Analysis
-
max time kernel
145s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 19:56
Static task
static1
General
-
Target
2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe
-
Size
940KB
-
MD5
c1f741b68def6667ec44e12f04522e97
-
SHA1
eb0afb5b6c6895ff5999261201cda2ed58d9e5b4
-
SHA256
2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad
-
SHA512
9e677f59ebef55a4b8751b329b7363f73711648555b90c401e8bf90e6a2bea8b4f7ac1cd132b3d9ec197128ce9a3da06a7b0df016e7aa8fa7049061a6af1946b
-
SSDEEP
24576:yyH0fjolOQVj3be1GCQH7+WyNIX3dgFMNGm2c:ZHEolO43btl+L2dgFMNGm2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr898446.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr898446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr898446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr898446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr898446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr898446.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-188-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/1904-189-0x00000000026F0000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/1904-190-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-191-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-193-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-195-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-197-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-199-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-201-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-203-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-205-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-207-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-209-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-211-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-213-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-215-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-218-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline behavioral1/memory/1904-220-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-223-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-225-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-227-0x00000000026F0000-0x000000000272F000-memory.dmp family_redline behavioral1/memory/1904-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un878698.exeun998526.exepr898446.exequ867423.exerk071808.exesi042381.exepid process 2560 un878698.exe 3076 un998526.exe 4936 pr898446.exe 1904 qu867423.exe 2808 rk071808.exe 3504 si042381.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr898446.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr898446.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr898446.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un878698.exeun998526.exe2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un878698.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un998526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un998526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un878698.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3496 3504 WerFault.exe si042381.exe 3424 3504 WerFault.exe si042381.exe 4888 3504 WerFault.exe si042381.exe 4908 3504 WerFault.exe si042381.exe 4912 3504 WerFault.exe si042381.exe 5048 3504 WerFault.exe si042381.exe 5032 3504 WerFault.exe si042381.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr898446.exequ867423.exerk071808.exepid process 4936 pr898446.exe 4936 pr898446.exe 1904 qu867423.exe 1904 qu867423.exe 2808 rk071808.exe 2808 rk071808.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr898446.exequ867423.exerk071808.exedescription pid process Token: SeDebugPrivilege 4936 pr898446.exe Token: SeDebugPrivilege 1904 qu867423.exe Token: SeDebugPrivilege 2808 rk071808.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exeun878698.exeun998526.exedescription pid process target process PID 2472 wrote to memory of 2560 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe un878698.exe PID 2472 wrote to memory of 2560 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe un878698.exe PID 2472 wrote to memory of 2560 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe un878698.exe PID 2560 wrote to memory of 3076 2560 un878698.exe un998526.exe PID 2560 wrote to memory of 3076 2560 un878698.exe un998526.exe PID 2560 wrote to memory of 3076 2560 un878698.exe un998526.exe PID 3076 wrote to memory of 4936 3076 un998526.exe pr898446.exe PID 3076 wrote to