512c8e518421cf55a52c274a2a7b0874ef35e5099de675f98e7b07501063a0c9f8086c4afc6dee3078dd9b9440b6d518672e1334dacb3232bed98b7469aa459ec1a
-
Filesize
237KB
MD57d2c6e32d5a4dd5ca3b190ea9387269d
SHA1d3b079dbe1799d1dc57e16be923de413775bfd41
SHA2564ff6086466e548a917e20114db6f1f2efc15846556bad3262e995e6f1168cc79
SHA512c8e518421cf55a52c274a2a7b0874ef35e5099de675f98e7b07501063a0c9f8086c4afc6dee3078dd9b9440b6d518672e1334dacb3232bed98b7469aa459ec1a
-
Filesize
237KB
MD57d2c6e32d5a4dd5ca3b190ea9387269d
SHA1d3b079dbe1799d1dc57e16be923de413775bfd41
SHA2564ff6086466e548a917e20114db6f1f2efc15846556bad3262e995e6f1168cc79
SHA512c8e518421cf55a52c274a2a7b0874ef35e5099de675f98e7b07501063a0c9f8086c4afc6dee3078dd9b9440b6d518672e1334dacb3232bed98b7469aa459ec1a
-
Filesize
294KB
MD57166450e9e5ff4e1e6bac8e404f8099f
SHA1fc801fef5d47a25a777bcdf6a1543a1f329be99d
SHA256bd72dbee9704bee718c9c5055db1f052d5913feaee2b85cbe9e891e287035ad2
SHA51221693bd8df0a3d2be7144abcba3e06afd5f6a4ad23b00af2299eeddd2032cf63e65e4a3ecb0158176095dcf63bdd92967074c48bd2b5115fbce673ee795c148a
-
Filesize
294KB
MD57166450e9e5ff4e1e6bac8e404f8099f
SHA1fc801fef5d47a25a777bcdf6a1543a1f329be99d
SHA256bd72dbee9704bee718c9c5055db1f052d5913feaee2b85cbe9e891e287035ad2
SHA51221693bd8df0a3d2be7144abcba3e06afd5f6a4ad23b00af2299eeddd2032cf63e65e4a3ecb0158176095dcf63bdd92967074c48bd2b5115fbce673ee795c148a