Analysis
-
max time kernel
143s -
max time network
110s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 19:27
Static task
static1
General
-
Target
155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe
-
Size
940KB
-
MD5
383e2f203e560447cb3ab3446955e82b
-
SHA1
e704b45d65a64da5927381ea35b149b205a58281
-
SHA256
155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088
-
SHA512
451f0a9a37553ae5ae47fed3c401a6709f50313c54ed206e12f87875ff245fd3827d9e4e2b7312854a8e411bcf8273bf313c5d7c601a3164037b5e9a04705b7d
-
SSDEEP
24576:wyfkyYSrM7g2zPwRm24b7BhEdIFBzP5/ooKziU:3sXSgFPI63BUMx/HKz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr809730.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr809730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr809730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr809730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr809730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr809730.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-188-0x00000000007F0000-0x0000000000836000-memory.dmp family_redline behavioral1/memory/2668-192-0x0000000002220000-0x0000000002264000-memory.dmp family_redline behavioral1/memory/2668-193-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-194-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-196-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-198-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-200-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-202-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-204-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-206-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-208-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-210-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-218-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-216-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-214-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-212-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-220-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-222-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-224-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-226-0x0000000002220000-0x000000000225F000-memory.dmp family_redline behavioral1/memory/2668-1110-0x0000000004BB0000-0x0000000004BC0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un768443.exeun951267.exepr809730.exequ198214.exerk446460.exesi900715.exepid process 2808 un768443.exe 5092 un951267.exe 4596 pr809730.exe 2668 qu198214.exe 488 rk446460.exe 4688 si900715.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr809730.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr809730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr809730.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exeun768443.exeun951267.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un768443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un768443.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un951267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un951267.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4376 4688 WerFault.exe si900715.exe 4068 4688 WerFault.exe si900715.exe 4340 4688 WerFault.exe si900715.exe 4344 4688 WerFault.exe si900715.exe 5036 4688 WerFault.exe si900715.exe 1388 4688 WerFault.exe si900715.exe 4308 4688 WerFault.exe si900715.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr809730.exequ198214.exerk446460.exepid process 4596 pr809730.exe 4596 pr809730.exe 2668 qu198214.exe 2668 qu198214.exe 488 rk446460.exe 488 rk446460.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr809730.exequ198214.exerk446460.exedescription pid process Token: SeDebugPrivilege 4596 pr809730.exe Token: SeDebugPrivilege 2668 qu198214.exe Token: SeDebugPrivilege 488 rk446460.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exeun768443.exeun951267.exedescription pid process target process PID 2544 wrote to memory of 2808 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe un768443.exe PID 2544 wrote to memory of 2808 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe un768443.exe PID 2544 wrote to memory of 2808 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe un768443.exe PID 2808 wrote to memory of 5092 2808 un768443.exe un951267.exe PID 2808 wrote to memory of 5092 2808 un768443.exe un951267.exe PID 2808 wrote to memory of 5092 2808 un768443.exe un951267.exe PID 5092 wrote to memory of 4596 5092 un951267.exe pr809730.exe PID 5092 wrote to memory of 4596 5092 un951267.exe pr809730.exe PID 5092 wrote to memory of 4596 5092 un951267.exe pr809730.exe PID 5092 wrote to memory of 2668 5092 un951267.exe qu198214.exe PID 5092 wrote to memory of 2668 5092 un951267.exe qu198214.exe PID 5092 wrote to memory of 2668 5092 un951267.exe qu198214.exe PID 2808 wrote to memory of 488 2808 un768443.exe rk446460.exe PID 2808 wrote to memory of 488 2808 un768443.exe rk446460.exe PID 2808 wrote to memory of 488 2808 un768443.exe rk446460.exe PID 2544 wrote to memory of 4688 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe si900715.exe PID 2544 wrote to memory of 4688 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe si900715.exe PID 2544 wrote to memory of 4688 2544 155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe si900715.