Analysis
-
max time kernel
84s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:49
Static task
static1
Behavioral task
behavioral1
Sample
376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe
Resource
win10v2004-20230221-en
General
-
Target
376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe
-
Size
658KB
-
MD5
5ee315913c2efed0822d596a4c0fe414
-
SHA1
38ae83da297790ec584d2467178a3ab830244ad7
-
SHA256
376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4
-
SHA512
f48a831d1bf43ed84fc13da4bad4bab2de1d656bf8ffd3e1e3e51f35b16ed22b00fec30c0fb4cfa383ddcfce5ed74e14e782522d63957c57a3b11e1bb7856eec
-
SSDEEP
12288:EMrSy90uAV03HZBzM3bZpgKBLt8flgjCb449zWKeX8vflrO4j:Oyde03HZBzMLHgKBhq8CE4AKpN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6368.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6368.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6368.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4540-193-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-192-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-195-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-197-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-199-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-201-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-203-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-205-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-207-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-209-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-211-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-213-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-215-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-217-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-219-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-221-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-223-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/4540-225-0x0000000002500000-0x000000000253F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un740447.exepro6368.exequ6690.exesi692033.exepid process 4688 un740447.exe 3388 pro6368.exe 4540 qu6690.exe 3708 si692033.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6368.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6368.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exeun740447.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un740447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un740447.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3372 3388 WerFault.exe pro6368.exe 788 4540 WerFault.exe qu6690.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6368.exequ6690.exesi692033.exepid process 3388 pro6368.exe 3388 pro6368.exe 4540 qu6690.exe 4540 qu6690.exe 3708 si692033.exe 3708 si692033.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6368.exequ6690.exesi692033.exedescription pid process Token: SeDebugPrivilege 3388 pro6368.exe Token: SeDebugPrivilege 4540 qu6690.exe Token: SeDebugPrivilege 3708 si692033.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exeun740447.exedescription pid process target process PID 4224 wrote to memory of 4688 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe un740447.exe PID 4224 wrote to memory of 4688 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe un740447.exe PID 4224 wrote to memory of 4688 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe un740447.exe PID 4688 wrote to memory of 3388 4688 un740447.exe pro6368.exe PID 4688 wrote to memory of 3388 4688 un740447.exe pro6368.exe PID 4688 wrote to memory of 3388 4688 un740447.exe pro6368.exe PID 4688 wrote to memory of 4540 4688 un740447.exe qu6690.exe PID 4688 wrote to memory of 4540 4688 un740447.exe qu6690.exe PID 4688 wrote to memory of 4540 4688 un740447.exe qu6690.exe PID 4224 wrote to memory of 3708 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe si692033.exe PID 4224 wrote to memory of 3708 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe si692033.exe PID 4224 wrote to memory of 3708 4224 376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe si692033.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe"C:\Users\Admin\AppData\Local\Temp\376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 10924⤵
- Program crash
PID:3372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 13444⤵
- Program crash
PID:788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3388 -ip 33881⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4540 -ip 45401⤵PID:2628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f79ba38fc75bc7d44942e0fd6a98bf56
SHA103d352bd304ad7a64a5081e903f609fd3ef133e0
SHA25680de7bb399f2c07ba62e786b01f9e441de743e3a982e0c4bb135214d0de38bdb
SHA51274ce18a5960bc5d5536cbaf3171b88d4497f860708211b53be732e8e5045c14670258eec42fed5adb848ccee7268c8d9eaf9a81949ced44b8f97c00d9126d269
-
Filesize
175KB
MD5f79ba38fc75bc7d44942e0fd6a98bf56
SHA103d352bd304ad7a64a5081e903f609fd3ef133e0
SHA25680de7bb399f2c07ba62e786b01f9e441de743e3a982e0c4bb135214d0de38bdb
SHA51274ce18a5960bc5d5536cbaf3171b88d4497f860708211b53be732e8e5045c14670258eec42fed5adb848ccee7268c8d9eaf9a81949ced44b8f97c00d9126d269
-
Filesize
516KB
MD53afc78098e1eb0689d5d955288b93427
SHA1d1134597a34923978a9d00a13d4b79a59c8b467a
SHA2560904de8f32b028a86bc0d36ba643cdd1b763b6020515d7bc784a3105d9581155
SHA512784b288ed5f3f4049df567ccb9cee0c49a620403d8cb364dbb33de6abb67da2e9d4e7683d571f5729e36de545b07cbf275727b1db9a5e4cd3b82c89e40f9cb14
-
Filesize
516KB
MD53afc78098e1eb0689d5d955288b93427
SHA1d1134597a34923978a9d00a13d4b79a59c8b467a
SHA2560904de8f32b028a86bc0d36ba643cdd1b763b6020515d7bc784a3105d9581155
SHA512784b288ed5f3f4049df567ccb9cee0c49a620403d8cb364dbb33de6abb67da2e9d4e7683d571f5729e36de545b07cbf275727b1db9a5e4cd3b82c89e40f9cb14
-
Filesize
235KB
MD58953d277dc3ea5690e02f2ecaccf81ce
SHA10a66392d44c862cfa7ccbc4c05531d9b2427eddc
SHA25628fd1fe811319cada8a1777faf96ad09e0d23d5d3aef9e28d41d59d2fada6b4e
SHA51254cc553eb5937f434319faa60fe59ba56c220c92ca0daa9383379433f5eecc9053bad6e0712e6e4a0c8c74a1b6dc62ef7be6ca056ee5ee05c865fc3ad2432024
-
Filesize
235KB
MD58953d277dc3ea5690e02f2ecaccf81ce
SHA10a66392d44c862cfa7ccbc4c05531d9b2427eddc
SHA25628fd1fe811319cada8a1777faf96ad09e0d23d5d3aef9e28d41d59d2fada6b4e
SHA51254cc553eb5937f434319faa60fe59ba56c220c92ca0daa9383379433f5eecc9053bad6e0712e6e4a0c8c74a1b6dc62ef7be6ca056ee5ee05c865fc3ad2432024
-
Filesize
294KB
MD5f5883968bbfefc2455bae562ad049c26
SHA1f0f1269540ffb0531823a991d621285e9fb7327c
SHA256bc0ceb3dc1e445c81cb625d23417dda2eee3585be07adb83b6c57ce59f85ce9b
SHA512480ca85be4dc8757be949b666d3cdabacfafd6583717d2daf1f42bfe85d6c2869753d2eb54bef0e392c6d33b365a6fa67be96a3f6febb07da9cd86a89348c6bf
-
Filesize
294KB
MD5f5883968bbfefc2455bae562ad049c26
SHA1f0f1269540ffb0531823a991d621285e9fb7327c
SHA256bc0ceb3dc1e445c81cb625d23417dda2eee3585be07adb83b6c57ce59f85ce9b
SHA512480ca85be4dc8757be949b666d3cdabacfafd6583717d2daf1f42bfe85d6c2869753d2eb54bef0e392c6d33b365a6fa67be96a3f6febb07da9cd86a89348c6bf