memory of 4936 3076 un998526.exe pr898446.exe PID 3076 wrote to memory of 4936 3076 un998526.exe pr898446.exe PID 3076 wrote to memory of 1904 3076 un998526.exe qu867423.exe PID 3076 wrote to memory of 1904 3076 un998526.exe qu867423.exe PID 3076 wrote to memory of 1904 3076 un998526.exe qu867423.exe PID 2560 wrote to memory of 2808 2560 un878698.exe rk071808.exe PID 2560 wrote to memory of 2808 2560 un878698.exe rk071808.exe PID 2560 wrote to memory of 2808 2560 un878698.exe rk071808.exe PID 2472 wrote to memory of 3504 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe si042381.exe PID 2472 wrote to memory of 3504 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe si042381.exe PID 2472 wrote to memory of 3504 2472 2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe si042381.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe"C:\Users\Admin\AppData\Local\Temp\2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exe2⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 6163⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 6963⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 7683⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 8443⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 8723⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 8563⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 10803⤵
- Program crash
PID:5032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
675KB
MD52be5c7d626a2e82062e060428160ebdc
SHA17c6908e0f3817b414194d7986bfebe47c8d80f51
SHA256cfb60f1f1b3a00c493ee4e3c4e5746ed8ff68f63c00056dec51a25b4d784c78d
SHA512b6065f2a25634e7c48b7b168906074de734941b1a2d80b6ba5dc91e0bac29bcb99b17e86e04d8efa9e5e8b38006bdf80ec9a9cface38e5ffea246921bbe74bd9
-
Filesize
675KB
MD52be5c7d626a2e82062e060428160ebdc
SHA17c6908e0f3817b414194d7986bfebe47c8d80f51
SHA256cfb60f1f1b3a00c493ee4e3c4e5746ed8ff68f63c00056dec51a25b4d784c78d
SHA512b6065f2a25634e7c48b7b168906074de734941b1a2d80b6ba5dc91e0bac29bcb99b17e86e04d8efa9e5e8b38006bdf80ec9a9cface38e5ffea246921bbe74bd9
-
Filesize
169KB
MD5e63b55ad3012586448877e1815fc05c7
SHA1ef8b1059976ce5caf4ab3309b1b471bca33acd6a
SHA256b33db80fc02bee32f989036d0d2b9e53615093b071067b3bf6ac4e7ecad00c09
SHA512b586cd9bff26fcf9815485e51938d4b62c4bc5f78836fb127454f287bfd5fb7ab36536a969acfe64e5746863c524d77090dd6e0d9867307e04d19260a945c4d9
-
Filesize
169KB
MD5e63b55ad3012586448877e1815fc05c7
SHA1ef8b1059976ce5caf4ab3309b1b471bca33acd6a
SHA256b33db80fc02bee32f989036d0d2b9e53615093b071067b3bf6ac4e7ecad00c09
SHA512b586cd9bff26fcf9815485e51938d4b62c4bc5f78836fb127454f287bfd5fb7ab36536a969acfe64e5746863c524d77090dd6e0d9867307e04d19260a945c4d9
-
Filesize
521KB
MD5568f48b4a45986c45fef45e4a35ab150
SHA1e6a5130b27c4c951c953a3ef49fb46a799380786
SHA2565bc51495ed22a1d12e74529516b4e318829b3c0889135e3b3e7668f601ad5ea4
SHA51267c9e80534e42ec2c0ae968d10c1a65ca516bcf286c2691ca508094b88ca04de3eba04566f329e9102d205cf3da6ac7b4ab612836a7535bbc22c44835cc24fe0
-
Filesize
521KB
MD5568f48b4a45986c45fef45e4a35ab150
SHA1e6a5130b27c4c951c953a3ef49fb46a799380786
SHA2565bc51495ed22a1d12e74529516b4e318829b3c0889135e3b3e7668f601ad5ea4
SHA51267c9e80534e42ec2c0ae968d10c1a65ca516bcf286c2691ca508094b88ca04de3eba04566f329e9102d205cf3da6ac7b4ab612836a7535bbc22c44835cc24fe0
-
Filesize
239KB
MD5d4a097800df013e8c65200ea16958561
SHA1cfe49e2d5165dec525c0cb2db50c8ada64fc6e47
SHA256eb4f43aea66cff3de01ee44fab41d9ef52bb56a5ad7fa0f6566223ea10bbd598
SHA5129e6d7109045518717f6eab388f67f1874d8497134605aad10b113721a40ded3d30fcf6f826db70dfd1aca83ebbf4add067be50dc5a9d5716e02ea8d2022fe014
-
Filesize
239KB
MD5d4a097800df013e8c65200ea16958561
SHA1cfe49e2d5165dec525c0cb2db50c8ada64fc6e47
SHA256eb4f43aea66cff3de01ee44fab41d9ef52bb56a5ad7fa0f6566223ea10bbd598
SHA5129e6d7109045518717f6eab388f67f1874d8497134605aad10b113721a40ded3d30fcf6f826db70dfd1aca83ebbf4add067be50dc5a9d5716e02ea8d2022fe014
-
Filesize
297KB
MD55c30d448cd5893734f371c8668cff934
SHA1168d53ae362a69382751d1ecad43e56c72abbde2
SHA256e78386608eea99ca2a352b08c5e2f41a283203eadb7b9e0d27c10030fe16668a
SHA512e438add81ba9ef245e9ed1eb94db79861efa76f78c18ba41e411857d4925c8ec9c7cfe9153536393cfbf28643465d5f60d38c1fb8ec317f29aab43953fb811fa
-
Filesize
297KB
MD55c30d448cd5893734f371c8668cff934
SHA1168d53ae362a69382751d1ecad43e56c72abbde2
SHA256e78386608eea99ca2a352b08c5e2f41a283203eadb7b9e0d27c10030fe16668a
SHA512e438add81ba9ef245e9ed1eb94db79861efa76f78c18ba41e411857d4925c8ec9c7cfe9153536393cfbf28643465d5f60d38c1fb8ec317f29aab43953fb811fa