Analysis
-
max time kernel
145s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe
Resource
win10v2004-20230220-en
General
-
Target
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe
-
Size
1.3MB
-
MD5
58c13aa04075aa6a6f83393d256fb82a
-
SHA1
af3f7d6f4c41d0c67964c93c922c9ccabdf4eaef
-
SHA256
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6
-
SHA512
a4e17116e4b31514d5dcc2b7ddf24b155d4c4ebcc3b6b1b3b334b6a529017ee3f740f3ee08fcbf1b3ce7fea11c0a06257562797b7703c9df3a85c4e20a7928f6
-
SSDEEP
24576:syrjby7BLclszJOSJ+Seqczux5rc8mC2VRQfUdsl+Rzx/c+wufNWlHb:b3YBLkQJ+Sery5rc8mCkeU+ozx/3U
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beCm53OE84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beCm53OE84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beCm53OE84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beCm53OE84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beCm53OE84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beCm53OE84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3484-186-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-187-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-189-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-191-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-193-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-195-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-197-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-199-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-201-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-203-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-205-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-207-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-209-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-211-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-213-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-215-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-217-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-219-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-221-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-223-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-225-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-227-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-229-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-231-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-233-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-235-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-237-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-239-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-241-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-243-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-245-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-247-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline behavioral1/memory/3484-249-0x00000000026E0000-0x000000000271E000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4796 ptev0976OM.exe 3888 ptXr9100du.exe 4292 ptCg5564KR.exe 1352 ptHe1780Zk.exe 1728 ptqA4135MY.exe 5104 beCm53OE84.exe 3484 cupg61Qf09.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beCm53OE84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptCg5564KR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptHe1780Zk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptHe1780Zk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptqA4135MY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptev0976OM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptXr9100du.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptXr9100du.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptqA4135MY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptev0976OM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptCg5564KR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5104 beCm53OE84.exe 5104 beCm53OE84.exe 3484 cupg61Qf09.exe 3484 cupg61Qf09.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5104 beCm53OE84.exe Token: SeDebugPrivilege 3484 cupg61Qf09.