Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:11
Static task
static1
Behavioral task
behavioral1
Sample
8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe
Resource
win10v2004-20230220-en
General
-
Target
8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe
-
Size
659KB
-
MD5
b97d684c7df45feb80a97bd9444cdb3d
-
SHA1
1269dd603346afe19abd62148ee8873697c10566
-
SHA256
8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7
-
SHA512
d93fb4e7087b2e3790817bbc0e5ab95d2d1d35a38a226b901a8e129baae7ca9996fc465a1831c882831ff4c6b206f1746ca3f451d8f5f2f2a8c60390072c0234
-
SSDEEP
12288:fMrky90FtFSEqtBjatDl0nUoRF1SKX/4dcZSF1Thyl6lhUINjEA:fymDStQtDPnF1ssvUUJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5353.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5353.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/368-168-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-165-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-174-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-180-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-184-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-188-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-191-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-196-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-200-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-203-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-208-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-212-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-215-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-218-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-220-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-222-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/368-224-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/592-1109-0x00000000023B0000-0x00000000023C0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un438602.exepro5353.exepro5353.exequ7172.exesi905024.exepid process 2364 un438602.exe 1524 pro5353.exe 592 pro5353.exe 368 qu7172.exe 3856 si905024.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5353.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5353.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exeun438602.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un438602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un438602.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro5353.exedescription pid process target process PID 1524 set thread context of 592 1524 pro5353.exe pro5353.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 440 368 WerFault.exe qu7172.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5353.exequ7172.exesi905024.exepid process 592 pro5353.exe 592 pro5353.exe 368 qu7172.exe 368 qu7172.exe 3856 si905024.exe 3856 si905024.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5353.exequ7172.exesi905024.exedescription pid process Token: SeDebugPrivilege 592 pro5353.exe Token: SeDebugPrivilege 368 qu7172.exe Token: SeDebugPrivilege 3856 si905024.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exeun438602.exepro5353.exedescription pid process target process PID 4668 wrote to memory of 2364 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe un438602.exe PID 4668 wrote to memory of 2364 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe un438602.exe PID 4668 wrote to memory of 2364 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe un438602.exe PID 2364 wrote to memory of 1524 2364 un438602.exe pro5353.exe PID 2364 wrote to memory of 1524 2364 un438602.exe pro5353.exe PID 2364 wrote to memory of 1524 2364 un438602.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 1524 wrote to memory of 592 1524 pro5353.exe pro5353.exe PID 2364 wrote to memory of 368 2364 un438602.exe qu7172.exe PID 2364 wrote to memory of 368 2364 un438602.exe qu7172.exe PID 2364 wrote to memory of 368 2364 un438602.exe qu7172.exe PID 4668 wrote to memory of 3856 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe si905024.exe PID 4668 wrote to memory of 3856 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe si905024.exe PID 4668 wrote to memory of 3856 4668 8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe si905024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe"C:\Users\Admin\AppData\Local\Temp\8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438602.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5353.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5353.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7172.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 17404⤵
- Program crash
PID:440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si905024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si905024.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 368 -ip 3681⤵PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4675ce41dbccd6ea12cd29f8e777886
SHA194dfb977e1d9a6229be995addf009ed7f0e63c58
SHA256e0bfdd28b5e81f4a2435deacc7304357249ac9ae86e4b4ca79e126fb7357af69
SHA512aeafec548ec46a19d2e4519a21cd0f4f59de2343ec3835896177a4f79e59a71c509f8270809b83c19efb0853b4a1363b741c0621aeb317fd7921017c91970825
-
Filesize
175KB
MD5d4675ce41dbccd6ea12cd29f8e777886
SHA194dfb977e1d9a6229be995addf009ed7f0e63c58
SHA256e0bfdd28b5e81f4a2435deacc7304357249ac9ae86e4b4ca79e126fb7357af69
SHA512aeafec548ec46a19d2e4519a21cd0f4f59de2343ec3835896177a4f79e59a71c509f8270809b83c19efb0853b4a1363b741c0621aeb317fd7921017c91970825
-
Filesize
517KB
MD5cc0715762ece2c0e03c60ae3e7e172c1
SHA1e47c6eb9a45ba5c335f74036f21ffc70561cbc50
SHA2566af5e0ee693e725aa00f0f2cc07e2468ae836966714bcf5fa352e1b747fea99b
SHA512cbe1e5ff3fd55c262b0307f981e9e24f8f9636b7d30ba0dff6ddffc94344ca28c03ccd6720ffcb5b08f21e9d3c832ba5941d3fe420a8a1f08f7203c7bf66852c
-
Filesize
517KB
MD5cc0715762ece2c0e03c60ae3e7e172c1
SHA1e47c6eb9a45ba5c335f74036f21ffc70561cbc50
SHA2566af5e0ee693e725aa00f0f2cc07e2468ae836966714bcf5fa352e1b747fea99b
SHA512cbe1e5ff3fd55c262b0307f981e9e24f8f9636b7d30ba0dff6ddffc94344ca28c03ccd6720ffcb5b08f21e9d3c832ba5941d3fe420a8a1f08f7203c7bf66852c
-
Filesize
237KB
MD5d5b003f5e724e75bc055be26c82ba459
SHA11f372d7ff316ea85b611c72b6bed2e33ae069d55
SHA256cf4b393115ee9541a1dd16f3ef0390a3eea943c07229e52624782930e7267f72
SHA5123743182bedf258332f2e19acc4f6254317dd1baf7db7bd96d99582675b862fedfb957ddf480e9054637dce767a150aeeee1da6a7c1f661bab1fe4877d38a5569
-
Filesize
237KB
MD5d5b003f5e724e75bc055be26c82ba459
SHA11f372d7ff316ea85b611c72b6bed2e33ae069d55
SHA256cf4b393115ee9541a1dd16f3ef0390a3eea943c07229e52624782930e7267f72
SHA5123743182bedf258332f2e19acc4f6254317dd1baf7db7bd96d99582675b862fedfb957ddf480e9054637dce767a150aeeee1da6a7c1f661bab1fe4877d38a5569
-
Filesize
237KB
MD5d5b003f5e724e75bc055be26c82ba459
SHA11f372d7ff316ea85b611c72b6bed2e33ae069d55
SHA256cf4b393115ee9541a1dd16f3ef0390a3eea943c07229e52624782930e7267f72
SHA5123743182bedf258332f2e19acc4f6254317dd1baf7db7bd96d99582675b862fedfb957ddf480e9054637dce767a150aeeee1da6a7c1f661bab1fe4877d38a5569
-
Filesize
294KB
MD51aa81296580b454343579c2db2d88691
SHA1036218156eea4fff26b17dd485fc6832fe14b492
SHA25615d4a45abdfa2ad7a788e9d2852ffa49d75cb9f9c60283ac55cd359ace1f2e9c
SHA5129007982fae38d023a6cb8ffdde5b431a54d554a07133066fa7379946edcef476a4dc0495eb55ab5020e30c93c0fcd77063d605ea283cfbb624cee11638d6323f
-
Filesize
294KB
MD51aa81296580b454343579c2db2d88691
SHA1036218156eea4fff26b17dd485fc6832fe14b492
SHA25615d4a45abdfa2ad7a788e9d2852ffa49d75cb9f9c60283ac55cd359ace1f2e9c
SHA5129007982fae38d023a6cb8ffdde5b431a54d554a07133066fa7379946edcef476a4dc0495eb55ab5020e30c93c0fcd77063d605ea283cfbb624cee11638d6323f