Analysis
-
max time kernel
107s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:18
Static task
static1
Behavioral task
behavioral1
Sample
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
Resource
win10v2004-20230220-en
General
-
Target
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
-
Size
658KB
-
MD5
a8218ad88fa977c148d432a96a626bf6
-
SHA1
d1b33828fa7491a165bc3307d8f6f4f4755df501
-
SHA256
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738
-
SHA512
577696f114c7b0e7d30bcc311bf87ae2c6f9729eb89b6e3a0f20e449711fa1fd9529b58fc485f4899492241be50f6b452312fa264239354a6bf69e30fcdeb6ef
-
SSDEEP
12288:DMruy90+UdjGJWxf0kiVxkVuLt8/EwkgU44LzWKKf8vU9oE:5yDWjIeUEuhnXgF42KYiE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0318.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0318.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3920-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-223-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-225-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/3920-227-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5060 un530290.exe 1212 pro0318.exe 3920 qu7572.exe 2824 si495071.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0318.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0318.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un530290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un530290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3748 1212 WerFault.exe 86 3388 3920 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1212 pro0318.exe 1212 pro0318.exe 3920 qu7572.exe 3920 qu7572.exe 2824 si495071.exe 2824 si495071.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1212 pro0318.exe Token: SeDebugPrivilege 3920 qu7572.exe Token: SeDebugPrivilege 2824 si495071.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4260 wrote to memory of 5060 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 85 PID 4260 wrote to memory of 5060 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 85 PID 4260 wrote to memory of 5060 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 85 PID 5060 wrote to memory of 1212 5060 un530290.exe 86 PID 5060 wrote to memory of 1212 5060 un530290.exe 86 PID 5060 wrote to memory of 1212 5060 un530290.exe 86 PID 5060 wrote to memory of 3920 5060 un530290.exe 92 PID 5060 wrote to memory of 3920 5060 un530290.exe 92 PID 5060 wrote to memory of 3920 5060 un530290.exe 92 PID 4260 wrote to memory of 2824 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 96 PID 4260 wrote to memory of 2824 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 96 PID 4260 wrote to memory of 2824 4260 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe"C:\Users\Admin\AppData\Local\Temp\d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0318.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 10884⤵
- Program crash
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7572.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 19684⤵
- Program crash
PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si495071.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si495071.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1212 -ip 12121⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3920 -ip 39201⤵PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD582b39cf82197f48472369bbd53b49e1b
SHA16dea5b217765ab1486a2e53511be324adee1b19c
SHA256efafa48b8f3ed96089cff5c4e42b5d82bd9c1012cccbebdc175ed4ec4908b171
SHA512985269eda83f987e5dca8b280a5a639d59cf12e9ac1cf02fe1fee88bbf227d827bc82cb2e2193f2f84f745f2597423c6cf00fc922e25d0908f74e457ec13911f
-
Filesize
175KB
MD582b39cf82197f48472369bbd53b49e1b
SHA16dea5b217765ab1486a2e53511be324adee1b19c
SHA256efafa48b8f3ed96089cff5c4e42b5d82bd9c1012cccbebdc175ed4ec4908b171
SHA512985269eda83f987e5dca8b280a5a639d59cf12e9ac1cf02fe1fee88bbf227d827bc82cb2e2193f2f84f745f2597423c6cf00fc922e25d0908f74e457ec13911f
-
Filesize
516KB
MD569e08451d317b29cc4ec452fa877491a
SHA15b6efafa9a95f867a28baf569e91f07d61656193
SHA256d35f42c4c63c7cba0a08c1b2fc498c905b92d9999f0a29daa7e0d19cb1f170b0
SHA512d19f98769def60b2d0afc5de495f4db6c15f7f3a1ccf43d58fb8637bcacc802a7014ad633cb96a7b079f4cbf2fbdbd23c2889632f0655cdea6af10720aeab210
-
Filesize
516KB
MD569e08451d317b29cc4ec452fa877491a
SHA15b6efafa9a95f867a28baf569e91f07d61656193
SHA256d35f42c4c63c7cba0a08c1b2fc498c905b92d9999f0a29daa7e0d19cb1f170b0
SHA512d19f98769def60b2d0afc5de495f4db6c15f7f3a1ccf43d58fb8637bcacc802a7014ad633cb96a7b079f4cbf2fbdbd23c2889632f0655cdea6af10720aeab210
-
Filesize
235KB
MD5286043e29340f4e9be8245655cfc5544
SHA1acb4ac67aed93f4868adb55919d1687f5c9c06d6
SHA25670f7ea1b6248622dc2595f828feb244e473e96ab9bdfa8d3032554c802f74daa
SHA5128291b19547eb671c5bb9edadc8a59c2366f4e9ea6bd71681d473d3a8fe3156032d1bcc0765a4a7cfc86beb34b48a71b1cfed2f4326a519bd6ba6fac7172fc90f
-
Filesize
235KB
MD5286043e29340f4e9be8245655cfc5544
SHA1acb4ac67aed93f4868adb55919d1687f5c9c06d6
SHA25670f7ea1b6248622dc2595f828feb244e473e96ab9bdfa8d3032554c802f74daa
SHA5128291b19547eb671c5bb9edadc8a59c2366f4e9ea6bd71681d473d3a8fe3156032d1bcc0765a4a7cfc86beb34b48a71b1cfed2f4326a519bd6ba6fac7172fc90f
-
Filesize
294KB
MD595980a917d5cf6fccefa0382940cf584
SHA11431f14d21b8dc2acdda68e58b025f08bea94e35
SHA256b108f04a1776fd8397fc21472b789bb59e552e6330cabb2382378377c88fcee3
SHA5122d4d65800783434a7b079d74d952168ec05612633ce4f82f33f52a9e53403c28b7e1c15ef07fa30d015a27ac9bbd5ea32c23db33d19d6c76795d3d975915b7a1
-
Filesize
294KB
MD595980a917d5cf6fccefa0382940cf584
SHA11431f14d21b8dc2acdda68e58b025f08bea94e35
SHA256b108f04a1776fd8397fc21472b789bb59e552e6330cabb2382378377c88fcee3
SHA5122d4d65800783434a7b079d74d952168ec05612633ce4f82f33f52a9e53403c28b7e1c15ef07fa30d015a27ac9bbd5ea32c23db33d19d6c76795d3d975915b7a1