Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:54
Static task
static1
Behavioral task
behavioral1
Sample
25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe
Resource
win10v2004-20230220-en
General
-
Target
25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe
-
Size
657KB
-
MD5
02d66625f37d126277af901c761ba200
-
SHA1
e8afa6f81175d7985323f8432234e1c135f29da3
-
SHA256
25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b
-
SHA512
0e20376da712307dc4cd667e8a6fbdaf7c11c347aeadc9b6c5dda03dd59e45d3ecb0967005e6b9d13a2d3b16b435e6ee4840766394becd2d7601f5b2784e3fde
-
SSDEEP
12288:nMrEy90Mm3WRkDLsZVRbt1RKeQeuNLt8nF7YOm44WzWKRZ8vTC0ad7:/yC3WRk0dbtjuhiEOP4PKUC0ad7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9610.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9610.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9610.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4452-189-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4452-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un884562.exepro9610.exequ5019.exesi072562.exepid process 1960 un884562.exe 3532 pro9610.exe 4452 qu5019.exe 3140 si072562.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9610.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9610.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exeun884562.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un884562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un884562.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4052 3532 WerFault.exe pro9610.exe 2112 4452 WerFault.exe qu5019.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9610.exequ5019.exesi072562.exepid process 3532 pro9610.exe 3532 pro9610.exe 4452 qu5019.exe 4452 qu5019.exe 3140 si072562.exe 3140 si072562.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9610.exequ5019.exesi072562.exedescription pid process Token: SeDebugPrivilege 3532 pro9610.exe Token: SeDebugPrivilege 4452 qu5019.exe Token: SeDebugPrivilege 3140 si072562.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exeun884562.exedescription pid process target process PID 1908 wrote to memory of 1960 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe un884562.exe PID 1908 wrote to memory of 1960 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe un884562.exe PID 1908 wrote to memory of 1960 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe un884562.exe PID 1960 wrote to memory of 3532 1960 un884562.exe pro9610.exe PID 1960 wrote to memory of 3532 1960 un884562.exe pro9610.exe PID 1960 wrote to memory of 3532 1960 un884562.exe pro9610.exe PID 1960 wrote to memory of 4452 1960 un884562.exe qu5019.exe PID 1960 wrote to memory of 4452 1960 un884562.exe qu5019.exe PID 1960 wrote to memory of 4452 1960 un884562.exe qu5019.exe PID 1908 wrote to memory of 3140 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe si072562.exe PID 1908 wrote to memory of 3140 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe si072562.exe PID 1908 wrote to memory of 3140 1908 25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe si072562.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe"C:\Users\Admin\AppData\Local\Temp\25d6586b4a3ad835e4750a04b5a988fcba9ef06248852ab1d0a914e378b1be5b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un884562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un884562.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9610.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9610.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10804⤵
- Program crash
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5019.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 13564⤵
- Program crash
PID:2112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si072562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si072562.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3532 -ip 35321⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4452 -ip 44521⤵PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f727263d187ee1e3fd424db10e5eb666
SHA1afbc6e83a7c33148b75d8a20561e682554a73da3
SHA2568aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94
SHA5125ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5
-
Filesize
175KB
MD5f727263d187ee1e3fd424db10e5eb666
SHA1afbc6e83a7c33148b75d8a20561e682554a73da3
SHA2568aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94
SHA5125ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5
-
Filesize
515KB
MD590742f17d740243b534e59204a42048b
SHA15180fb95a9f64e5c2095bb4746b7c226b1fe6186
SHA256dd4a9e9213029323c0e59b0977e2dfeec5a258d0e2e8cdaecb7afec22c19070e
SHA512bafb67c3b6daa5285d53f40d7c5a2bfe6613d64ea795b64c68d83e51c1e46300f4e7aeb94e5e48440ff73588b273bd9414df0bb4068a7e00cc74b05b2df1c197
-
Filesize
515KB
MD590742f17d740243b534e59204a42048b
SHA15180fb95a9f64e5c2095bb4746b7c226b1fe6186
SHA256dd4a9e9213029323c0e59b0977e2dfeec5a258d0e2e8cdaecb7afec22c19070e
SHA512bafb67c3b6daa5285d53f40d7c5a2bfe6613d64ea795b64c68d83e51c1e46300f4e7aeb94e5e48440ff73588b273bd9414df0bb4068a7e00cc74b05b2df1c197
-
Filesize
235KB
MD58e3e34e94c4464a33000f0b00128b748
SHA1656821d1716a7fa946d1617e3e1cdb4972ec674d
SHA25671aef0cb9611fea7299e9eff0bdee8cfefda86b20a221ad8596901a36ab20ff2
SHA512a0d7cebd4fe8dd8dc130ca9df0278be0083edbd4a098a2511707b4bff0bf267d979254bcc52b1527fbe77b623d1e2b0ac02197d474de7f9d26e8586f7387ed34
-
Filesize
235KB
MD58e3e34e94c4464a33000f0b00128b748
SHA1656821d1716a7fa946d1617e3e1cdb4972ec674d
SHA25671aef0cb9611fea7299e9eff0bdee8cfefda86b20a221ad8596901a36ab20ff2
SHA512a0d7cebd4fe8dd8dc130ca9df0278be0083edbd4a098a2511707b4bff0bf267d979254bcc52b1527fbe77b623d1e2b0ac02197d474de7f9d26e8586f7387ed34
-
Filesize
294KB
MD5c43c12d5cb1cbe99962f085c74eada3c
SHA1f5ffce1905e282d382f665ce4573f7b4ff088f90
SHA256acaba20ade4e6b6fa0aecc512fb6c6752f070c0e20e3e09ef65613ee357cd221
SHA512327fa6eb1ca13a88ff4c48e2da25a082cf0436ad19a9bf80c458f03cca1ea436b7ef8ca3e0d461f5bcdb7dc67e08fae3e47d5b7cceba36f0426c7e670dad5a80
-
Filesize
294KB
MD5c43c12d5cb1cbe99962f085c74eada3c
SHA1f5ffce1905e282d382f665ce4573f7b4ff088f90
SHA256acaba20ade4e6b6fa0aecc512fb6c6752f070c0e20e3e09ef65613ee357cd221
SHA512327fa6eb1ca13a88ff4c48e2da25a082cf0436ad19a9bf80c458f03cca1ea436b7ef8ca3e0d461f5bcdb7dc67e08fae3e47d5b7cceba36f0426c7e670dad5a80