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe"C:\Users\Admin\AppData\Local\Temp\155290fe9b1f6e206bf093be68a5bd5b848b87d724d705239d2419750531f088.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768443.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un951267.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un951267.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr809730.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr809730.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu198214.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu198214.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk446460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk446460.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si900715.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si900715.exe2⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 6083⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 6963⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8323⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8443⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8723⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 8883⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10683⤵
- Program crash
PID:4308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
675KB
MD5a399e5fa307d1a04fecfbc569357e6ec
SHA1ef02d30bacb9aa28782e8e9fff64d229de371959
SHA2564e64f714952413c162cf4406314b1beabf71e9538d12d4412c9845e28f0a1f25
SHA512749edd7916e6704e5e9a96ff00fcd3019844c4a96ac03fd347b862efbb5c1cee4b0ec19a67feb11c587f6f856cc18db6023625f92a20639b0bebeafbfb1afe3f
-
Filesize
675KB
MD5a399e5fa307d1a04fecfbc569357e6ec
SHA1ef02d30bacb9aa28782e8e9fff64d229de371959
SHA2564e64f714952413c162cf4406314b1beabf71e9538d12d4412c9845e28f0a1f25
SHA512749edd7916e6704e5e9a96ff00fcd3019844c4a96ac03fd347b862efbb5c1cee4b0ec19a67feb11c587f6f856cc18db6023625f92a20639b0bebeafbfb1afe3f
-
Filesize
168KB
MD5d4718e53a98b274117dd713b94b49485
SHA19e30a0decdf6087ee01ac6e9e10dbb5b15a44b15
SHA25664fa5e9034d985ec381eb7fe62ac329ebc0c2c0b275697e0d3896841240bad75
SHA51216eba5d5547543b6d7c9ce3cda68da352b3bb72ba265f70fedc66408f7cccc526a5a42aa3fd48b66a9407d1b2d3ecdf7b840cd63c607b16811ced6489e7bdb4d
-
Filesize
168KB
MD5d4718e53a98b274117dd713b94b49485
SHA19e30a0decdf6087ee01ac6e9e10dbb5b15a44b15
SHA25664fa5e9034d985ec381eb7fe62ac329ebc0c2c0b275697e0d3896841240bad75
SHA51216eba5d5547543b6d7c9ce3cda68da352b3bb72ba265f70fedc66408f7cccc526a5a42aa3fd48b66a9407d1b2d3ecdf7b840cd63c607b16811ced6489e7bdb4d
-
Filesize
521KB
MD5d896fe1243313b89bd9a45d67e403c47
SHA19be4ffe17e8f078ca29b9df10c0b5e93efde3437
SHA256f614f0631965966417cc8ebf7ecc262b9a5415891ef40545db61f2aa4410a86f
SHA5122f31870d8f7bbd197f454317c612c68ad52081a7150d159ad42fd57d707922b7346e611b6188f7dc815179f318c1e7a5d0c21a1248544329d6374fca2daa2f4b
-
Filesize
521KB
MD5d896fe1243313b89bd9a45d67e403c47
SHA19be4ffe17e8f078ca29b9df10c0b5e93efde3437
SHA256f614f0631965966417cc8ebf7ecc262b9a5415891ef40545db61f2aa4410a86f
SHA5122f31870d8f7bbd197f454317c612c68ad52081a7150d159ad42fd57d707922b7346e611b6188f7dc815179f318c1e7a5d0c21a1248544329d6374fca2daa2f4b
-
Filesize
239KB
MD5757975b4e248fb8f6fcbc597c5d41404
SHA15db5832c888e40c157875fcc6822e75334794424
SHA256def2fef7c257370600c3219d016d4169a41b6ff5722788738be8a5b6c6e12923
SHA512178709d89f429d7c888984a5df6f5fb6158e61108bbb93bebca6c7a94020213345ef2a5e2800ddc3c0d0b773f9d04fb026fd0d76d649ed801d04b49c724418a6
-
Filesize
239KB
MD5757975b4e248fb8f6fcbc597c5d41404
SHA15db5832c888e40c157875fcc6822e75334794424
SHA256def2fef7c257370600c3219d016d4169a41b6ff5722788738be8a5b6c6e12923
SHA512178709d89f429d7c888984a5df6f5fb6158e61108bbb93bebca6c7a94020213345ef2a5e2800ddc3c0d0b773f9d04fb026fd0d76d649ed801d04b49c724418a6
-
Filesize
297KB
MD553e48e0376295b8f0cad56e566fcb822
SHA17f9351539fe5bebe2c33f68773d09451c68b752e
SHA256a659fd1c94ff9e5b37f58f98c0e3acb6cdc918974e275f252b16aef336314af9
SHA512f10c6c2d772e50ead860d67d131c4e7bec6d60f5ad356c49e91c13b8a30534e43072286f4253e5b2a192298fe796fff68def9eae66c511d3dc03713afe4e87ba
-
Filesize
297KB
MD553e48e0376295b8f0cad56e566fcb822
SHA17f9351539fe5bebe2c33f68773d09451c68b752e
SHA256a659fd1c94ff9e5b37f58f98c0e3acb6cdc918974e275f252b16aef336314af9
SHA512f10c6c2d772e50ead860d67d131c4e7bec6d60f5ad356c49e91c13b8a30534e43072286f4253e5b2a192298fe796fff68def9eae66c511d3dc03713afe4e87ba