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 232 wrote to memory of 4796 232 a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe 84 PID 232 wrote to memory of 4796 232 a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe 84 PID 232 wrote to memory of 4796 232 a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe 84 PID 4796 wrote to memory of 3888 4796 ptev0976OM.exe 85 PID 4796 wrote to memory of 3888 4796 ptev0976OM.exe 85 PID 4796 wrote to memory of 3888 4796 ptev0976OM.exe 85 PID 3888 wrote to memory of 4292 3888 ptXr9100du.exe 86 PID 3888 wrote to memory of 4292 3888 ptXr9100du.exe 86 PID 3888 wrote to memory of 4292 3888 ptXr9100du.exe 86 PID 4292 wrote to memory of 1352 4292 ptCg5564KR.exe 87 PID 4292 wrote to memory of 1352 4292 ptCg5564KR.exe 87 PID 4292 wrote to memory of 1352 4292 ptCg5564KR.exe 87 PID 1352 wrote to memory of 1728 1352 ptHe1780Zk.exe 88 PID 1352 wrote to memory of 1728 1352 ptHe1780Zk.exe 88 PID 1352 wrote to memory of 1728 1352 ptHe1780Zk.exe 88 PID 1728 wrote to memory of 5104 1728 ptqA4135MY.exe 89 PID 1728 wrote to memory of 5104 1728 ptqA4135MY.exe 89 PID 1728 wrote to memory of 3484 1728 ptqA4135MY.exe 93 PID 1728 wrote to memory of 3484 1728 ptqA4135MY.exe 93 PID 1728 wrote to memory of 3484 1728 ptqA4135MY.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe"C:\Users\Admin\AppData\Local\Temp\a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c2aab0d35bce87298e771a6c1f3e34ed
SHA129025629c20de5f1bf4222a27ecb38967b57ecb5
SHA2566c5f3090f50765acc82a8101044fb6b967de5fed7395fd5e742fb9bad3e31962
SHA512293a024623b8da0fd2b38159eb1e14a7f5a3f3c8ec165f3a0d9ebe95e97989e72d78578495d95c627954c851bceec0f1ef3ab7bb923fd531580862fc40d151a7
-
Filesize
1.2MB
MD5c2aab0d35bce87298e771a6c1f3e34ed
SHA129025629c20de5f1bf4222a27ecb38967b57ecb5
SHA2566c5f3090f50765acc82a8101044fb6b967de5fed7395fd5e742fb9bad3e31962
SHA512293a024623b8da0fd2b38159eb1e14a7f5a3f3c8ec165f3a0d9ebe95e97989e72d78578495d95c627954c851bceec0f1ef3ab7bb923fd531580862fc40d151a7
-
Filesize
1.0MB
MD5472f3f809ba093156ea886d9aceb974c
SHA1c55612c33b5a6ad50e016aed6f5413c2cf22d0cb
SHA25639ef2de9d514cfeb9c1c2bb14be89120a508f2d9ba6c8f9a696fe910f01056d9
SHA512449b68e8b35bf624788093a615b735ba23eb38d743f8ce13f89be449efa09a78d1e5335dfd1406c5d4c0d9f2ade21a846ea20d3277e3aaf2cf7b3ea831e48c1a
-
Filesize
1.0MB
MD5472f3f809ba093156ea886d9aceb974c
SHA1c55612c33b5a6ad50e016aed6f5413c2cf22d0cb
SHA25639ef2de9d514cfeb9c1c2bb14be89120a508f2d9ba6c8f9a696fe910f01056d9
SHA512449b68e8b35bf624788093a615b735ba23eb38d743f8ce13f89be449efa09a78d1e5335dfd1406c5d4c0d9f2ade21a846ea20d3277e3aaf2cf7b3ea831e48c1a
-
Filesize
935KB
MD5e2f1fc56553c442d83aea45a525e7602
SHA1fc19654a941e2089798c6136b54959c785e6b2d7
SHA2560a6e59157ccbfd605e90ba6f3022e99a978996c63d95bea4527fa5293a741f93
SHA5128ed47c441cca45bbd3368d5f07e290e557ed648917805b87272ba7f3d3dbdad8177b550d8bfe48eae0f4369a7e2dd13aa2ee295377da695a12e189ea842cf272
-
Filesize
935KB
MD5e2f1fc56553c442d83aea45a525e7602
SHA1fc19654a941e2089798c6136b54959c785e6b2d7
SHA2560a6e59157ccbfd605e90ba6f3022e99a978996c63d95bea4527fa5293a741f93
SHA5128ed47c441cca45bbd3368d5f07e290e557ed648917805b87272ba7f3d3dbdad8177b550d8bfe48eae0f4369a7e2dd13aa2ee295377da695a12e189ea842cf272
-
Filesize
666KB
MD5b7f90be8dcca58e0bc0e044b0bd61cc2
SHA128f1134ef5edb16c65a677f2d62e30b7dfa702a3
SHA256fbcf7799c0a733b7242b5cbb3a5ef37ffbf7fea58bd405558727679237071bc0
SHA512fafaee11beddf78acdaaf50f140b8ef93c182e6bfabe89e4189318b7dc352d252990dee6b02caddaea7108a9cca5a8394ef3ec9e6f91e25da7b02c04b4065800
-
Filesize
666KB
MD5b7f90be8dcca58e0bc0e044b0bd61cc2
SHA128f1134ef5edb16c65a677f2d62e30b7dfa702a3
SHA256fbcf7799c0a733b7242b5cbb3a5ef37ffbf7fea58bd405558727679237071bc0
SHA512fafaee11beddf78acdaaf50f140b8ef93c182e6bfabe89e4189318b7dc352d252990dee6b02caddaea7108a9cca5a8394ef3ec9e6f91e25da7b02c04b4065800
-
Filesize
391KB
MD51256d61ebc2cf66acaca8de6bb6a6331
SHA1d325c96471d55b111b5da3f3db61602bd1ef984c
SHA256490b697c9960785af7a80b87f9a6a75ba56a2e6a6d2698498ea3bdd6f9fbeb78
SHA512761d866ae04c7ee2fbb17570f859c6595e7c28a4f8dae729a72d2ae68371e5cf5e1af6545f569c3ae4654941247bccab84f2c877b7a291b04d608483d363e075
-
Filesize
391KB
MD51256d61ebc2cf66acaca8de6bb6a6331
SHA1d325c96471d55b111b5da3f3db61602bd1ef984c
SHA256490b697c9960785af7a80b87f9a6a75ba56a2e6a6d2698498ea3bdd6f9fbeb78
SHA512761d866ae04c7ee2fbb17570f859c6595e7c28a4f8dae729a72d2ae68371e5cf5e1af6545f569c3ae4654941247bccab84f2c877b7a291b04d608483d363e075
-
Filesize
11KB
MD5bf41791ec502a80e498da916c9b37da4
SHA172a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e
SHA2563768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348
SHA5128605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5
-
Filesize
11KB
MD5bf41791ec502a80e498da916c9b37da4
SHA172a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e
SHA2563768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348
SHA5128605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5
-
Filesize
11KB
MD5bf41791ec502a80e498da916c9b37da4
SHA172a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e
SHA2563768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348
SHA5128605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a