Analysis
-
max time kernel
58s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:10
Static task
static1
Behavioral task
behavioral1
Sample
b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe
Resource
win10v2004-20230220-en
General
-
Target
b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe
-
Size
658KB
-
MD5
5f0dbdf98ecc6f5bc1e8fae21740f509
-
SHA1
2bcc621fa11247b324d44157b3df0e1ff932b2a8
-
SHA256
b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699
-
SHA512
da1a3df624ccd67c41758a606f9896ca0b48c47261a2c32ad2040219367fe34cfcd1e0b3bca13974068bcde1c4a658e658dafc3b0219232dfc78bb9b1cd09019
-
SSDEEP
12288:sMrKy905O3aOEpQx1t+XHQ7/SxIBAU446zWKnV8vK4Qh:+yCUREax1tAwDSQAF4DKn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6801.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6801.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6801.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4836-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-212-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-226-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-228-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4836-1110-0x0000000004AE0000-0x0000000004AF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un473997.exepro6801.exequ0219.exesi352768.exepid process 556 un473997.exe 4880 pro6801.exe 4836 qu0219.exe 1992 si352768.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6801.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6801.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6801.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exeun473997.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un473997.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un473997.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3968 4880 WerFault.exe pro6801.exe 2080 4836 WerFault.exe qu0219.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6801.exequ0219.exesi352768.exepid process 4880 pro6801.exe 4880 pro6801.exe 4836 qu0219.exe 4836 qu0219.exe 1992 si352768.exe 1992 si352768.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6801.exequ0219.exesi352768.exedescription pid process Token: SeDebugPrivilege 4880 pro6801.exe Token: SeDebugPrivilege 4836 qu0219.exe Token: SeDebugPrivilege 1992 si352768.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exeun473997.exedescription pid process target process PID 864 wrote to memory of 556 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe un473997.exe PID 864 wrote to memory of 556 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe un473997.exe PID 864 wrote to memory of 556 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe un473997.exe PID 556 wrote to memory of 4880 556 un473997.exe pro6801.exe PID 556 wrote to memory of 4880 556 un473997.exe pro6801.exe PID 556 wrote to memory of 4880 556 un473997.exe pro6801.exe PID 556 wrote to memory of 4836 556 un473997.exe qu0219.exe PID 556 wrote to memory of 4836 556 un473997.exe qu0219.exe PID 556 wrote to memory of 4836 556 un473997.exe qu0219.exe PID 864 wrote to memory of 1992 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe si352768.exe PID 864 wrote to memory of 1992 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe si352768.exe PID 864 wrote to memory of 1992 864 b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe si352768.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe"C:\Users\Admin\AppData\Local\Temp\b0a22e671152ca720b1ef2e03a9735e5386322370955ae1c98698d34dfa40699.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un473997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un473997.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6801.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6801.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 10844⤵
- Program crash
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0219.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0219.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 16364⤵
- Program crash
PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352768.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si352768.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4880 -ip 48801⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4836 -ip 48361⤵PID:1800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52cc81e124c0c0d6ab233683f92dbfb92
SHA15b95ea2e69c597125f8106acc8156cef6d2316b7
SHA256b7492daf3d4a017b470420b2761e5bc4d7dc289f7771959ac87a811f2620b1e9
SHA512771eb8dc84c57ac19ccccc4d081caf01f770fa7f0ea8acc1535eac99282714528a5730bf3cc8acf9e220a81d36bc339ab3ef9c6df9c24ad43fc6d064c12f2e8b
-
Filesize
175KB
MD52cc81e124c0c0d6ab233683f92dbfb92
SHA15b95ea2e69c597125f8106acc8156cef6d2316b7
SHA256b7492daf3d4a017b470420b2761e5bc4d7dc289f7771959ac87a811f2620b1e9
SHA512771eb8dc84c57ac19ccccc4d081caf01f770fa7f0ea8acc1535eac99282714528a5730bf3cc8acf9e220a81d36bc339ab3ef9c6df9c24ad43fc6d064c12f2e8b
-
Filesize
516KB
MD590931077c7d88374fcea04c4931dbbf3
SHA129c53897549130ab3da10c862f1d38b1be8c9be0
SHA2567e9f32755bbc4a076803004714bf2a73475415febf550acbc9df71fb5e6c6c38
SHA512ae3b567e6092d44ce59877a3ee3c931f8cd9b17f044cfbfaa91ede2738aa1313df9d9995287352ac2998926fc1b8037f89b945c1ba90d3a57d93087ace747136
-
Filesize
516KB
MD590931077c7d88374fcea04c4931dbbf3
SHA129c53897549130ab3da10c862f1d38b1be8c9be0
SHA2567e9f32755bbc4a076803004714bf2a73475415febf550acbc9df71fb5e6c6c38
SHA512ae3b567e6092d44ce59877a3ee3c931f8cd9b17f044cfbfaa91ede2738aa1313df9d9995287352ac2998926fc1b8037f89b945c1ba90d3a57d93087ace747136
-
Filesize
235KB
MD525808b868bbf572fff8314c7191666c0
SHA1cecb9a13d09647b6a3b0048f5d8dbb6675560dff
SHA256b0a118493fb1baa447ccb7c8c81a7bd9c4f4ed239db247193eed83630447fd25
SHA5125dbe8d350e3e4ce304b6cfdd7322e011f6d1f01568f6a5a3bba16822209b9c3943b243cdecbe2d302096b9133199b058eaf0ddff98e057646f12c3482c5da723
-
Filesize
235KB
MD525808b868bbf572fff8314c7191666c0
SHA1cecb9a13d09647b6a3b0048f5d8dbb6675560dff
SHA256b0a118493fb1baa447ccb7c8c81a7bd9c4f4ed239db247193eed83630447fd25
SHA5125dbe8d350e3e4ce304b6cfdd7322e011f6d1f01568f6a5a3bba16822209b9c3943b243cdecbe2d302096b9133199b058eaf0ddff98e057646f12c3482c5da723
-
Filesize
294KB
MD5a01351c23e58e9d98829fa5b3b7b8555
SHA19c9d8803d8b302bb19366e3c3e0088b2dd21a7cc
SHA256d386b8a9c2f5295d4dfd263c9c6c56503835d2035c1733322202957ba2594ef1
SHA512a4aa4b63c939f2a2a631c2a6cb7313334d1d6128cb05ea73ea5a3852852e920d843d218fa230f39cee9db126e8ed24c53cf36ba54b0001533430d86f8aa0a1a4
-
Filesize
294KB
MD5a01351c23e58e9d98829fa5b3b7b8555
SHA19c9d8803d8b302bb19366e3c3e0088b2dd21a7cc
SHA256d386b8a9c2f5295d4dfd263c9c6c56503835d2035c1733322202957ba2594ef1
SHA512a4aa4b63c939f2a2a631c2a6cb7313334d1d6128cb05ea73ea5a3852852e920d843d218fa230f39cee9db126e8ed24c53cf36ba54b0001533430d86f8aa0a1a4