Analysis
-
max time kernel
97s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:35
Static task
static1
Behavioral task
behavioral1
Sample
3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe
Resource
win10v2004-20230220-en
General
-
Target
3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe
-
Size
658KB
-
MD5
0ea34545b82bcdbc187c5ded7ee5fcde
-
SHA1
c162b492872be29147e46755de052ed372324e4f
-
SHA256
3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270
-
SHA512
cc16a33b4648b3ae9eab07a989bc2da4108bbadce55c1e2527ff2ab3e808441d64b21ebdc63b039e7e56a3583fa5db84a7cf48cbf36c94b6a8d8da5d285fd31f
-
SSDEEP
12288:AMr+y905DIHV8GhjXEyrjEjg8t+7DQPgjcgBXUD1AHm344bzWK5Z8vRhe9Sfa:uyjHtOymg8t6MPccgBkDYmo4GKXwa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro5779.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5779.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-191-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-192-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-194-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-198-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-196-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-200-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-202-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-204-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-206-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-208-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-210-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-212-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-214-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-216-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-218-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-220-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-222-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/5072-224-0x00000000051B0000-0x00000000051EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un542595.exepro5779.exequ5609.exesi683738.exepid process 3660 un542595.exe 536 pro5779.exe 5072 qu5609.exe 5052 si683738.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro5779.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5779.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exeun542595.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un542595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un542595.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2788 536 WerFault.exe pro5779.exe 2076 5072 WerFault.exe qu5609.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro5779.exequ5609.exesi683738.exepid process 536 pro5779.exe 536 pro5779.exe 5072 qu5609.exe 5072 qu5609.exe 5052 si683738.exe 5052 si683738.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro5779.exequ5609.exesi683738.exedescription pid process Token: SeDebugPrivilege 536 pro5779.exe Token: SeDebugPrivilege 5072 qu5609.exe Token: SeDebugPrivilege 5052 si683738.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exeun542595.exedescription pid process target process PID 4700 wrote to memory of 3660 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe un542595.exe PID 4700 wrote to memory of 3660 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe un542595.exe PID 4700 wrote to memory of 3660 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe un542595.exe PID 3660 wrote to memory of 536 3660 un542595.exe pro5779.exe PID 3660 wrote to memory of 536 3660 un542595.exe pro5779.exe PID 3660 wrote to memory of 536 3660 un542595.exe pro5779.exe PID 3660 wrote to memory of 5072 3660 un542595.exe qu5609.exe PID 3660 wrote to memory of 5072 3660 un542595.exe qu5609.exe PID 3660 wrote to memory of 5072 3660 un542595.exe qu5609.exe PID 4700 wrote to memory of 5052 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe si683738.exe PID 4700 wrote to memory of 5052 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe si683738.exe PID 4700 wrote to memory of 5052 4700 3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe si683738.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe"C:\Users\Admin\AppData\Local\Temp\3b4054907c9ba555f053b1ee0ce9162db45b3168ff991106bd398032d6ace270.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5779.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 10804⤵
- Program crash
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5609.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5609.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 13484⤵
- Program crash
PID:2076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683738.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 536 -ip 5361⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5072 -ip 50721⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a0575e970adb4f6a825c5c71fc52fc58
SHA1e066063833492a04323fec98bc5127e7d9218e88
SHA25642196df2819241e9e0087dc70d4fd70b7e85b43cd228ee531456f6a5c6806527
SHA512a7150e6e5b21b333b03bac913d36c6ccdbdb7c98262a760aae33ee55b84aaf3b1e422ca2933f87baac869f66b5e8d51f0921795255fe6f97f94af5d57721d3fe
-
Filesize
175KB
MD5a0575e970adb4f6a825c5c71fc52fc58
SHA1e066063833492a04323fec98bc5127e7d9218e88
SHA25642196df2819241e9e0087dc70d4fd70b7e85b43cd228ee531456f6a5c6806527
SHA512a7150e6e5b21b333b03bac913d36c6ccdbdb7c98262a760aae33ee55b84aaf3b1e422ca2933f87baac869f66b5e8d51f0921795255fe6f97f94af5d57721d3fe
-
Filesize
516KB
MD575855d1bad02237ffa64325749434eb7
SHA16d9989f3df342eb5513f9b8ca935fba920af384c
SHA256158efa921b9b8318d99c23123e1f3fda3bb8b80481d1e3b282a66e8dc410104a
SHA512244621f48c25fd9f0fa4c56ae14405ff7a08f43adfc53a5317caefe28bae709f58cd37d6ede8cb68c1a890140d831adeb5634330f39fe9dfbc26768882973e57
-
Filesize
516KB
MD575855d1bad02237ffa64325749434eb7
SHA16d9989f3df342eb5513f9b8ca935fba920af384c
SHA256158efa921b9b8318d99c23123e1f3fda3bb8b80481d1e3b282a66e8dc410104a
SHA512244621f48c25fd9f0fa4c56ae14405ff7a08f43adfc53a5317caefe28bae709f58cd37d6ede8cb68c1a890140d831adeb5634330f39fe9dfbc26768882973e57
-
Filesize
235KB
MD5de28442477b7ae255b483bfd3642c593
SHA1a28acfd82c73e43f75210caeb63946a6f92babac
SHA25631f50b993307cada5643831857c0a35c3e306f138fd800eb93456482609ccc1f
SHA5129e3fdb191e053e388e2499538413b3ff81999f8fe6df83ea012a0ea4d94a7494a1e6d8d2334dbc1539c8b4b1424a6784342281fad5757616a5a74b771578b787
-
Filesize
235KB
MD5de28442477b7ae255b483bfd3642c593
SHA1a28acfd82c73e43f75210caeb63946a6f92babac
SHA25631f50b993307cada5643831857c0a35c3e306f138fd800eb93456482609ccc1f
SHA5129e3fdb191e053e388e2499538413b3ff81999f8fe6df83ea012a0ea4d94a7494a1e6d8d2334dbc1539c8b4b1424a6784342281fad5757616a5a74b771578b787
-
Filesize
294KB
MD504c4bba555fb728d7589dd84436aa802
SHA1843aaca8ee203053bee26d8d689005e98fb11d99
SHA256d20da3f6c258ee05888e3a77e902fb21b8b129d2c066ec73678c6b00185735af
SHA512ab89b82915547bb4b9680a1611bc95046cdb29d72bef2007e033adc3623688e3c05ca1233567732dc7a2fc5f49132ff2176b590906a7367a36744fc83b0747ac
-
Filesize
294KB
MD504c4bba555fb728d7589dd84436aa802
SHA1843aaca8ee203053bee26d8d689005e98fb11d99
SHA256d20da3f6c258ee05888e3a77e902fb21b8b129d2c066ec73678c6b00185735af
SHA512ab89b82915547bb4b9680a1611bc95046cdb29d72bef2007e033adc3623688e3c05ca1233567732dc7a2fc5f49132ff2176b590906a7367a36744fc83b0747ac