Analysis
-
max time kernel
54s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-03-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe
Resource
win10-20230220-en
General
-
Target
c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe
-
Size
536KB
-
MD5
808a0a83a20c2ffb73fbb2d8b5652ec5
-
SHA1
c1de14be89bc830e3a612c956c49c7b511182c71
-
SHA256
c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a
-
SHA512
e0c27a8cf4edfe23dbe9d81f699b853592de1282e11a432303c12b3ed977252ee3563f2b2cd652c0201928b279bd02233ed756a959c2f3437406478c287cff54
-
SSDEEP
12288:GMr4y90xGZARwVQVX8hWbp6UcF0HWm9V9CswqxrE:6ya+AeVQtmWF6F02osswqO
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw66oz76sj55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw66oz76sj55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw66oz76sj55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw66oz76sj55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw66oz76sj55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4036-140-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/4036-142-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline behavioral1/memory/4036-143-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-144-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-146-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-150-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-153-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-155-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-157-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-159-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-161-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-163-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-165-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-169-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-167-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-171-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-173-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-175-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-177-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-179-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-181-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-183-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-185-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-187-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-189-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-193-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-195-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-197-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-199-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-201-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-203-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-205-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-207-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/4036-209-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 364 vhJ3219hf.exe 3504 sw66oz76sj55.exe 4036 tOU90Bf19.exe 2340 uRv31Mm24.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw66oz76sj55.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhJ3219hf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhJ3219hf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3504 sw66oz76sj55.exe 3504 sw66oz76sj55.exe 4036 tOU90Bf19.exe 4036 tOU90Bf19.exe 2340 uRv31Mm24.exe 2340 uRv31Mm24.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3504 sw66oz76sj55.exe Token: SeDebugPrivilege 4036 tOU90Bf19.exe Token: SeDebugPrivilege 2340 uRv31Mm24.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1596 wrote to memory of 364 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 66 PID 1596 wrote to memory of 364 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 66 PID 1596 wrote to memory of 364 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 66 PID 364 wrote to memory of 3504 364 vhJ3219hf.exe 67 PID 364 wrote to memory of 3504 364 vhJ3219hf.exe 67 PID 364 wrote to memory of 4036 364 vhJ3219hf.exe 68 PID 364 wrote to memory of 4036 364 vhJ3219hf.exe 68 PID 364 wrote to memory of 4036 364 vhJ3219hf.exe 68 PID 1596 wrote to memory of 2340 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 70 PID 1596 wrote to memory of 2340 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 70 PID 1596 wrote to memory of 2340 1596 c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe"C:\Users\Admin\AppData\Local\Temp\c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b6bf608523f7bd15f08bac156d0456fe
SHA13ffc96931e5fab6c30f1f7329450168dbf479212
SHA256e822431833cc3516b5a489c0efbcdcbc49088c2024cea1a99c5f507fd5626365
SHA512ee8e0d135f19458e8232434603a9a25517ce74172390d34c42a2ea2dc0b4ecf9a0c0384a09ef84a21758e4e1fe37bf60b10ec42bbe743900a37da76c90431fdf
-
Filesize
175KB
MD5b6bf608523f7bd15f08bac156d0456fe
SHA13ffc96931e5fab6c30f1f7329450168dbf479212
SHA256e822431833cc3516b5a489c0efbcdcbc49088c2024cea1a99c5f507fd5626365
SHA512ee8e0d135f19458e8232434603a9a25517ce74172390d34c42a2ea2dc0b4ecf9a0c0384a09ef84a21758e4e1fe37bf60b10ec42bbe743900a37da76c90431fdf
-
Filesize
391KB
MD5b6f50acc016464ec7e0f8f93398a6572
SHA1af78253284f5680ce28e54a6b4a03e90c9185e4a
SHA2562adf19cafc73e5798a47ea062ce97fffa3be3dd0048441eaca9c76da5f6b551f
SHA512bba3c6afc46698bc2ffc29eb3fcc63dddf16a25f11936517d2e6ba11dc852747075b72d747d51e7e3c7881ad598f3a18da6ab1d436977e4c66f346a7d2ea94a3
-
Filesize
391KB
MD5b6f50acc016464ec7e0f8f93398a6572
SHA1af78253284f5680ce28e54a6b4a03e90c9185e4a
SHA2562adf19cafc73e5798a47ea062ce97fffa3be3dd0048441eaca9c76da5f6b551f
SHA512bba3c6afc46698bc2ffc29eb3fcc63dddf16a25f11936517d2e6ba11dc852747075b72d747d51e7e3c7881ad598f3a18da6ab1d436977e4c66f346a7d2ea94a3
-
Filesize
11KB
MD5f2ebf762262c6349dabbb635967a9f59
SHA18a389b38d9d3120e1d5121eee37c31a12dc51a78
SHA256660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45
SHA512fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8
-
Filesize
11KB
MD5f2ebf762262c6349dabbb635967a9f59
SHA18a389b38d9d3120e1d5121eee37c31a12dc51a78
SHA256660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45
SHA512fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a