Analysis
-
max time kernel
106s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:37
Static task
static1
Behavioral task
behavioral1
Sample
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe
Resource
win10v2004-20230220-en
General
-
Target
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe
-
Size
658KB
-
MD5
43e4f58323683d6cf34c890aac6bfc98
-
SHA1
9016fa07be5b549da3bfa08e7da38bccc4c87cba
-
SHA256
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416
-
SHA512
0bbaf57622eaa0d11979f93d6d053dbffb512b13e757c643b221ec439321dcd6d6643eadf8bbddf092450a4d97760cfe9e6ab80a6b0696f7eb794382bb449211
-
SSDEEP
12288:8Mroy90KtmUAd3m1mAE1DWwp8TyYkfAPWiLt800JrM3440zWKCT8vrd+x:kyJtevB1D3pu+ihcFMo4dKUx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5676.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5676.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/5100-191-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-192-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-194-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-196-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-198-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-200-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-202-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-204-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-206-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-208-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-210-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-212-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-214-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-216-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-220-0x0000000002130000-0x0000000002140000-memory.dmp family_redline behavioral1/memory/5100-219-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-226-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-228-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/5100-223-0x0000000005050000-0x000000000508F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un003941.exepro5676.exequ8310.exesi824040.exepid process 1868 un003941.exe 428 pro5676.exe 5100 qu8310.exe 4372 si824040.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5676.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5676.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5676.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exeun003941.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un003941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un003941.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3616 428 WerFault.exe pro5676.exe 4824 5100 WerFault.exe qu8310.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5676.exequ8310.exesi824040.exepid process 428 pro5676.exe 428 pro5676.exe 5100 qu8310.exe 5100 qu8310.exe 4372 si824040.exe 4372 si824040.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5676.exequ8310.exesi824040.exedescription pid process Token: SeDebugPrivilege 428 pro5676.exe Token: SeDebugPrivilege 5100 qu8310.exe Token: SeDebugPrivilege 4372 si824040.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exeun003941.exedescription pid process target process PID 1832 wrote to memory of 1868 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe un003941.exe PID 1832 wrote to memory of 1868 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe un003941.exe PID 1832 wrote to memory of 1868 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe un003941.exe PID 1868 wrote to memory of 428 1868 un003941.exe pro5676.exe PID 1868 wrote to memory of 428 1868 un003941.exe pro5676.exe PID 1868 wrote to memory of 428 1868 un003941.exe pro5676.exe PID 1868 wrote to memory of 5100 1868 un003941.exe qu8310.exe PID 1868 wrote to memory of 5100 1868 un003941.exe qu8310.exe PID 1868 wrote to memory of 5100 1868 un003941.exe qu8310.exe PID 1832 wrote to memory of 4372 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe si824040.exe PID 1832 wrote to memory of 4372 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe si824040.exe PID 1832 wrote to memory of 4372 1832 7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe si824040.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe"C:\Users\Admin\AppData\Local\Temp\7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 10924⤵
- Program crash
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 13284⤵
- Program crash
PID:4824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 428 -ip 4281⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5100 -ip 51001⤵PID:5032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fdecfa3560cae7d802a572d0aa896b7e
SHA13f1a86406e52f054db8156395533660d3353897c
SHA256c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f
SHA512045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240
-
Filesize
175KB
MD5fdecfa3560cae7d802a572d0aa896b7e
SHA13f1a86406e52f054db8156395533660d3353897c
SHA256c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f
SHA512045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240
-
Filesize
516KB
MD58ef3ca7ff6734cb6d5a4eff68d0b0ffd
SHA11df4a669dff2b825e833905274fadd7178c06d82
SHA2568ec9c6476b06c51b8d41b1e44b611a13a6b3c40ad81fa3b44f764d755d0d9f16
SHA512e0801f20c3ca2a9f287a1fd2be639559868d0ad87d09cb3f709d6a5f546c02f39d079ec1628ac7ead60a02f53bbe825322f06c22f45329cc1e823dbe5edef34e
-
Filesize
516KB
MD58ef3ca7ff6734cb6d5a4eff68d0b0ffd
SHA11df4a669dff2b825e833905274fadd7178c06d82
SHA2568ec9c6476b06c51b8d41b1e44b611a13a6b3c40ad81fa3b44f764d755d0d9f16
SHA512e0801f20c3ca2a9f287a1fd2be639559868d0ad87d09cb3f709d6a5f546c02f39d079ec1628ac7ead60a02f53bbe825322f06c22f45329cc1e823dbe5edef34e
-
Filesize
235KB
MD5dd82c0457060cf673b88e69201fdf1ad
SHA1b4fdc551d60da2deec1a5fae3886cbbec49180f9
SHA2565ae30a60fbcf525b218c2c7b3aa4bf94f38d6e40f7cab42db4356ed0fdcf1110
SHA5120a982706414d38fa5a915327208e7ac8b314383b6a630835ec3e88ebd0d5c242688c35bc86ea41179f504c15e5e1d08bfcc0907061cf4a37011bf7f7bfec54df
-
Filesize
235KB
MD5dd82c0457060cf673b88e69201fdf1ad
SHA1b4fdc551d60da2deec1a5fae3886cbbec49180f9
SHA2565ae30a60fbcf525b218c2c7b3aa4bf94f38d6e40f7cab42db4356ed0fdcf1110
SHA5120a982706414d38fa5a915327208e7ac8b314383b6a630835ec3e88ebd0d5c242688c35bc86ea41179f504c15e5e1d08bfcc0907061cf4a37011bf7f7bfec54df
-
Filesize
294KB
MD52655e9a4357ead1ecc2f30ca719ad753
SHA1fb2a6fae20d6dcf3cbc39063af03783b918f400c
SHA256bd592af2ffd30b6089070ea8fbbf53f3d84d9aaadc54d2cbcab26b7ea349449d
SHA5127f6bc49ebdbee73ae95ed8223aca0aa6ea79f8535fb0f07afb3cb0d315fda6b85cd2d96fdd668e4ab1614cdf13f6662097561271ad6c0a9d063b61b6037b9071
-
Filesize
294KB
MD52655e9a4357ead1ecc2f30ca719ad753
SHA1fb2a6fae20d6dcf3cbc39063af03783b918f400c
SHA256bd592af2ffd30b6089070ea8fbbf53f3d84d9aaadc54d2cbcab26b7ea349449d
SHA5127f6bc49ebdbee73ae95ed8223aca0aa6ea79f8535fb0f07afb3cb0d315fda6b85cd2d96fdd668e4ab1614cdf13f6662097561271ad6c0a9d063b61b6037b9071