Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 21:22
Static task
static1
General
-
Target
68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe
-
Size
940KB
-
MD5
43ed72dd88b85aee45175ca7b4746a6a
-
SHA1
4b153dfe6369aab119a814a3f02d6bb2336df62e
-
SHA256
68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327
-
SHA512
5014f90dbffa505bafc35ef6857a7d511da585c344d71d50ad69a9d429f36242ea84c07a5a29082354d7f438e313676730c5fc5723c47da53910f95670b8534f
-
SSDEEP
24576:jyAs6Cl7NcW5bl6QpniZiIZuiFLffmmq+Od:2hDRywhn77iZx4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr841955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr841955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr841955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr841955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr841955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr841955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-186-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/1960-187-0x0000000004A20000-0x0000000004A64000-memory.dmp family_redline behavioral1/memory/1960-193-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-195-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-197-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-199-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-201-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-203-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-205-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-207-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-209-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-211-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-213-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-215-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-217-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-219-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-221-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-223-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/1960-225-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un024830.exeun616046.exepr841955.exequ866836.exerk016389.exesi536900.exepid process 2532 un024830.exe 2904 un616046.exe 4052 pr841955.exe 1960 qu866836.exe 3720 rk016389.exe 2728 si536900.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr841955.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr841955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr841955.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exeun024830.exeun616046.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un024830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un024830.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un616046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un616046.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4784 2728 WerFault.exe si536900.exe 776 2728 WerFault.exe si536900.exe 2060 2728 WerFault.exe si536900.exe 4376 2728 WerFault.exe si536900.exe 4364 2728 WerFault.exe si536900.exe 3132 2728 WerFault.exe si536900.exe 4420 2728 WerFault.exe si536900.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr841955.exequ866836.exerk016389.exepid process 4052 pr841955.exe 4052 pr841955.exe 1960 qu866836.exe 1960 qu866836.exe 3720 rk016389.exe 3720 rk016389.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr841955.exequ866836.exerk016389.exedescription pid process Token: SeDebugPrivilege 4052 pr841955.exe Token: SeDebugPrivilege 1960 qu866836.exe Token: SeDebugPrivilege 3720 rk016389.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exeun024830.exeun616046.exedescription pid process target process PID 2264 wrote to memory of 2532 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe un024830.exe PID 2264 wrote to memory of 2532 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe un024830.exe PID 2264 wrote to memory of 2532 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe un024830.exe PID 2532 wrote to memory of 2904 2532 un024830.exe un616046.exe PID 2532 wrote to memory of 2904 2532 un024830.exe un616046.exe PID 2532 wrote to memory of 2904 2532 un024830.exe un616046.exe PID 2904 wrote to memory of 4052 2904 un616046.exe pr841955.exe PID 2904 wrote to memory of 4052 2904 un616046.exe pr841955.exe PID 2904 wrote to memory of 4052 2904 un616046.exe pr841955.exe PID 2904 wrote to memory of 1960 2904 un616046.exe qu866836.exe PID 2904 wrote to memory of 1960 2904 un616046.exe qu866836.exe PID 2904 wrote to memory of 1960 2904 un616046.exe qu866836.exe PID 2532 wrote to memory of 3720 2532 un024830.exe rk016389.exe PID 2532 wrote to memory of 3720 2532 un024830.exe rk016389.exe PID 2532 wrote to memory of 3720 2532 un024830.exe rk016389.exe PID 2264 wrote to memory of 2728 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe si536900.exe PID 2264 wrote to memory of 2728 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe si536900.exe PID 2264 wrote to memory of 2728 2264 68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe si536900.