Analysis
-
max time kernel
78s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 17:06
Static task
static1
Behavioral task
behavioral1
Sample
5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe
Resource
win10v2004-20230221-en
General
-
Target
5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe
-
Size
535KB
-
MD5
a7ea9d2012cfa9c142248b1fd2f84685
-
SHA1
47bef3ad663ec38aa73d57674b929ce78d11bd78
-
SHA256
5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae
-
SHA512
a481015cf1807af4e331be930136b3f2f90ac224afc7e5c8b2b722717714f677ecc262e759ebe777b8cb1193c8546282e6ca6cd1c9cc37df5e09cd75ce4a7148
-
SSDEEP
12288:hMrpy90qE0mgIVf3T61Zr5WQGGYU3Mn6FXMGOJuGMRNagl+DJ:MyzyVqWQAUcaXZXLMDJ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw75Eo73UE72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw75Eo73UE72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw75Eo73UE72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw75Eo73UE72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw75Eo73UE72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw75Eo73UE72.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4756-157-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-158-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-160-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-162-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-164-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-166-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-168-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-170-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-172-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-174-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-176-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-178-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-180-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-182-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-184-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-186-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-188-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-190-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-192-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-194-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-196-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-198-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-200-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-202-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-204-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-206-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-208-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-210-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-212-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-214-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-216-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-218-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline behavioral1/memory/4756-220-0x00000000051A0000-0x00000000051DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2076 vut5659tz.exe 1608 sw75Eo73UE72.exe 4756 tCR74TO34.exe 2480 uHo86gv71.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw75Eo73UE72.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vut5659tz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vut5659tz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1036 4756 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1608 sw75Eo73UE72.exe 1608 sw75Eo73UE72.exe 4756 tCR74TO34.exe 4756 tCR74TO34.exe 2480 uHo86gv71.exe 2480 uHo86gv71.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1608 sw75Eo73UE72.exe Token: SeDebugPrivilege 4756 tCR74TO34.exe Token: SeDebugPrivilege 2480 uHo86gv71.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2076 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 85 PID 2436 wrote to memory of 2076 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 85 PID 2436 wrote to memory of 2076 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 85 PID 2076 wrote to memory of 1608 2076 vut5659tz.exe 86 PID 2076 wrote to memory of 1608 2076 vut5659tz.exe 86 PID 2076 wrote to memory of 4756 2076 vut5659tz.exe 91 PID 2076 wrote to memory of 4756 2076 vut5659tz.exe 91 PID 2076 wrote to memory of 4756 2076 vut5659tz.exe 91 PID 2436 wrote to memory of 2480 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 95 PID 2436 wrote to memory of 2480 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 95 PID 2436 wrote to memory of 2480 2436 5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe"C:\Users\Admin\AppData\Local\Temp\5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 19084⤵
- Program crash
PID:1036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4756 -ip 47561⤵PID:3384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5370d09bbb49187efc8fd509f6ce74163
SHA1c68c9f75750066acc105bf3b6ded2b86314b6a52
SHA256a7e8f9e37a5063c87f4b3b447776d0879718304b75fe13a8f18036b117d9765b
SHA5126c82e0d1614fb08495815fea21599267cd0b9e32299dd695937d9c447e41c4347d769850e7b915f8ed440f841a70b5645fecda193767a8b7aca383a99e0a71ac
-
Filesize
177KB
MD5370d09bbb49187efc8fd509f6ce74163
SHA1c68c9f75750066acc105bf3b6ded2b86314b6a52
SHA256a7e8f9e37a5063c87f4b3b447776d0879718304b75fe13a8f18036b117d9765b
SHA5126c82e0d1614fb08495815fea21599267cd0b9e32299dd695937d9c447e41c4347d769850e7b915f8ed440f841a70b5645fecda193767a8b7aca383a99e0a71ac
-
Filesize
391KB
MD5220de64ec1fe1ce1fa82a247dee39345
SHA1947f57e6861d30330ef603712b0646b8aec0d878
SHA256ae76f641f50d641f62d5bbd680b910ec70dd58b220c2099d96f5abf88df12da5
SHA512b16ee261d52c11393595874d1d9d73751859f0cc7ca5030244bbae469bfe9e91b642d687c8a96f25ca03c23dd14eafb8a58da20ce402c88477b75ec04d51a731
-
Filesize
391KB
MD5220de64ec1fe1ce1fa82a247dee39345
SHA1947f57e6861d30330ef603712b0646b8aec0d878
SHA256ae76f641f50d641f62d5bbd680b910ec70dd58b220c2099d96f5abf88df12da5
SHA512b16ee261d52c11393595874d1d9d73751859f0cc7ca5030244bbae469bfe9e91b642d687c8a96f25ca03c23dd14eafb8a58da20ce402c88477b75ec04d51a731
-
Filesize
17KB
MD520c04327ffd1cc1fe4efd79b8505dfe3
SHA1990366ff09b7d3f9a46bb547228c62ab1d49f247
SHA25645da3bd94c3e54acda0aa988469b733ad701ec44b279323634cdd8ee772d2c69
SHA5125d4c4216718445278cac9b0cfc02aaf65db81d7cfb015787275b1783fd31a006ae3177952b4c792125b11b8bf8333c4e2018afef673dc270742a55beebc074de
-
Filesize
17KB
MD520c04327ffd1cc1fe4efd79b8505dfe3
SHA1990366ff09b7d3f9a46bb547228c62ab1d49f247
SHA25645da3bd94c3e54acda0aa988469b733ad701ec44b279323634cdd8ee772d2c69
SHA5125d4c4216718445278cac9b0cfc02aaf65db81d7cfb015787275b1783fd31a006ae3177952b4c792125b11b8bf8333c4e2018afef673dc270742a55beebc074de
-
Filesize
302KB
MD5b0b07df44fd27fecf8a8ed8735a76c78
SHA133e2470f3dea8a97ecff3109daed706e174201b4
SHA256c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374
SHA5123e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7
-
Filesize
302KB
MD5b0b07df44fd27fecf8a8ed8735a76c78
SHA133e2470f3dea8a97ecff3109daed706e174201b4
SHA256c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374
SHA5123e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7