Analysis
-
max time kernel
99s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:20
Static task
static1
Behavioral task
behavioral1
Sample
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe
Resource
win10v2004-20230220-en
General
-
Target
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe
-
Size
658KB
-
MD5
ff3941ae83a22d66cde4f05c3205f15b
-
SHA1
ad9fb7547f358075477ecf4fe10b36ca61d252ac
-
SHA256
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0
-
SHA512
7ff01f13f3ba0993251bd4d7ed2bc10d8e10191b6f1113fcd306e76ca60ca436be6ddbe3fc8282ebd12a09978d08ea802587a73a5fb3d3d5237c01d0f887c988
-
SSDEEP
12288:tMrgy902AHCfUa/E141udt+3DQ8jwRrMAdWS44fzWKlV8vrlMLY6:1yMO/mdtoMmC5WD4qKilMLv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3427.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3427.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3427.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2072-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-223-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-225-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2072-227-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un598847.exepro3427.exequ8623.exesi649990.exepid process 4912 un598847.exe 2236 pro3427.exe 2072 qu8623.exe 3280 si649990.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3427.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3427.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exeun598847.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un598847.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un598847.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3868 2236 WerFault.exe pro3427.exe 4016 2072 WerFault.exe qu8623.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3427.exequ8623.exesi649990.exepid process 2236 pro3427.exe 2236 pro3427.exe 2072 qu8623.exe 2072 qu8623.exe 3280 si649990.exe 3280 si649990.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3427.exequ8623.exesi649990.exedescription pid process Token: SeDebugPrivilege 2236 pro3427.exe Token: SeDebugPrivilege 2072 qu8623.exe Token: SeDebugPrivilege 3280 si649990.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exeun598847.exedescription pid process target process PID 1152 wrote to memory of 4912 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe un598847.exe PID 1152 wrote to memory of 4912 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe un598847.exe PID 1152 wrote to memory of 4912 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe un598847.exe PID 4912 wrote to memory of 2236 4912 un598847.exe pro3427.exe PID 4912 wrote to memory of 2236 4912 un598847.exe pro3427.exe PID 4912 wrote to memory of 2236 4912 un598847.exe pro3427.exe PID 4912 wrote to memory of 2072 4912 un598847.exe qu8623.exe PID 4912 wrote to memory of 2072 4912 un598847.exe qu8623.exe PID 4912 wrote to memory of 2072 4912 un598847.exe qu8623.exe PID 1152 wrote to memory of 3280 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe si649990.exe PID 1152 wrote to memory of 3280 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe si649990.exe PID 1152 wrote to memory of 3280 1152 c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe si649990.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe"C:\Users\Admin\AppData\Local\Temp\c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598847.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598847.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3427.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 10164⤵
- Program crash
PID:3868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8623.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 17084⤵
- Program crash
PID:4016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649990.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2236 -ip 22361⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2072 -ip 20721⤵PID:1976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5589dbc73ab01c33abb13ca1864ec6849
SHA1dc5b5be94fdfaa98f05acd81bb23ecb3736f6894
SHA25691120e339286c976d33c040e8ea7173f7be5bf1f4801a0c92a525aca159afb71
SHA5124974505cf0bdf889c02cc9840040d03c764c18064c8c5f0d9178798f6912d0beced51647aa8aef76efc67c544865fc9f53de9df7b3788e05418a0ed4b46fd67b
-
Filesize
175KB
MD5589dbc73ab01c33abb13ca1864ec6849
SHA1dc5b5be94fdfaa98f05acd81bb23ecb3736f6894
SHA25691120e339286c976d33c040e8ea7173f7be5bf1f4801a0c92a525aca159afb71
SHA5124974505cf0bdf889c02cc9840040d03c764c18064c8c5f0d9178798f6912d0beced51647aa8aef76efc67c544865fc9f53de9df7b3788e05418a0ed4b46fd67b
-
Filesize
516KB
MD501f5f9c8e47795be3dc77c4a44782483
SHA15d4134608aacc476ed3438fd687f1f8f73d0f136
SHA256221dd23fc58e7989df6588ff3e1c39ead16a96de278f03c2a675321284b682f1
SHA512997d8bb7f063bac7a2a24e44fce948cd03ca8fc0d9025f531f758c915ecf30645e5c1217aef29a22b053f43990f2cc6b3238ad5dd8561120046669adf5f5722c
-
Filesize
516KB
MD501f5f9c8e47795be3dc77c4a44782483
SHA15d4134608aacc476ed3438fd687f1f8f73d0f136
SHA256221dd23fc58e7989df6588ff3e1c39ead16a96de278f03c2a675321284b682f1
SHA512997d8bb7f063bac7a2a24e44fce948cd03ca8fc0d9025f531f758c915ecf30645e5c1217aef29a22b053f43990f2cc6b3238ad5dd8561120046669adf5f5722c
-
Filesize
235KB
MD579d4505bafd0bbe4409973fb28e32801
SHA1f19c2d6bd1cd1f5749f4ee14818d652e6895e9fd
SHA256dd3437ca81b48a2e86d6f7f39656671b742d16039a190907bcb81b0a3d267be1
SHA51269d83f880f2e6cd1f1f8dd85d8f8e857373b9b74c9204c7c7081411274486ee50b8ecdd3e291a0fed766d51b31852907bd80f673e2d69cdfd3be07e018b5bedd
-
Filesize
235KB
MD579d4505bafd0bbe4409973fb28e32801
SHA1f19c2d6bd1cd1f5749f4ee14818d652e6895e9fd
SHA256dd3437ca81b48a2e86d6f7f39656671b742d16039a190907bcb81b0a3d267be1
SHA51269d83f880f2e6cd1f1f8dd85d8f8e857373b9b74c9204c7c7081411274486ee50b8ecdd3e291a0fed766d51b31852907bd80f673e2d69cdfd3be07e018b5bedd
-
Filesize
294KB
MD5cc985748d81be8a98cac37300a425d2b
SHA11235af3822b2f9e441b604f4da1e4b0bd1294a85
SHA2566764d53b4cfa03f8d11a9f74e26f0dbbc5aae21347ba13b767051edad9b3f220
SHA512c8f5b1738040949c928fc67f7af28fc7b7e3c976339954277eb9ae0d2d582e07f71088522961fab9f9d8116df272ce8a62e51be63afa37de62b7e1573aef1af2
-
Filesize
294KB
MD5cc985748d81be8a98cac37300a425d2b
SHA11235af3822b2f9e441b604f4da1e4b0bd1294a85
SHA2566764d53b4cfa03f8d11a9f74e26f0dbbc5aae21347ba13b767051edad9b3f220
SHA512c8f5b1738040949c928fc67f7af28fc7b7e3c976339954277eb9ae0d2d582e07f71088522961fab9f9d8116df272ce8a62e51be63afa37de62b7e1573aef1af2