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe"C:\Users\Admin\AppData\Local\Temp\68ba6d5af3d879cd821ec56e3d6f6f47047e175f1df018d365606d7c1df63327.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un024830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un024830.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un616046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un616046.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr841955.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr841955.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu866836.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu866836.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk016389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk016389.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536900.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536900.exe2⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 6203⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 7003⤵
- Program crash
PID:776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 7723⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 8523⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 9083⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 9483⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 10843⤵
- Program crash
PID:4420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
675KB
MD5ebb5445d82a871a111be51adaf160758
SHA1db3addc428652724f671500c7a15676c6d7d47d6
SHA2562f9ac4650f84cda727ec4c461748f5a3a4acf26264342edebc4e23cd270dbeff
SHA512979c753f41f9a143d75ce11ebac777410fe620ed7ef56ff1390ddb17ccc372fc5ec4ee838a2d2339bdbd9d397681d2ab048d149f86a149841c165dc81d0c25f9
-
Filesize
675KB
MD5ebb5445d82a871a111be51adaf160758
SHA1db3addc428652724f671500c7a15676c6d7d47d6
SHA2562f9ac4650f84cda727ec4c461748f5a3a4acf26264342edebc4e23cd270dbeff
SHA512979c753f41f9a143d75ce11ebac777410fe620ed7ef56ff1390ddb17ccc372fc5ec4ee838a2d2339bdbd9d397681d2ab048d149f86a149841c165dc81d0c25f9
-
Filesize
169KB
MD54d958645f944812a04c7187f5fc89683
SHA187250541381019d1addc0c50d12e98c098ed025b
SHA25616e432550b9c7c4d17730e3a2baadd032ef4930e47e64b06b5cda3f2d2d58103
SHA512205f133b38c8c89d1b5caa0ed5f0b3531e3164814443de056eb16d874161b7d97601f7a84a862a22ed1d02248211db60dc2a063a87f19b9c443c0cb0a4a830b7
-
Filesize
169KB
MD54d958645f944812a04c7187f5fc89683
SHA187250541381019d1addc0c50d12e98c098ed025b
SHA25616e432550b9c7c4d17730e3a2baadd032ef4930e47e64b06b5cda3f2d2d58103
SHA512205f133b38c8c89d1b5caa0ed5f0b3531e3164814443de056eb16d874161b7d97601f7a84a862a22ed1d02248211db60dc2a063a87f19b9c443c0cb0a4a830b7
-
Filesize
521KB
MD51679d1afcce865b1f2a7899d357253f0
SHA182eeb7ea9095a240d6ec9367ebe09516a88772ba
SHA2566e8f38288e95a501ae74e151c5650689b19ecfcb4e7e7eab388d8faa2ef3bf2f
SHA5124dfe4f11976201d2d900e2d8d66e2bec45e9a0d3f1bc7d6791ae440bcb81079a86bbef946613233446c97a61bf68d3603e872d14bf64822dc55409406f957b32
-
Filesize
521KB
MD51679d1afcce865b1f2a7899d357253f0
SHA182eeb7ea9095a240d6ec9367ebe09516a88772ba
SHA2566e8f38288e95a501ae74e151c5650689b19ecfcb4e7e7eab388d8faa2ef3bf2f
SHA5124dfe4f11976201d2d900e2d8d66e2bec45e9a0d3f1bc7d6791ae440bcb81079a86bbef946613233446c97a61bf68d3603e872d14bf64822dc55409406f957b32
-
Filesize
239KB
MD5ed706b75ec2eeb81406c9a48e8467e33
SHA187eeecc1de6327cc51e7fd2ae95545f84951a54d
SHA256a80e200393a19bf016b0922337c3e015d602e93bb85412ae9f3b99d62598e52a
SHA512350d15779ff9cb989b4b20c70e19e9e15fbb3a96d5dbaff351bbd252e49325ce3c5fb4bd70bd56286d2bc741d1c3d93991de71ea7be54f85906b9b3a610817d0
-
Filesize
239KB
MD5ed706b75ec2eeb81406c9a48e8467e33
SHA187eeecc1de6327cc51e7fd2ae95545f84951a54d
SHA256a80e200393a19bf016b0922337c3e015d602e93bb85412ae9f3b99d62598e52a
SHA512350d15779ff9cb989b4b20c70e19e9e15fbb3a96d5dbaff351bbd252e49325ce3c5fb4bd70bd56286d2bc741d1c3d93991de71ea7be54f85906b9b3a610817d0
-
Filesize
297KB
MD52bb2cb1685ce3d63888163bdd9af974f
SHA1530e9b57eda819bca9950631090d405310c9e920
SHA256e618735a917c79b094c3d56c043cfdb88b13621eb8edaa4db09d989a27439066
SHA51299405e2d2d77a3a9d64cd45bd15e0303d8ef53e9ad6e331ce1a6c5c4a21df41bd4f439983e04ca4928bed5941f9f41788c7261aed8ac1c5ffa47f1c2fa436654
-
Filesize
297KB
MD52bb2cb1685ce3d63888163bdd9af974f
SHA1530e9b57eda819bca9950631090d405310c9e920
SHA256e618735a917c79b094c3d56c043cfdb88b13621eb8edaa4db09d989a27439066
SHA51299405e2d2d77a3a9d64cd45bd15e0303d8ef53e9ad6e331ce1a6c5c4a21df41bd4f439983e04ca4928bed5941f9f41788c7261aed8ac1c5ffa47f1c2fa436654