Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe
Resource
win10v2004-20230220-en
General
-
Target
d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe
-
Size
663KB
-
MD5
87974105794b1562c1ef76300ab079d4
-
SHA1
bfe728d430bc7f580cdd6f717e9c6d13769962b9
-
SHA256
d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d
-
SHA512
745fc9754c9085d2dd922de4d9d491aac70d1f7bac3a2f62a71f69218a4a003287e9610ff667e9039baa7724739564aa597a6392f546780e6424104c883cc56c
-
SSDEEP
12288:eMr2y90vqIj6Qw6HLJfeJSldjdq+nep7lAyys0Lh8OpaKGO44DzWK5OGdKo9LDVt:EysqIj6WLFeYHjd7e3Lp0Vr3Gn4+K5vT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2105.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2105.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3720-192-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-191-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-194-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-196-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-198-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-200-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-202-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-204-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-206-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-208-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-210-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-212-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-214-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-216-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-218-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-220-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-222-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-224-0x0000000002440000-0x000000000247F000-memory.dmp family_redline behavioral1/memory/3720-1113-0x0000000004D50000-0x0000000004D60000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1468 un994217.exe 4004 pro2105.exe 3720 qu5827.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2105.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un994217.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un994217.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4992 4004 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4004 pro2105.exe 4004 pro2105.exe 3720 qu5827.exe 3720 qu5827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4004 pro2105.exe Token: SeDebugPrivilege 3720 qu5827.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1468 2288 d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe 82 PID 2288 wrote to memory of 1468 2288 d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe 82 PID 2288 wrote to memory of 1468 2288 d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe 82 PID 1468 wrote to memory of 4004 1468 un994217.exe 83 PID 1468 wrote to memory of 4004 1468 un994217.exe 83 PID 1468 wrote to memory of 4004 1468 un994217.exe 83 PID 1468 wrote to memory of 3720 1468 un994217.exe 89 PID 1468 wrote to memory of 3720 1468 un994217.exe 89 PID 1468 wrote to memory of 3720 1468 un994217.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe"C:\Users\Admin\AppData\Local\Temp\d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 10804⤵
- Program crash
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4004 -ip 40041⤵PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD5d6ad29d12232f47d868acce6a43c3a1d
SHA1a882e6d88bac1c1a15474e47e4de14fcb2f24086
SHA25695544c2bc450d40d3012add77166e2e7d4fa5ac0e8c3d64985254a1f38afe04a
SHA5125d1870449f935368ab7f09699ce6c2d93fcc8d683d60cc2d8919a3114e72e50da67283ad567bbc13e77fa42c57339f2511f439d61687b5dc275e0d6747b70829
-
Filesize
521KB
MD5d6ad29d12232f47d868acce6a43c3a1d
SHA1a882e6d88bac1c1a15474e47e4de14fcb2f24086
SHA25695544c2bc450d40d3012add77166e2e7d4fa5ac0e8c3d64985254a1f38afe04a
SHA5125d1870449f935368ab7f09699ce6c2d93fcc8d683d60cc2d8919a3114e72e50da67283ad567bbc13e77fa42c57339f2511f439d61687b5dc275e0d6747b70829
-
Filesize
236KB
MD5a235d42623ee51812293c961aeefcfe0
SHA1e6d7164cdf81bf16e6f1ea7b03d0d4dd0df09dba
SHA2562bb39a3926ca5f24b341d2ffb92bca5070be22090c3d38439cbccaa200282eb1
SHA512ae4ae991787ef107d086ff5107a9ca5c86af840185e720052624b53f15655fcd7dfa4580bf23561655a960ad13c5f1bcb5e408ee863bd14016c3660e69ebe2ee
-
Filesize
236KB
MD5a235d42623ee51812293c961aeefcfe0
SHA1e6d7164cdf81bf16e6f1ea7b03d0d4dd0df09dba
SHA2562bb39a3926ca5f24b341d2ffb92bca5070be22090c3d38439cbccaa200282eb1
SHA512ae4ae991787ef107d086ff5107a9ca5c86af840185e720052624b53f15655fcd7dfa4580bf23561655a960ad13c5f1bcb5e408ee863bd14016c3660e69ebe2ee
-
Filesize
294KB
MD542b67742f1376ba4d03a905f0c695a51
SHA1bd9c2a2b8d385afff2b942e5d1fc895cea8a0957
SHA25628bf747568e546df3b613463dd7c93213743dee8f0f9dc63e184d42f4bc77fee
SHA512e8406880d78fa34a8e0b311540230da2c472fa75ac13e9bed837a7d216e8db9fccde95b1d89c17670aa154a633ecee149d1c8657a8f3f3dbf85031db8552f3e2
-
Filesize
294KB
MD542b67742f1376ba4d03a905f0c695a51
SHA1bd9c2a2b8d385afff2b942e5d1fc895cea8a0957
SHA25628bf747568e546df3b613463dd7c93213743dee8f0f9dc63e184d42f4bc77fee
SHA512e8406880d78fa34a8e0b311540230da2c472fa75ac13e9bed837a7d216e8db9fccde95b1d89c17670aa154a633ecee149d1c8657a8f3f3dbf85031db8552f3e2