Analysis
-
max time kernel
60s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:15
Static task
static1
Behavioral task
behavioral1
Sample
7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe
Resource
win10v2004-20230220-en
General
-
Target
7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe
-
Size
658KB
-
MD5
de36f572128e3be12b7ec9942cb3634c
-
SHA1
3988eda08fc758ab14a04f16aa6596a69ca03194
-
SHA256
7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd
-
SHA512
f11773c16425622fcb9c80a7bfdfb197dac7556ab78e78e64979c6a64598b063cc99da69430eefa0a988a538e0308c9802c2801ccf87ad9ed143ec1c9fd1b5b5
-
SSDEEP
12288:yMrmy90KrqW0cnszm2twZu8TyhZTM0Lt8TyBB/T44QzWKIS8vWcKx6:gyJrqWtnszm2twZubZg0hp//s4ZKqKx6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0542.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0542.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/316-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-192-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-194-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-196-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-198-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-200-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-202-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-204-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-206-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-208-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-210-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-212-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-214-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-216-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-218-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-220-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-222-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/316-224-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1952 un850591.exe 2100 pro0542.exe 316 qu2165.exe 1396 si281932.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0542.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un850591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un850591.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4316 2100 WerFault.exe 87 3480 316 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2100 pro0542.exe 2100 pro0542.exe 316 qu2165.exe 316 qu2165.exe 1396 si281932.exe 1396 si281932.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2100 pro0542.exe Token: SeDebugPrivilege 316 qu2165.exe Token: SeDebugPrivilege 1396 si281932.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1952 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 86 PID 2516 wrote to memory of 1952 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 86 PID 2516 wrote to memory of 1952 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 86 PID 1952 wrote to memory of 2100 1952 un850591.exe 87 PID 1952 wrote to memory of 2100 1952 un850591.exe 87 PID 1952 wrote to memory of 2100 1952 un850591.exe 87 PID 1952 wrote to memory of 316 1952 un850591.exe 96 PID 1952 wrote to memory of 316 1952 un850591.exe 96 PID 1952 wrote to memory of 316 1952 un850591.exe 96 PID 2516 wrote to memory of 1396 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 101 PID 2516 wrote to memory of 1396 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 101 PID 2516 wrote to memory of 1396 2516 7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe"C:\Users\Admin\AppData\Local\Temp\7bd0e6587f775e43168da5da5b88134a302c77a9a41f9725f069c282a6e0c7bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850591.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0542.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 10884⤵
- Program crash
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2165.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 11484⤵
- Program crash
PID:3480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si281932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si281932.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2100 -ip 21001⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 316 -ip 3161⤵PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD567d9d59eea1cdcd2ac22aba8d2243cfc
SHA11efc3c82c6e5ec4b024f33f3de50a75cb12fc238
SHA2566422be639bba7763462c82ed9c476653619ca42c9ee4f0a3b56339e3f84c67f1
SHA512ef901c24d8131d43feb5319956487bd57cd72f0f900577203ba288ba22e381202f7c2b7614fc017c90a3fdbfd04aec99ccb726ba66d0aee1067ba69c760a3aee
-
Filesize
175KB
MD567d9d59eea1cdcd2ac22aba8d2243cfc
SHA11efc3c82c6e5ec4b024f33f3de50a75cb12fc238
SHA2566422be639bba7763462c82ed9c476653619ca42c9ee4f0a3b56339e3f84c67f1
SHA512ef901c24d8131d43feb5319956487bd57cd72f0f900577203ba288ba22e381202f7c2b7614fc017c90a3fdbfd04aec99ccb726ba66d0aee1067ba69c760a3aee
-
Filesize
516KB
MD596f2872d3cbfc4f6265987434764c8e7
SHA129bf6609c9ce749e05f25eac1e560677422f42f6
SHA25636a46679647bafbb9277010654966ee1783273e803a9a7224b5415b1c2fb8f44
SHA512085e59bc2954fefa4e7a4760d97f2ef46bd3bfffe1e4feab8797409fc99712b1a333aa781cf5e1d66f579eaa6d0084e6f4f183f2740eafa616e0d848aeae09ab
-
Filesize
516KB
MD596f2872d3cbfc4f6265987434764c8e7
SHA129bf6609c9ce749e05f25eac1e560677422f42f6
SHA25636a46679647bafbb9277010654966ee1783273e803a9a7224b5415b1c2fb8f44
SHA512085e59bc2954fefa4e7a4760d97f2ef46bd3bfffe1e4feab8797409fc99712b1a333aa781cf5e1d66f579eaa6d0084e6f4f183f2740eafa616e0d848aeae09ab
-
Filesize
235KB
MD5da455b46ad011517adc8cf20a58ee555
SHA1ad54495f902a525bab8f59dd3df6b9c11d2804db
SHA256876fdae06fa9de7b96d7878213609c549d9c396a8f89ced07d780ee4634998e3
SHA51298294c7bfa01408e74a5894152b50ce4b994dc8214ac6c257d28edb76b2766885cc28d85d0ae82f542c30b7348ebb7b2478127ab6d634f40e3df669955dd513e
-
Filesize
235KB
MD5da455b46ad011517adc8cf20a58ee555
SHA1ad54495f902a525bab8f59dd3df6b9c11d2804db
SHA256876fdae06fa9de7b96d7878213609c549d9c396a8f89ced07d780ee4634998e3
SHA51298294c7bfa01408e74a5894152b50ce4b994dc8214ac6c257d28edb76b2766885cc28d85d0ae82f542c30b7348ebb7b2478127ab6d634f40e3df669955dd513e
-
Filesize
294KB
MD57ca02a8046ed25b293651cdfc2a98779
SHA1d24f2336a944df8fe083d659feeb6a4fa3eb6b8f
SHA256fd1bc35205ba3fd1cb873d15659c3e0431f5c2ccd7e136813582cd48422b5b19
SHA512531e1aa5d405f7c638c0f650ac099e72e5b720e2f2a18bad241efbcccb9c79bf0c6b3b4a9b5733e4c38f4fb736f41d2cc70fdf93ad331e2a155d7e8a15c756b8
-
Filesize
294KB
MD57ca02a8046ed25b293651cdfc2a98779
SHA1d24f2336a944df8fe083d659feeb6a4fa3eb6b8f
SHA256fd1bc35205ba3fd1cb873d15659c3e0431f5c2ccd7e136813582cd48422b5b19
SHA512531e1aa5d405f7c638c0f650ac099e72e5b720e2f2a18bad241efbcccb9c79bf0c6b3b4a9b5733e4c38f4fb736f41d2cc70fdf93ad331e2a155d7e8a15c756b8